Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Lisect_AVT_24003_G1B_108.exe

Overview

General Information

Sample name:Lisect_AVT_24003_G1B_108.exe
Analysis ID:1481265
MD5:0b4b3e5e4a2ee4bd9ba8d9950639f269
SHA1:7a0ffcb4a3b75704478ed80c20d4dc830ab07ebf
SHA256:b240341d8adfed0f14d665dcbad14c542fa2e6f57a8c1904c0e5ccfb10270b17
Tags:exe
Infos:

Detection

RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected RisePro Stealer
AI detected suspicious sample
Found stalling execution ending in API Sleep call
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Potentially malicious time measurement code found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Uses schtasks.exe or at.exe to add and modify task schedules
Abnormal high CPU Usage
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to read the PEB
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Lisect_AVT_24003_G1B_108.exe (PID: 1992 cmdline: "C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exe" MD5: 0B4B3E5E4A2EE4BD9BA8D9950639F269)
    • schtasks.exe (PID: 2316 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 3436 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 6972 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6984 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • MPGPH131.exe (PID: 5012 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: 0B4B3E5E4A2EE4BD9BA8D9950639F269)
  • MPGPH131.exe (PID: 6484 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: 0B4B3E5E4A2EE4BD9BA8D9950639F269)
  • RageMP131.exe (PID: 5080 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: 0B4B3E5E4A2EE4BD9BA8D9950639F269)
  • RageMP131.exe (PID: 6620 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: 0B4B3E5E4A2EE4BD9BA8D9950639F269)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000A.00000003.2265416340.0000000004D10000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
      00000008.00000003.2179548739.0000000004E30000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
        00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
          00000006.00000003.2078685252.0000000004C70000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
            Click to see the 10 entries

            System Summary

            barindex
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exe, ProcessId: 1992, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RageMP131
            No Snort rule has matched
            Timestamp:2024-07-25T06:58:51.799868+0200
            SID:2049060
            Source Port:49705
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T06:58:50.127587+0200
            SID:2046269
            Source Port:49704
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T06:58:54.752913+0200
            SID:2046269
            Source Port:49705
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T06:59:13.143304+0200
            SID:2046269
            Source Port:49715
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T06:59:23.343383+0200
            SID:2022930
            Source Port:443
            Destination Port:62109
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T06:59:03.946343+0200
            SID:2022930
            Source Port:443
            Destination Port:49707
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T06:58:54.752808+0200
            SID:2046269
            Source Port:49706
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T06:58:47.148505+0200
            SID:2049060
            Source Port:49704
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T06:59:05.660986+0200
            SID:2046269
            Source Port:49708
            Destination Port:50500
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T06:59:22.123324+0200
            SID:2022930
            Source Port:443
            Destination Port:62108
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: Lisect_AVT_24003_G1B_108.exeAvira: detected
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeAvira: detection malicious, Label: TR/Zenpak.bowul
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeAvira: detection malicious, Label: TR/Zenpak.bowul
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeReversingLabs: Detection: 63%
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeReversingLabs: Detection: 63%
            Source: Lisect_AVT_24003_G1B_108.exeReversingLabs: Detection: 63%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJoe Sandbox ML: detected
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeJoe Sandbox ML: detected
            Source: Lisect_AVT_24003_G1B_108.exeJoe Sandbox ML: detected
            Source: Lisect_AVT_24003_G1B_108.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: global trafficTCP traffic: 192.168.2.5:49704 -> 193.233.132.62:50500
            Source: Joe Sandbox ViewIP Address: 193.233.132.62 193.233.132.62
            Source: Joe Sandbox ViewIP Address: 193.233.132.62 193.233.132.62
            Source: unknownDNS traffic detected: query: 198.187.3.20.in-addr.arpa replaycode: Name error (3)
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.62
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeCode function: 0_2_0082DB60 recv,WSAStartup,closesocket,socket,connect,closesocket,0_2_0082DB60
            Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
            Source: Lisect_AVT_24003_G1B_108.exe, 00000000.00000003.2027415909.00000000050D0000.00000004.00001000.00020000.00000000.sdmp, Lisect_AVT_24003_G1B_108.exe, 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000003.2078685252.0000000004C70000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000003.2079204683.00000000051D0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000003.2179548739.0000000004E30000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000A.00000003.2265416340.0000000004D10000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
            Source: Lisect_AVT_24003_G1B_108.exe, 00000000.00000003.2027415909.00000000050D0000.00000004.00001000.00020000.00000000.sdmp, Lisect_AVT_24003_G1B_108.exe, 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000003.2078685252.0000000004C70000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000003.2079204683.00000000051D0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000003.2179548739.0000000004E30000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000A.00000003.2265416340.0000000004D10000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
            Source: Lisect_AVT_24003_G1B_108.exe, 00000000.00000002.4485642418.000000000137E000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.4485725451.0000000000ECD000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.4485715827.000000000135A000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.4485499780.0000000000F6E000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000A.00000002.4485711166.0000000000E6B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
            Source: RageMP131.exe, 00000008.00000002.4485499780.0000000000F6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT-h
            Source: Lisect_AVT_24003_G1B_108.exe, 00000000.00000002.4485642418.000000000137E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT;
            Source: MPGPH131.exe, 00000006.00000002.4485725451.0000000000ECD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORTt

            System Summary

            barindex
            Source: Lisect_AVT_24003_G1B_108.exeStatic PE information: section name:
            Source: Lisect_AVT_24003_G1B_108.exeStatic PE information: section name: .idata
            Source: Lisect_AVT_24003_G1B_108.exeStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: .idata
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: .idata
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeCode function: 0_2_008EA8000_2_008EA800
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeCode function: 0_2_008120400_2_00812040
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeCode function: 0_2_0082A1000_2_0082A100
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeCode function: 0_2_008F991F0_2_008F991F
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeCode function: 0_2_008919400_2_00891940
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeCode function: 0_2_008242A00_2_008242A0
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeCode function: 0_2_008122C00_2_008122C0
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeCode function: 0_2_0089BBB00_2_0089BBB0
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeCode function: 0_2_0081AB500_2_0081AB50
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeCode function: 0_2_00894C200_2_00894C20
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeCode function: 0_2_008F3ED80_2_008F3ED8
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeCode function: 0_2_008806F00_2_008806F0
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeCode function: 0_2_0081A7200_2_0081A720
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeCode function: 0_2_008F07500_2_008F0750
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_004420406_2_00442040
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0051A8006_2_0051A800
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_004C19406_2_004C1940
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0045A1006_2_0045A100
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0052991F6_2_0052991F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_004422C06_2_004422C0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_004542A06_2_004542A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0044AB506_2_0044AB50
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_004CBBB06_2_004CBBB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_004C4C206_2_004C4C20
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00523ED86_2_00523ED8
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_004B06F06_2_004B06F0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_005207506_2_00520750
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0044A7206_2_0044A720
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_004420407_2_00442040
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0051A8007_2_0051A800
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_004C19407_2_004C1940
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0045A1007_2_0045A100
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0052991F7_2_0052991F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_004422C07_2_004422C0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_004542A07_2_004542A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0044AB507_2_0044AB50
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_004CBBB07_2_004CBBB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_004C4C207_2_004C4C20
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00523ED87_2_00523ED8
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_004B06F07_2_004B06F0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_005207507_2_00520750
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0044A7207_2_0044A720
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_004320408_2_00432040
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_0050A8008_2_0050A800
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_004B19408_2_004B1940
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_0044A1008_2_0044A100
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_0051991F8_2_0051991F
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_004322C08_2_004322C0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_004442A08_2_004442A0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_0043AB508_2_0043AB50
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_004BBBB08_2_004BBBB0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_004B4C208_2_004B4C20
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00513ED88_2_00513ED8
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_004A06F08_2_004A06F0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_005107508_2_00510750
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_0043A7208_2_0043A720
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 10_2_0043204010_2_00432040
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 10_2_0050A80010_2_0050A800
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 10_2_004B194010_2_004B1940
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 10_2_0044A10010_2_0044A100
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 10_2_0051991F10_2_0051991F
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 10_2_004322C010_2_004322C0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 10_2_004442A010_2_004442A0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 10_2_0043AB5010_2_0043AB50
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 10_2_004BBBB010_2_004BBBB0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 10_2_004B4C2010_2_004B4C20
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 10_2_00513ED810_2_00513ED8
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 10_2_004A06F010_2_004A06F0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 10_2_0051075010_2_00510750
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 10_2_0043A72010_2_0043A720
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: String function: 0051D940 appears 46 times
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: String function: 0050D940 appears 46 times
            Source: Lisect_AVT_24003_G1B_108.exe, 00000000.00000003.2040275696.000000000558F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAy3Info.exe0 vs Lisect_AVT_24003_G1B_108.exe
            Source: Lisect_AVT_24003_G1B_108.exe, 00000000.00000003.2041694673.000000000558E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAy3Info.exe0 vs Lisect_AVT_24003_G1B_108.exe
            Source: Lisect_AVT_24003_G1B_108.exe, 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameAy3Info.exe0 vs Lisect_AVT_24003_G1B_108.exe
            Source: Lisect_AVT_24003_G1B_108.exe, 00000000.00000002.4489638829.00000000050E0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAy3Info.exe0 vs Lisect_AVT_24003_G1B_108.exe
            Source: Lisect_AVT_24003_G1B_108.exeBinary or memory string: OriginalFilenameAy3Info.exe0 vs Lisect_AVT_24003_G1B_108.exe
            Source: Lisect_AVT_24003_G1B_108.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: Lisect_AVT_24003_G1B_108.exeStatic PE information: Section: ZLIB complexity 0.9993563565340909
            Source: RageMP131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9993563565340909
            Source: MPGPH131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9993563565340909
            Source: classification engineClassification label: mal100.troj.evad.winEXE@11/5@1/1
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeFile created: C:\Users\user\AppData\Local\RageMP131Jump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3436:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6984:120:WilError_03
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeFile created: C:\Users\user\AppData\Local\Temp\rage131MP.tmpJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Lisect_AVT_24003_G1B_108.exe, 00000000.00000003.2027415909.00000000050D0000.00000004.00001000.00020000.00000000.sdmp, Lisect_AVT_24003_G1B_108.exe, 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000003.2078685252.0000000004C70000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000003.2079204683.00000000051D0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000003.2179548739.0000000004E30000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000A.00000003.2265416340.0000000004D10000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: Lisect_AVT_24003_G1B_108.exe, 00000000.00000003.2027415909.00000000050D0000.00000004.00001000.00020000.00000000.sdmp, Lisect_AVT_24003_G1B_108.exe, 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000003.2078685252.0000000004C70000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000003.2079204683.00000000051D0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000003.2179548739.0000000004E30000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000A.00000003.2265416340.0000000004D10000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: Lisect_AVT_24003_G1B_108.exeReversingLabs: Detection: 63%
            Source: Lisect_AVT_24003_G1B_108.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: MPGPH131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: MPGPH131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: RageMP131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: RageMP131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeFile read: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exe "C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exe"
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHESTJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHESTJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: Lisect_AVT_24003_G1B_108.exeStatic file information: File size 2401804 > 1048576
            Source: Lisect_AVT_24003_G1B_108.exeStatic PE information: Raw size of rhfejcgk is bigger than: 0x100000 < 0x1b5a00

            Data Obfuscation

            barindex
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeUnpacked PE file: 0.2.Lisect_AVT_24003_G1B_108.exe.810000.0.unpack :EW;.rsrc:W;.idata :W; :EW;rhfejcgk:EW;khoopwui:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;rhfejcgk:EW;khoopwui:EW;.taggant:EW;
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeUnpacked PE file: 6.2.MPGPH131.exe.440000.0.unpack :EW;.rsrc:W;.idata :W; :EW;rhfejcgk:EW;khoopwui:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;rhfejcgk:EW;khoopwui:EW;.taggant:EW;
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeUnpacked PE file: 7.2.MPGPH131.exe.440000.0.unpack :EW;.rsrc:W;.idata :W; :EW;rhfejcgk:EW;khoopwui:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;rhfejcgk:EW;khoopwui:EW;.taggant:EW;
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeUnpacked PE file: 8.2.RageMP131.exe.430000.0.unpack :EW;.rsrc:W;.idata :W; :EW;rhfejcgk:EW;khoopwui:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;rhfejcgk:EW;khoopwui:EW;.taggant:EW;
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeUnpacked PE file: 10.2.RageMP131.exe.430000.0.unpack :EW;.rsrc:W;.idata :W; :EW;rhfejcgk:EW;khoopwui:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;rhfejcgk:EW;khoopwui:EW;.taggant:EW;
            Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
            Source: RageMP131.exe.0.drStatic PE information: real checksum: 0x251f63 should be: 0x24fd85
            Source: MPGPH131.exe.0.drStatic PE information: real checksum: 0x251f63 should be: 0x24fd85
            Source: Lisect_AVT_24003_G1B_108.exeStatic PE information: real checksum: 0x251f63 should be: 0x24fd85
            Source: Lisect_AVT_24003_G1B_108.exeStatic PE information: section name:
            Source: Lisect_AVT_24003_G1B_108.exeStatic PE information: section name: .idata
            Source: Lisect_AVT_24003_G1B_108.exeStatic PE information: section name:
            Source: Lisect_AVT_24003_G1B_108.exeStatic PE information: section name: rhfejcgk
            Source: Lisect_AVT_24003_G1B_108.exeStatic PE information: section name: khoopwui
            Source: Lisect_AVT_24003_G1B_108.exeStatic PE information: section name: .taggant
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: .idata
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: rhfejcgk
            Source: RageMP131.exe.0.drStatic PE information: section name: khoopwui
            Source: RageMP131.exe.0.drStatic PE information: section name: .taggant
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: .idata
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: rhfejcgk
            Source: MPGPH131.exe.0.drStatic PE information: section name: khoopwui
            Source: MPGPH131.exe.0.drStatic PE information: section name: .taggant
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeCode function: 0_2_008ED509 push ecx; ret 0_2_008ED51C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0051D509 push ecx; ret 6_2_0051D51C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_04F2016D push edx; retf 6_2_04F2016E
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_0051D509 push ecx; ret 7_2_0051D51C
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_0050D509 push ecx; ret 8_2_0050D51C
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 10_2_0050D509 push ecx; ret 10_2_0050D51C
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 10_2_04FB03F9 push 0000005Bh; retn 0010h10_2_04FB0404
            Source: Lisect_AVT_24003_G1B_108.exeStatic PE information: section name: entropy: 7.988833024480807
            Source: Lisect_AVT_24003_G1B_108.exeStatic PE information: section name: rhfejcgk entropy: 7.913857553386715
            Source: RageMP131.exe.0.drStatic PE information: section name: entropy: 7.988833024480807
            Source: RageMP131.exe.0.drStatic PE information: section name: rhfejcgk entropy: 7.913857553386715
            Source: MPGPH131.exe.0.drStatic PE information: section name: entropy: 7.988833024480807
            Source: MPGPH131.exe.0.drStatic PE information: section name: rhfejcgk entropy: 7.913857553386715
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeFile created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJump to dropped file
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeStalling execution: Execution stalls by calling Sleepgraph_0-23677
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeStalling execution: Execution stalls by calling Sleepgraph_8-24135
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeStalling execution: Execution stalls by calling Sleepgraph_6-23937
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: AE5D81 second address: AE5DA2 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FBFB0CD3E26h 0x00000008 jmp 00007FBFB0CD3E31h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop edx 0x00000010 push edi 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: AE5DA2 second address: AE5DB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBFB1286EBAh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: ADAFA1 second address: ADAFA5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: ADAFA5 second address: ADAFAB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: ADAFAB second address: ADAFC8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jns 00007FBFB0CD3E37h 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: ADAFC8 second address: ADAFCD instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: ADAFCD second address: ADAFF8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FBFB0CD3E26h 0x0000000a pop edi 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007FBFB0CD3E33h 0x00000013 push edi 0x00000014 pop edi 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 pushad 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: ADAFF8 second address: ADAFFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: ADAFFC second address: ADB012 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 ja 00007FBFB0CD3E26h 0x0000000d pop edi 0x0000000e push eax 0x0000000f push edx 0x00000010 jns 00007FBFB0CD3E26h 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: AE5358 second address: AE535C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: AE535C second address: AE5366 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FBFB0CD3E26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: AE5366 second address: AE536D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: AE5506 second address: AE5525 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBFB0CD3E39h 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: AE5525 second address: AE5529 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: AE77D7 second address: AE781C instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 mov edi, dword ptr [ebp+122D391Bh] 0x0000000e push 00000000h 0x00000010 push 00000000h 0x00000012 push ebx 0x00000013 call 00007FBFB0CD3E28h 0x00000018 pop ebx 0x00000019 mov dword ptr [esp+04h], ebx 0x0000001d add dword ptr [esp+04h], 00000016h 0x00000025 inc ebx 0x00000026 push ebx 0x00000027 ret 0x00000028 pop ebx 0x00000029 ret 0x0000002a sub dword ptr [ebp+122D3652h], ebx 0x00000030 push A1B7EDC0h 0x00000035 pushad 0x00000036 jnc 00007FBFB0CD3E28h 0x0000003c pushad 0x0000003d popad 0x0000003e push ecx 0x0000003f push eax 0x00000040 push edx 0x00000041 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: AE781C second address: AE786C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 add dword ptr [esp], 5E4812C0h 0x0000000d mov edi, edx 0x0000000f push 00000003h 0x00000011 mov edi, dword ptr [ebp+122D2A08h] 0x00000017 push 00000000h 0x00000019 push 00000000h 0x0000001b push eax 0x0000001c call 00007FBFB1286EB8h 0x00000021 pop eax 0x00000022 mov dword ptr [esp+04h], eax 0x00000026 add dword ptr [esp+04h], 00000019h 0x0000002e inc eax 0x0000002f push eax 0x00000030 ret 0x00000031 pop eax 0x00000032 ret 0x00000033 push 00000003h 0x00000035 sbb edx, 0497FA64h 0x0000003b call 00007FBFB1286EB9h 0x00000040 pushad 0x00000041 push eax 0x00000042 push edx 0x00000043 push ecx 0x00000044 pop ecx 0x00000045 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: AE786C second address: AE78A3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FBFB0CD3E38h 0x0000000b popad 0x0000000c push eax 0x0000000d push ecx 0x0000000e jmp 00007FBFB0CD3E2Dh 0x00000013 pop ecx 0x00000014 mov eax, dword ptr [esp+04h] 0x00000018 push edx 0x00000019 push esi 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: AE78A3 second address: AE78B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop edx 0x00000006 mov eax, dword ptr [eax] 0x00000008 push eax 0x00000009 push edx 0x0000000a jl 00007FBFB1286EB8h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: AE78B5 second address: AE78BB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: AE78BB second address: AE78BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: AE78BF second address: AE78D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c push edi 0x0000000d push eax 0x0000000e push edx 0x0000000f jc 00007FBFB0CD3E26h 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: AE7985 second address: AE798C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: AE798C second address: AE7996 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007FBFB0CD3E26h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: AE7996 second address: AE7A13 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push 00000000h 0x0000000b push ebp 0x0000000c call 00007FBFB1286EB8h 0x00000011 pop ebp 0x00000012 mov dword ptr [esp+04h], ebp 0x00000016 add dword ptr [esp+04h], 00000015h 0x0000001e inc ebp 0x0000001f push ebp 0x00000020 ret 0x00000021 pop ebp 0x00000022 ret 0x00000023 mov dword ptr [ebp+122D375Ah], ebx 0x00000029 push 00000000h 0x0000002b push 00000000h 0x0000002d push ebx 0x0000002e call 00007FBFB1286EB8h 0x00000033 pop ebx 0x00000034 mov dword ptr [esp+04h], ebx 0x00000038 add dword ptr [esp+04h], 00000014h 0x00000040 inc ebx 0x00000041 push ebx 0x00000042 ret 0x00000043 pop ebx 0x00000044 ret 0x00000045 jmp 00007FBFB1286EC4h 0x0000004a push B00FD9D2h 0x0000004f pushad 0x00000050 push eax 0x00000051 push edx 0x00000052 jmp 00007FBFB1286EC7h 0x00000057 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: AE7A13 second address: AE7A17 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: AE7C3D second address: AE7C47 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B077D4 second address: B077E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 js 00007FBFB0CD3E26h 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B05719 second address: B05723 instructions: 0x00000000 rdtsc 0x00000002 js 00007FBFB1286EBCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B05F65 second address: B05F6C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B05F6C second address: B05F72 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B05F72 second address: B05F78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B061FB second address: B06207 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B06207 second address: B0620B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B063C5 second address: B063CB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B063CB second address: B063CF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B063CF second address: B063E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FBFB1286EC0h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B063E8 second address: B06405 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBFB0CD3E2Fh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B06405 second address: B06412 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jbe 00007FBFB1286EB6h 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B06412 second address: B06418 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B06418 second address: B0641E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B066DB second address: B066E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: AFB927 second address: AFB93B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBFB1286EBEh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: AD5FB5 second address: AD5FC9 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FBFB0CD3E26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jc 00007FBFB0CD3E2Ch 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: AD5FC9 second address: AD5FD9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FBFB1286EBCh 0x0000000a jo 00007FBFB1286EB6h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: AD5FD9 second address: AD5FEA instructions: 0x00000000 rdtsc 0x00000002 jne 00007FBFB0CD3E2Ch 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: AD5FEA second address: AD5FF2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: AD5FF2 second address: AD5FF8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B12531 second address: B1254F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 jmp 00007FBFB1286EBFh 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jnc 00007FBFB1286EB6h 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B11A98 second address: B11ABC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E39h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c push esi 0x0000000d pop esi 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B11C44 second address: B11C48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B11C48 second address: B11C55 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 ja 00007FBFB0CD3E26h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B11DCD second address: B11DFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push ebx 0x00000008 jbe 00007FBFB1286EB6h 0x0000000e pop ebx 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 jnp 00007FBFB1286ECFh 0x00000018 jmp 00007FBFB1286EC7h 0x0000001d push edi 0x0000001e pop edi 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B11DFE second address: B11E29 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E37h 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FBFB0CD3E30h 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B120B9 second address: B120BD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B120BD second address: B120C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B123D4 second address: B123E1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jo 00007FBFB1286EB6h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B141F8 second address: B141FC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B146AC second address: B146B6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007FBFB1286EB6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1495E second address: B14968 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FBFB0CD3E26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B15152 second address: B15156 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B15227 second address: B1522B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B15323 second address: B15327 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1547A second address: B1547E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1547E second address: B15499 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EC7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B161C9 second address: B161CD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B171C1 second address: B171CE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B16992 second address: B16996 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B171CE second address: B171D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B17C60 second address: B17C79 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E35h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1866E second address: B186EF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push esi 0x0000000d call 00007FBFB1286EB8h 0x00000012 pop esi 0x00000013 mov dword ptr [esp+04h], esi 0x00000017 add dword ptr [esp+04h], 0000001Ch 0x0000001f inc esi 0x00000020 push esi 0x00000021 ret 0x00000022 pop esi 0x00000023 ret 0x00000024 and esi, dword ptr [ebp+122D3691h] 0x0000002a jno 00007FBFB1286EC4h 0x00000030 push 00000000h 0x00000032 push 00000000h 0x00000034 push 00000000h 0x00000036 push ecx 0x00000037 call 00007FBFB1286EB8h 0x0000003c pop ecx 0x0000003d mov dword ptr [esp+04h], ecx 0x00000041 add dword ptr [esp+04h], 0000001Ah 0x00000049 inc ecx 0x0000004a push ecx 0x0000004b ret 0x0000004c pop ecx 0x0000004d ret 0x0000004e sbb si, 854Fh 0x00000053 push eax 0x00000054 pushad 0x00000055 push eax 0x00000056 push edx 0x00000057 jmp 00007FBFB1286EBAh 0x0000005c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1842B second address: B1842F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1842F second address: B18433 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B18433 second address: B18444 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b jg 00007FBFB0CD3E26h 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B19D1E second address: B19D23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1A4C2 second address: B1A4E1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E30h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edi 0x0000000a push eax 0x0000000b pushad 0x0000000c push ebx 0x0000000d pushad 0x0000000e popad 0x0000000f pop ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1A4E1 second address: B1A4E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: AC6D07 second address: AC6D0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1EA71 second address: B1EA77 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1EF67 second address: B1EF85 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E30h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jbe 00007FBFB0CD3E34h 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1EF85 second address: B1EFE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FBFB1286EB6h 0x0000000a popad 0x0000000b nop 0x0000000c jne 00007FBFB1286EBBh 0x00000012 push 00000000h 0x00000014 mov dword ptr [ebp+122D1920h], ebx 0x0000001a push 00000000h 0x0000001c push 00000000h 0x0000001e push edx 0x0000001f call 00007FBFB1286EB8h 0x00000024 pop edx 0x00000025 mov dword ptr [esp+04h], edx 0x00000029 add dword ptr [esp+04h], 00000018h 0x00000031 inc edx 0x00000032 push edx 0x00000033 ret 0x00000034 pop edx 0x00000035 ret 0x00000036 movsx edi, di 0x00000039 xchg eax, esi 0x0000003a push eax 0x0000003b jmp 00007FBFB1286EC0h 0x00000040 pop eax 0x00000041 push eax 0x00000042 push ecx 0x00000043 push eax 0x00000044 push edx 0x00000045 pushad 0x00000046 popad 0x00000047 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1F114 second address: B1F118 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1F118 second address: B1F122 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1F122 second address: B1F126 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1F126 second address: B1F1BC instructions: 0x00000000 rdtsc 0x00000002 jns 00007FBFB1286EB6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push eax 0x0000000f call 00007FBFB1286EB8h 0x00000014 pop eax 0x00000015 mov dword ptr [esp+04h], eax 0x00000019 add dword ptr [esp+04h], 00000018h 0x00000021 inc eax 0x00000022 push eax 0x00000023 ret 0x00000024 pop eax 0x00000025 ret 0x00000026 push dword ptr fs:[00000000h] 0x0000002d call 00007FBFB1286EC2h 0x00000032 mov di, ax 0x00000035 pop ebx 0x00000036 mov dword ptr fs:[00000000h], esp 0x0000003d push 00000000h 0x0000003f push edi 0x00000040 call 00007FBFB1286EB8h 0x00000045 pop edi 0x00000046 mov dword ptr [esp+04h], edi 0x0000004a add dword ptr [esp+04h], 0000001Ah 0x00000052 inc edi 0x00000053 push edi 0x00000054 ret 0x00000055 pop edi 0x00000056 ret 0x00000057 mov ebx, 50313B31h 0x0000005c mov ebx, 0D2E2A26h 0x00000061 mov eax, dword ptr [ebp+122D048Dh] 0x00000067 mov dword ptr [ebp+122D3702h], edx 0x0000006d push FFFFFFFFh 0x0000006f mov ebx, dword ptr [ebp+122D1917h] 0x00000075 nop 0x00000076 push eax 0x00000077 push edx 0x00000078 push ebx 0x00000079 push eax 0x0000007a push edx 0x0000007b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1F1BC second address: B1F1C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B22F4D second address: B22F51 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B221BD second address: B2225E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E37h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov dword ptr [esp], eax 0x0000000d push esi 0x0000000e mov dword ptr [ebp+122D28FEh], ebx 0x00000014 pop edi 0x00000015 push dword ptr fs:[00000000h] 0x0000001c and edi, 0C7EB0C6h 0x00000022 sub edi, 7213B417h 0x00000028 mov dword ptr fs:[00000000h], esp 0x0000002f and ebx, 7EEC4846h 0x00000035 mov eax, dword ptr [ebp+122D0A75h] 0x0000003b jmp 00007FBFB0CD3E36h 0x00000040 push FFFFFFFFh 0x00000042 jmp 00007FBFB0CD3E2Fh 0x00000047 movsx ebx, bx 0x0000004a nop 0x0000004b jmp 00007FBFB0CD3E2Bh 0x00000050 push eax 0x00000051 pushad 0x00000052 jc 00007FBFB0CD3E39h 0x00000058 jmp 00007FBFB0CD3E33h 0x0000005d pushad 0x0000005e push eax 0x0000005f push edx 0x00000060 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B2311F second address: B23124 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B24FCC second address: B24FD0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B24125 second address: B2412C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B2412C second address: B241E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 jnc 00007FBFB0CD3E34h 0x0000000e nop 0x0000000f push 00000000h 0x00000011 push ebx 0x00000012 call 00007FBFB0CD3E28h 0x00000017 pop ebx 0x00000018 mov dword ptr [esp+04h], ebx 0x0000001c add dword ptr [esp+04h], 0000001Bh 0x00000024 inc ebx 0x00000025 push ebx 0x00000026 ret 0x00000027 pop ebx 0x00000028 ret 0x00000029 push dword ptr fs:[00000000h] 0x00000030 push 00000000h 0x00000032 push ebx 0x00000033 call 00007FBFB0CD3E28h 0x00000038 pop ebx 0x00000039 mov dword ptr [esp+04h], ebx 0x0000003d add dword ptr [esp+04h], 00000016h 0x00000045 inc ebx 0x00000046 push ebx 0x00000047 ret 0x00000048 pop ebx 0x00000049 ret 0x0000004a jmp 00007FBFB0CD3E36h 0x0000004f call 00007FBFB0CD3E32h 0x00000054 pop edi 0x00000055 mov dword ptr fs:[00000000h], esp 0x0000005c mov ebx, esi 0x0000005e mov edi, dword ptr [ebp+122D2A98h] 0x00000064 mov eax, dword ptr [ebp+122D1049h] 0x0000006a mov ebx, dword ptr [ebp+122D38C1h] 0x00000070 push FFFFFFFFh 0x00000072 mov dword ptr [ebp+122D3C63h], edx 0x00000078 nop 0x00000079 push eax 0x0000007a push edx 0x0000007b jns 00007FBFB0CD3E28h 0x00000081 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B241E8 second address: B24208 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EC2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d jnc 00007FBFB1286EB6h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B261C1 second address: B261C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B2705A second address: B27060 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B27060 second address: B2708B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E39h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push edi 0x0000000c ja 00007FBFB0CD3E26h 0x00000012 pop edi 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B2708B second address: B2708F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B26294 second address: B262C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBFB0CD3E37h 0x00000009 popad 0x0000000a pop ebx 0x0000000b push eax 0x0000000c pushad 0x0000000d jmp 00007FBFB0CD3E31h 0x00000012 push edi 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B29179 second address: B2917F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B2917F second address: B291F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b push 00000000h 0x0000000d push ebp 0x0000000e call 00007FBFB0CD3E28h 0x00000013 pop ebp 0x00000014 mov dword ptr [esp+04h], ebp 0x00000018 add dword ptr [esp+04h], 00000016h 0x00000020 inc ebp 0x00000021 push ebp 0x00000022 ret 0x00000023 pop ebp 0x00000024 ret 0x00000025 jmp 00007FBFB0CD3E2Dh 0x0000002a push 00000000h 0x0000002c call 00007FBFB0CD3E31h 0x00000031 pushad 0x00000032 movzx esi, di 0x00000035 popad 0x00000036 pop edi 0x00000037 push 00000000h 0x00000039 push 00000000h 0x0000003b push esi 0x0000003c call 00007FBFB0CD3E28h 0x00000041 pop esi 0x00000042 mov dword ptr [esp+04h], esi 0x00000046 add dword ptr [esp+04h], 00000015h 0x0000004e inc esi 0x0000004f push esi 0x00000050 ret 0x00000051 pop esi 0x00000052 ret 0x00000053 mov edi, dword ptr [ebp+122D2A64h] 0x00000059 push eax 0x0000005a pushad 0x0000005b push eax 0x0000005c push edx 0x0000005d push edx 0x0000005e pop edx 0x0000005f rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B271D0 second address: B271D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B28305 second address: B2830A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B27280 second address: B27289 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B2841E second address: B28422 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B2C73C second address: B2C749 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push edi 0x0000000a push edi 0x0000000b pop edi 0x0000000c pop edi 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B27289 second address: B2728D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B28422 second address: B2843E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBFB1286EC8h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B2728D second address: B27291 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B27291 second address: B272A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jg 00007FBFB1286EBCh 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B2E92A second address: B2E930 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B2E930 second address: B2E9A3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EC5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e push 00000000h 0x00000010 push eax 0x00000011 call 00007FBFB1286EB8h 0x00000016 pop eax 0x00000017 mov dword ptr [esp+04h], eax 0x0000001b add dword ptr [esp+04h], 00000016h 0x00000023 inc eax 0x00000024 push eax 0x00000025 ret 0x00000026 pop eax 0x00000027 ret 0x00000028 je 00007FBFB1286EB8h 0x0000002e mov bh, 84h 0x00000030 push 00000000h 0x00000032 push eax 0x00000033 mov ebx, dword ptr [ebp+122D2AD0h] 0x00000039 pop edi 0x0000003a push 00000000h 0x0000003c mov edi, 109AED33h 0x00000041 push eax 0x00000042 jbe 00007FBFB1286EE2h 0x00000048 push eax 0x00000049 push edx 0x0000004a jmp 00007FBFB1286EC5h 0x0000004f rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B2EAC6 second address: B2EACA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B2EACA second address: B2EB73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp], eax 0x0000000a pushad 0x0000000b pushad 0x0000000c mov dword ptr [ebp+122D3176h], ecx 0x00000012 mov di, ax 0x00000015 popad 0x00000016 mov dword ptr [ebp+122D387Dh], ebx 0x0000001c popad 0x0000001d mov ebx, dword ptr [ebp+122D2BC8h] 0x00000023 push dword ptr fs:[00000000h] 0x0000002a mov dword ptr [ebp+122D3BD1h], ebx 0x00000030 mov dword ptr fs:[00000000h], esp 0x00000037 push 00000000h 0x00000039 push eax 0x0000003a call 00007FBFB1286EB8h 0x0000003f pop eax 0x00000040 mov dword ptr [esp+04h], eax 0x00000044 add dword ptr [esp+04h], 0000001Dh 0x0000004c inc eax 0x0000004d push eax 0x0000004e ret 0x0000004f pop eax 0x00000050 ret 0x00000051 xor dword ptr [ebp+12460C22h], edx 0x00000057 mov eax, dword ptr [ebp+122D07B5h] 0x0000005d and edi, 02E0E2BDh 0x00000063 push FFFFFFFFh 0x00000065 push 00000000h 0x00000067 push edi 0x00000068 call 00007FBFB1286EB8h 0x0000006d pop edi 0x0000006e mov dword ptr [esp+04h], edi 0x00000072 add dword ptr [esp+04h], 0000001Ah 0x0000007a inc edi 0x0000007b push edi 0x0000007c ret 0x0000007d pop edi 0x0000007e ret 0x0000007f mov bx, 7112h 0x00000083 nop 0x00000084 push eax 0x00000085 push edx 0x00000086 jmp 00007FBFB1286EC0h 0x0000008b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B2FAE3 second address: B2FAE7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B3748D second address: B37492 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B37623 second address: B3762A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B3762A second address: B37639 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FBFB1286EB8h 0x00000008 push eax 0x00000009 push esi 0x0000000a pop esi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B377A4 second address: B377DA instructions: 0x00000000 rdtsc 0x00000002 jp 00007FBFB0CD3E2Ch 0x00000008 jc 00007FBFB0CD3E26h 0x0000000e jc 00007FBFB0CD3E28h 0x00000014 pop edx 0x00000015 pop eax 0x00000016 push eax 0x00000017 push edx 0x00000018 jno 00007FBFB0CD3E2Ch 0x0000001e push eax 0x0000001f jmp 00007FBFB0CD3E2Dh 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B377DA second address: B377DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B37979 second address: B3797D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B3797D second address: B3798F instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FBFB1286EB6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B3798F second address: B37999 instructions: 0x00000000 rdtsc 0x00000002 js 00007FBFB0CD3E26h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B37999 second address: B3799F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B42E21 second address: B42E25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B42E25 second address: B42E29 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B42E29 second address: B42E35 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FBFB0CD3E26h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B433C0 second address: B43413 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EBFh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ecx 0x0000000c jmp 00007FBFB1286EBEh 0x00000011 pop ecx 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 jmp 00007FBFB1286EC4h 0x0000001b jmp 00007FBFB1286EC5h 0x00000020 pop eax 0x00000021 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B43413 second address: B4342C instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jbe 00007FBFB0CD3E26h 0x00000009 jmp 00007FBFB0CD3E2Bh 0x0000000e pop esi 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B4342C second address: B43432 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B43432 second address: B43436 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B43C04 second address: B43C23 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FBFB1286EC7h 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B43C23 second address: B43C29 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B43C29 second address: B43C31 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 pop eax 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B43F13 second address: B43F1B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B4569E second address: B456A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B456A4 second address: B456A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B456A8 second address: B456AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B456AE second address: B456C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 jo 00007FBFB0CD3E52h 0x0000000d jp 00007FBFB0CD3E44h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1B969 second address: B1B96F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1B96F second address: B1B9BC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b mov edi, dword ptr [ebp+122D2C38h] 0x00000011 lea eax, dword ptr [ebp+12491680h] 0x00000017 mov ecx, 30EA0692h 0x0000001c push edi 0x0000001d jmp 00007FBFB0CD3E33h 0x00000022 pop edx 0x00000023 nop 0x00000024 jmp 00007FBFB0CD3E30h 0x00000029 push eax 0x0000002a push eax 0x0000002b push edx 0x0000002c js 00007FBFB0CD3E2Ch 0x00000032 push eax 0x00000033 push edx 0x00000034 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1B9BC second address: B1B9C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1B9C0 second address: B1B9CA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 ja 00007FBFB0CD3E26h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1BABB second address: B1BABF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1C03C second address: B1C058 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push ecx 0x0000000b jmp 00007FBFB0CD3E30h 0x00000010 pop ecx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1C1EF second address: B1C1F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1C1F5 second address: B1C1F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1C1F9 second address: B1C209 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [eax] 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edi 0x0000000e pop edi 0x0000000f pop eax 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1C209 second address: B1C210 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1CB73 second address: B1CB83 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 pop ecx 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c push ebx 0x0000000d push ecx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1CB83 second address: B1CBA5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop ebx 0x00000006 mov eax, dword ptr [eax] 0x00000008 js 00007FBFB0CD3E30h 0x0000000e mov dword ptr [esp+04h], eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push edi 0x00000015 pushad 0x00000016 popad 0x00000017 pop edi 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1CC33 second address: B1CC3D instructions: 0x00000000 rdtsc 0x00000002 je 00007FBFB1286EBCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1CC3D second address: B1CC9C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push eax 0x0000000c call 00007FBFB0CD3E28h 0x00000011 pop eax 0x00000012 mov dword ptr [esp+04h], eax 0x00000016 add dword ptr [esp+04h], 00000014h 0x0000001e inc eax 0x0000001f push eax 0x00000020 ret 0x00000021 pop eax 0x00000022 ret 0x00000023 call 00007FBFB0CD3E2Bh 0x00000028 mov edi, ecx 0x0000002a pop edx 0x0000002b lea eax, dword ptr [ebp+124916C4h] 0x00000031 push 00000000h 0x00000033 push ecx 0x00000034 call 00007FBFB0CD3E28h 0x00000039 pop ecx 0x0000003a mov dword ptr [esp+04h], ecx 0x0000003e add dword ptr [esp+04h], 00000017h 0x00000046 inc ecx 0x00000047 push ecx 0x00000048 ret 0x00000049 pop ecx 0x0000004a ret 0x0000004b cmc 0x0000004c nop 0x0000004d push eax 0x0000004e push edx 0x0000004f pushad 0x00000050 push eax 0x00000051 push edx 0x00000052 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1CC9C second address: B1CCA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1CCA2 second address: B1CCA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B48BCC second address: B48BD4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B48BD4 second address: B48BEA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a ja 00007FBFB0CD3E26h 0x00000010 jns 00007FBFB0CD3E26h 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B48BEA second address: B48BEE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B48BEE second address: B48BF4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B48EB2 second address: B48EB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B48EB6 second address: B48ED3 instructions: 0x00000000 rdtsc 0x00000002 je 00007FBFB0CD3E26h 0x00000008 jl 00007FBFB0CD3E26h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FBFB0CD3E2Bh 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B4903A second address: B49040 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B49040 second address: B49045 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B49314 second address: B49318 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B49318 second address: B49326 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FBFB0CD3E26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B49326 second address: B4932A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B4932A second address: B49333 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B4949E second address: B494B6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 jl 00007FBFB1286EB6h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jne 00007FBFB1286ED0h 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B494B6 second address: B494BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B494BC second address: B494C0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B4EA24 second address: B4EA28 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B4EFB7 second address: B4EFBB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B4EFBB second address: B4EFC8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B4EFC8 second address: B4EFEA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FBFB1286EC8h 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B4EFEA second address: B4EFF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B4EFF0 second address: B4EFF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B4F70A second address: B4F710 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B4E59D second address: B4E5BD instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push edx 0x00000004 pop edx 0x00000005 pop esi 0x00000006 js 00007FBFB1286EBAh 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e pushad 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push ebx 0x00000015 jns 00007FBFB1286EB6h 0x0000001b pop ebx 0x0000001c push edi 0x0000001d pushad 0x0000001e popad 0x0000001f pop edi 0x00000020 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B5BAC5 second address: B5BACB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B5BACB second address: B5BAE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FBFB1286EC5h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B5BAE9 second address: B5BAEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B5BAEF second address: B5BB10 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 push edi 0x00000009 pushad 0x0000000a jmp 00007FBFB1286EC1h 0x0000000f push esi 0x00000010 pop esi 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B5A91E second address: B5A939 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007FBFB0CD3E31h 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B5A939 second address: B5A93D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B5A93D second address: B5A943 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B5AFDD second address: B5AFE7 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FBFB1286EB6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B5AFE7 second address: B5AFED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B5B2B0 second address: B5B2B6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B653E0 second address: B653F4 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jc 00007FBFB0CD3E26h 0x0000000e jp 00007FBFB0CD3E26h 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B653F4 second address: B653FA instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B6489A second address: B648B1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E31h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B648B1 second address: B648BB instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FBFB1286EBCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B649F3 second address: B649FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B649FB second address: B649FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B64CA6 second address: B64CBE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 ja 00007FBFB0CD3E26h 0x0000000c jnl 00007FBFB0CD3E26h 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 push ebx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B64F67 second address: B64F6B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B64F6B second address: B64F71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B64F71 second address: B64FB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnl 00007FBFB1286EC2h 0x0000000c pop ebx 0x0000000d pushad 0x0000000e jl 00007FBFB1286EBEh 0x00000014 jc 00007FBFB1286EB6h 0x0000001a push ecx 0x0000001b pop ecx 0x0000001c jmp 00007FBFB1286EC5h 0x00000021 pushad 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B64FB1 second address: B64FB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B680E0 second address: B680E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B680E4 second address: B680E8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B680E8 second address: B680FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBFB1286EBFh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B680FD second address: B68102 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B68102 second address: B68114 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FBFB1286EB6h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d pushad 0x0000000e push eax 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B68114 second address: B6811A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B6780E second address: B67812 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B6799C second address: B679AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FBFB0CD3E26h 0x0000000a jns 00007FBFB0CD3E26h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B6CA82 second address: B6CA96 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jng 00007FBFB1286EBAh 0x0000000b popad 0x0000000c push edx 0x0000000d push ebx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B6CBFE second address: B6CC0B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 je 00007FBFB0CD3E26h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B6CC0B second address: B6CC2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBFB1286EC3h 0x00000009 popad 0x0000000a jnp 00007FBFB1286EBEh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B6CEDE second address: B6CF29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBFB0CD3E37h 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b popad 0x0000000c push ebx 0x0000000d jmp 00007FBFB0CD3E36h 0x00000012 jmp 00007FBFB0CD3E35h 0x00000017 pop ebx 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B6CF29 second address: B6CF34 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jp 00007FBFB1286EB6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1C5B2 second address: B1C619 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E31h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d mov edi, eax 0x0000000f mov ebx, dword ptr [ebp+124916BFh] 0x00000015 push 00000000h 0x00000017 push esi 0x00000018 call 00007FBFB0CD3E28h 0x0000001d pop esi 0x0000001e mov dword ptr [esp+04h], esi 0x00000022 add dword ptr [esp+04h], 00000016h 0x0000002a inc esi 0x0000002b push esi 0x0000002c ret 0x0000002d pop esi 0x0000002e ret 0x0000002f mov edx, 2C68DE2Bh 0x00000034 add eax, ebx 0x00000036 call 00007FBFB0CD3E37h 0x0000003b movsx edi, bx 0x0000003e pop ecx 0x0000003f nop 0x00000040 push eax 0x00000041 push edx 0x00000042 push edi 0x00000043 push eax 0x00000044 push edx 0x00000045 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1C619 second address: B1C61E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1C61E second address: B1C628 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FBFB0CD3E2Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B1C628 second address: B1C647 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FBFB1286EC6h 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B6DDEC second address: B6DDF2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B6DDF2 second address: B6DDF8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B72F53 second address: B72F7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 jo 00007FBFB0CD3E26h 0x0000000c jmp 00007FBFB0CD3E39h 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B72F7D second address: B72F83 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B730CC second address: B730D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B730D2 second address: B730D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B730D6 second address: B730FC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E2Eh 0x00000007 jl 00007FBFB0CD3E26h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jc 00007FBFB0CD3E2Eh 0x00000015 pushad 0x00000016 popad 0x00000017 jp 00007FBFB0CD3E26h 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B730FC second address: B73114 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBFB1286EC4h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B7324A second address: B73268 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E2Ah 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jnp 00007FBFB0CD3E26h 0x00000013 jng 00007FBFB0CD3E26h 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B73268 second address: B7326E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B7326E second address: B73278 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FBFB0CD3E32h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B73278 second address: B7327E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B7327E second address: B732B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FBFB0CD3E32h 0x0000000a jnc 00007FBFB0CD3E26h 0x00000010 jnp 00007FBFB0CD3E26h 0x00000016 pop edx 0x00000017 pop eax 0x00000018 pushad 0x00000019 jmp 00007FBFB0CD3E38h 0x0000001e push eax 0x0000001f push edx 0x00000020 push ecx 0x00000021 pop ecx 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B732B3 second address: B732B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B73E1F second address: B73E25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B74707 second address: B74713 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007FBFB1286EB6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B74713 second address: B74717 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B74A2D second address: B74A31 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B74A31 second address: B74A37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B74A37 second address: B74A3C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B74A3C second address: B74A4D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ebx 0x00000007 jnp 00007FBFB0CD3E2Eh 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B74CE3 second address: B74CE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B7CF7D second address: B7CF83 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B7D0C2 second address: B7D0D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBFB1286EBCh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B7D0D2 second address: B7D0DA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B7D0DA second address: B7D0F4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EC4h 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B7D0F4 second address: B7D0F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B7D0F8 second address: B7D11E instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FBFB1286EB6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jp 00007FBFB1286ED2h 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FBFB1286EC2h 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B7D3ED second address: B7D3F1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B7D6C1 second address: B7D6CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FBFB1286EB6h 0x0000000a pop ecx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B7D821 second address: B7D839 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBFB0CD3E34h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B7D839 second address: B7D84B instructions: 0x00000000 rdtsc 0x00000002 jne 00007FBFB1286EB6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jnc 00007FBFB1286EB6h 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B7D9BA second address: B7D9BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B86937 second address: B8693D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B853B9 second address: B853BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B85642 second address: B85646 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B85646 second address: B85650 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B85650 second address: B85654 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B857F6 second address: B857FC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B857FC second address: B85800 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B84933 second address: B84947 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBFB0CD3E2Eh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B84947 second address: B84950 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B88DA2 second address: B88DB8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push esi 0x00000008 pop esi 0x00000009 jmp 00007FBFB0CD3E2Dh 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B88DB8 second address: B88DBE instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: ACF2E4 second address: ACF331 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 jmp 00007FBFB0CD3E33h 0x0000000a jo 00007FBFB0CD3E26h 0x00000010 jp 00007FBFB0CD3E26h 0x00000016 popad 0x00000017 push eax 0x00000018 jc 00007FBFB0CD3E26h 0x0000001e pop eax 0x0000001f pop edx 0x00000020 pop eax 0x00000021 push eax 0x00000022 push edx 0x00000023 pushad 0x00000024 jne 00007FBFB0CD3E26h 0x0000002a push eax 0x0000002b pop eax 0x0000002c pushad 0x0000002d popad 0x0000002e popad 0x0000002f push eax 0x00000030 push edx 0x00000031 jmp 00007FBFB0CD3E2Ch 0x00000036 pushad 0x00000037 popad 0x00000038 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: ACF331 second address: ACF339 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B9FA41 second address: B9FA45 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B9FA45 second address: B9FA67 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007FBFB1286EC4h 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B9FA67 second address: B9FA7D instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 jnl 00007FBFB0CD3E32h 0x0000000e jnc 00007FBFB0CD3E26h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B9FA7D second address: B9FACC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FBFB1286EC9h 0x0000000a jmp 00007FBFB1286EC5h 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FBFB1286EC9h 0x00000016 push eax 0x00000017 pop eax 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B9F4F6 second address: B9F4FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B9F4FA second address: B9F500 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: B9F500 second address: B9F51F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FBFB0CD3E39h 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: ACA1DD second address: ACA20B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 jmp 00007FBFB1286EC3h 0x0000000d jng 00007FBFB1286EB6h 0x00000013 popad 0x00000014 je 00007FBFB1286EB8h 0x0000001a push ebx 0x0000001b pop ebx 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: ACA20B second address: ACA223 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBFB0CD3E34h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: ACA223 second address: ACA227 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: BB3B2A second address: BB3B43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBFB0CD3E35h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: BB3B43 second address: BB3B4B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: BB7D7B second address: BB7D7F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: BB7D7F second address: BB7D8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push edx 0x00000008 pop edx 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: BB7D8D second address: BB7D91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: BB7D91 second address: BB7D95 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: BB8097 second address: BB809B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: BB809B second address: BB80B7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FBFB1286EC2h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: BB80B7 second address: BB80BB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: BB80BB second address: BB80E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jp 00007FBFB1286EB6h 0x0000000e jmp 00007FBFB1286EC8h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: BBC611 second address: BBC62A instructions: 0x00000000 rdtsc 0x00000002 jng 00007FBFB0CD3E2Eh 0x00000008 pushad 0x00000009 jo 00007FBFB0CD3E26h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: BCB329 second address: BCB338 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jne 00007FBFB1286EB6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: BD6805 second address: BD6809 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: BD6809 second address: BD680D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: BD680D second address: BD681F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jbe 00007FBFB0CD3E2Eh 0x0000000e push eax 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: BE28CB second address: BE28FA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EC7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FBFB1286EC1h 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: BE28FA second address: BE2927 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBFB0CD3E33h 0x00000009 jmp 00007FBFB0CD3E36h 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: BE2927 second address: BE292B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: C08E9D second address: C08EA3 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: C09101 second address: C09114 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBFB1286EBFh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: C09114 second address: C09118 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: C0929A second address: C0929F instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: C09A62 second address: C09AA6 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jl 00007FBFB0CD3E26h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007FBFB0CD3E36h 0x00000011 popad 0x00000012 pushad 0x00000013 jg 00007FBFB0CD3E3Ch 0x00000019 jmp 00007FBFB0CD3E36h 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: C09AA6 second address: C09AAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: C09AAC second address: C09AB0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: C0F2C8 second address: C0F2DF instructions: 0x00000000 rdtsc 0x00000002 jc 00007FBFB1286EBCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edi 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: C0F8DA second address: C0F8E1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: C10CE7 second address: C10CF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FBFB1286EB6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: C10CF1 second address: C10CF5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52F0723 second address: 52F0760 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FBFB1286EC7h 0x00000009 and eax, 2224C43Eh 0x0000000f jmp 00007FBFB1286EC9h 0x00000014 popfd 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52F0760 second address: 52F0773 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b mov di, cx 0x0000000e mov ax, C19Bh 0x00000012 popad 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52F0773 second address: 52F0783 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBFB1286EBCh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52F0783 second address: 52F07A9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E2Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FBFB0CD3E30h 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52F07A9 second address: 52F07B8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EBBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52F07B8 second address: 52F07E5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov di, B86Ah 0x00000007 mov bx, F136h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov ebp, esp 0x00000010 jmp 00007FBFB0CD3E2Dh 0x00000015 pop ebp 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007FBFB0CD3E2Dh 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52B0CA8 second address: 52B0CB7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EBBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52B0CB7 second address: 52B0CBD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52B0CBD second address: 52B0D02 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EBBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], ebp 0x0000000e jmp 00007FBFB1286EC6h 0x00000013 mov ebp, esp 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FBFB1286EC7h 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52B0D02 second address: 52B0D08 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52B0D08 second address: 52B0D0C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52B0D0C second address: 52B0D24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push dword ptr [ebp+04h] 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e mov esi, 16DC2C1Fh 0x00000013 mov ax, 6B3Bh 0x00000017 popad 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52B0D24 second address: 52B0D2A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52B0D2A second address: 52B0D4C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push dword ptr [ebp+0Ch] 0x0000000b jmp 00007FBFB0CD3E2Fh 0x00000010 push dword ptr [ebp+08h] 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 mov ebx, eax 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52B0DBA second address: 52B0DC9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EBBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5330442 second address: 5330446 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5330446 second address: 533044C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 533044C second address: 533049D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E34h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov cx, bx 0x00000010 pushfd 0x00000011 jmp 00007FBFB0CD3E39h 0x00000016 add cx, 78C6h 0x0000001b jmp 00007FBFB0CD3E31h 0x00000020 popfd 0x00000021 popad 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 533049D second address: 53304C1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EC1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FBFB1286EBCh 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53304C1 second address: 53304D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBFB0CD3E2Eh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53304D3 second address: 5330503 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EBBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c jmp 00007FBFB1286EC6h 0x00000011 mov ebp, esp 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 push ecx 0x00000017 pop edx 0x00000018 popad 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5300B69 second address: 5300B8C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movzx esi, di 0x00000006 mov ax, bx 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c xchg eax, ebp 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FBFB0CD3E34h 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5300B8C second address: 5300B92 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5350012 second address: 535004B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushfd 0x00000006 jmp 00007FBFB0CD3E31h 0x0000000b and eax, 6A2D2856h 0x00000011 jmp 00007FBFB0CD3E31h 0x00000016 popfd 0x00000017 popad 0x00000018 mov dword ptr [esp], ebp 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 535004B second address: 5350051 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5350051 second address: 535008C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FBFB0CD3E30h 0x00000008 pop ecx 0x00000009 mov ebx, 68E3CC66h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 mov ebp, esp 0x00000013 jmp 00007FBFB0CD3E2Dh 0x00000018 pop ebp 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007FBFB0CD3E2Dh 0x00000020 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 535008C second address: 5350092 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5330C6B second address: 5330C95 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007FBFB0CD3E2Eh 0x0000000a jmp 00007FBFB0CD3E35h 0x0000000f popfd 0x00000010 popad 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5330C95 second address: 5330CA5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBFB1286EBCh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5330CA5 second address: 5330CD4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E2Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c jmp 00007FBFB0CD3E36h 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5330CD4 second address: 5330CD8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5330CD8 second address: 5330CDE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5330CDE second address: 5330D41 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FBFB1286EC5h 0x00000008 pop eax 0x00000009 pushfd 0x0000000a jmp 00007FBFB1286EC1h 0x0000000f xor esi, 0AB4A886h 0x00000015 jmp 00007FBFB1286EC1h 0x0000001a popfd 0x0000001b popad 0x0000001c pop edx 0x0000001d pop eax 0x0000001e xchg eax, ebp 0x0000001f push eax 0x00000020 push edx 0x00000021 push eax 0x00000022 push edx 0x00000023 jmp 00007FBFB1286EC8h 0x00000028 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5330D41 second address: 5330D47 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52C0315 second address: 52C032D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBFB1286EC4h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5330AA5 second address: 5330B2C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E2Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007FBFB0CD3E2Ch 0x00000012 and esi, 3CF04D28h 0x00000018 jmp 00007FBFB0CD3E2Bh 0x0000001d popfd 0x0000001e mov si, 821Fh 0x00000022 popad 0x00000023 mov eax, dword ptr [ebp+08h] 0x00000026 pushad 0x00000027 pushfd 0x00000028 jmp 00007FBFB0CD3E30h 0x0000002d adc ch, FFFFFF88h 0x00000030 jmp 00007FBFB0CD3E2Bh 0x00000035 popfd 0x00000036 call 00007FBFB0CD3E38h 0x0000003b pushad 0x0000003c popad 0x0000003d pop ecx 0x0000003e popad 0x0000003f and dword ptr [eax], 00000000h 0x00000042 push eax 0x00000043 push edx 0x00000044 jmp 00007FBFB0CD3E2Ah 0x00000049 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5330B2C second address: 5330B56 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EBBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 and dword ptr [eax+04h], 00000000h 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FBFB1286EC5h 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5330B56 second address: 5330B76 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E31h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a pushad 0x0000000b mov ecx, 16FBEC43h 0x00000010 push eax 0x00000011 push edx 0x00000012 mov edx, ecx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5330DBD second address: 5330DCC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov edi, ecx 0x00000007 popad 0x00000008 push eax 0x00000009 pushad 0x0000000a mov al, dh 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5330DCC second address: 5330E3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 popad 0x00000006 xchg eax, ebp 0x00000007 pushad 0x00000008 jmp 00007FBFB0CD3E32h 0x0000000d pushfd 0x0000000e jmp 00007FBFB0CD3E32h 0x00000013 sbb ch, 00000008h 0x00000016 jmp 00007FBFB0CD3E2Bh 0x0000001b popfd 0x0000001c popad 0x0000001d mov ebp, esp 0x0000001f jmp 00007FBFB0CD3E36h 0x00000024 pop ebp 0x00000025 push eax 0x00000026 push edx 0x00000027 jmp 00007FBFB0CD3E37h 0x0000002c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5330E3B second address: 5330E41 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5340AE2 second address: 5340B31 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E39h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test eax, eax 0x0000000b pushad 0x0000000c mov al, 93h 0x0000000e mov ecx, edi 0x00000010 popad 0x00000011 je 00007FC0228B6C85h 0x00000017 jmp 00007FBFB0CD3E2Bh 0x0000001c mov ecx, eax 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007FBFB0CD3E35h 0x00000025 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5340B31 second address: 5340BB9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, di 0x00000006 pushfd 0x00000007 jmp 00007FBFB1286EC3h 0x0000000c xor eax, 36E1CB9Eh 0x00000012 jmp 00007FBFB1286EC9h 0x00000017 popfd 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b xor eax, dword ptr [ebp+08h] 0x0000001e pushad 0x0000001f call 00007FBFB1286EBDh 0x00000024 movzx esi, di 0x00000027 pop ebx 0x00000028 movzx esi, dx 0x0000002b popad 0x0000002c and ecx, 1Fh 0x0000002f jmp 00007FBFB1286EC5h 0x00000034 ror eax, cl 0x00000036 jmp 00007FBFB1286EBEh 0x0000003b leave 0x0000003c push eax 0x0000003d push edx 0x0000003e pushad 0x0000003f mov ecx, edx 0x00000041 movsx edx, si 0x00000044 popad 0x00000045 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53400F8 second address: 5340179 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dx, 22D4h 0x00000007 mov esi, ebx 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c and dword ptr [eax], 00000000h 0x0000000f pushad 0x00000010 push ebx 0x00000011 pushfd 0x00000012 jmp 00007FBFB0CD3E30h 0x00000017 or si, 1E88h 0x0000001c jmp 00007FBFB0CD3E2Bh 0x00000021 popfd 0x00000022 pop eax 0x00000023 pushfd 0x00000024 jmp 00007FBFB0CD3E39h 0x00000029 and ah, FFFFFFA6h 0x0000002c jmp 00007FBFB0CD3E31h 0x00000031 popfd 0x00000032 popad 0x00000033 pop ebp 0x00000034 push eax 0x00000035 push edx 0x00000036 push eax 0x00000037 push edx 0x00000038 jmp 00007FBFB0CD3E38h 0x0000003d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5340179 second address: 534017F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 534017F second address: 5340185 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5340185 second address: 5340189 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5300018 second address: 530001E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 530001E second address: 5300022 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5300022 second address: 5300026 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5300026 second address: 5300045 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebp 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FBFB1286EC2h 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5300045 second address: 530004A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 530004A second address: 5300096 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007FBFB1286EC7h 0x0000000a xor ecx, 50F91C0Eh 0x00000010 jmp 00007FBFB1286EC9h 0x00000015 popfd 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 mov ebp, esp 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e mov bx, B96Eh 0x00000022 movsx edi, si 0x00000025 popad 0x00000026 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5300096 second address: 530009C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 530009C second address: 53000A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53000A0 second address: 53000D8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 and esp, FFFFFFF8h 0x0000000b jmp 00007FBFB0CD3E2Fh 0x00000010 xchg eax, ecx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 push ebx 0x00000015 pop eax 0x00000016 jmp 00007FBFB0CD3E37h 0x0000001b popad 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53000D8 second address: 5300113 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FBFB1286EBFh 0x00000008 pop eax 0x00000009 jmp 00007FBFB1286EC9h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 pushad 0x00000013 mov edi, 329360F2h 0x00000018 pushad 0x00000019 push ebx 0x0000001a pop ecx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5300113 second address: 5300128 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 xchg eax, ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FBFB0CD3E2Ch 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5300128 second address: 5300146 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bh, D8h 0x00000005 mov ch, D9h 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ebp 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FBFB1286EC1h 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 530024A second address: 5300297 instructions: 0x00000000 rdtsc 0x00000002 mov dx, 1238h 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 push eax 0x0000000a pushad 0x0000000b movsx ebx, ax 0x0000000e popad 0x0000000f xchg eax, edi 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 pushfd 0x00000014 jmp 00007FBFB0CD3E37h 0x00000019 and cx, 04AEh 0x0000001e jmp 00007FBFB0CD3E39h 0x00000023 popfd 0x00000024 mov ebx, esi 0x00000026 popad 0x00000027 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5300297 second address: 530032A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, 06A9720Eh 0x00000008 movsx edi, ax 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e test esi, esi 0x00000010 pushad 0x00000011 pushfd 0x00000012 jmp 00007FBFB1286EBCh 0x00000017 jmp 00007FBFB1286EC5h 0x0000001c popfd 0x0000001d mov ecx, 796DE807h 0x00000022 popad 0x00000023 je 00007FC022EA51FAh 0x00000029 jmp 00007FBFB1286EBAh 0x0000002e cmp dword ptr [esi+08h], DDEEDDEEh 0x00000035 jmp 00007FBFB1286EC0h 0x0000003a je 00007FC022EA51E9h 0x00000040 jmp 00007FBFB1286EC0h 0x00000045 mov edx, dword ptr [esi+44h] 0x00000048 push eax 0x00000049 push edx 0x0000004a jmp 00007FBFB1286EC7h 0x0000004f rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 530032A second address: 530037A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov si, bx 0x00000006 jmp 00007FBFB0CD3E2Bh 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e or edx, dword ptr [ebp+0Ch] 0x00000011 pushad 0x00000012 mov dh, ah 0x00000014 pushfd 0x00000015 jmp 00007FBFB0CD3E31h 0x0000001a xor cx, 4916h 0x0000001f jmp 00007FBFB0CD3E31h 0x00000024 popfd 0x00000025 popad 0x00000026 test edx, 61000000h 0x0000002c push eax 0x0000002d push edx 0x0000002e push eax 0x0000002f push edx 0x00000030 push eax 0x00000031 push edx 0x00000032 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 530037A second address: 530037E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 530037E second address: 5300382 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5300382 second address: 5300388 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5300388 second address: 53003D1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E32h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jne 00007FC0228F2110h 0x0000000f jmp 00007FBFB0CD3E30h 0x00000014 test byte ptr [esi+48h], 00000001h 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007FBFB0CD3E37h 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 531004C second address: 53100B9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EC9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], ebp 0x0000000c jmp 00007FBFB1286EBEh 0x00000011 mov ebp, esp 0x00000013 jmp 00007FBFB1286EC0h 0x00000018 and esp, FFFFFFF8h 0x0000001b jmp 00007FBFB1286EC0h 0x00000020 xchg eax, ebx 0x00000021 push eax 0x00000022 push edx 0x00000023 jmp 00007FBFB1286EC7h 0x00000028 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53100B9 second address: 53100D1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBFB0CD3E34h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53100D1 second address: 53100F1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a jmp 00007FBFB1286EBCh 0x0000000f mov edx, ecx 0x00000011 popad 0x00000012 xchg eax, ebx 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53100F1 second address: 53100F7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53100F7 second address: 531012E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, 962Dh 0x00000007 jmp 00007FBFB1286EBAh 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f xchg eax, esi 0x00000010 jmp 00007FBFB1286EC0h 0x00000015 push eax 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007FBFB1286EBDh 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 531012E second address: 5310143 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E31h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5310143 second address: 5310193 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EC1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007FBFB1286EBCh 0x00000011 sub cx, C6B8h 0x00000016 jmp 00007FBFB1286EBBh 0x0000001b popfd 0x0000001c mov si, BEEFh 0x00000020 popad 0x00000021 mov esi, dword ptr [ebp+08h] 0x00000024 push eax 0x00000025 push edx 0x00000026 jmp 00007FBFB1286EC1h 0x0000002b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5310193 second address: 53101EA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov si, dx 0x00000006 mov cx, dx 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov ebx, 00000000h 0x00000011 jmp 00007FBFB0CD3E32h 0x00000016 test esi, esi 0x00000018 pushad 0x00000019 pushfd 0x0000001a jmp 00007FBFB0CD3E2Eh 0x0000001f and ecx, 23E222A8h 0x00000025 jmp 00007FBFB0CD3E2Bh 0x0000002a popfd 0x0000002b movzx esi, bx 0x0000002e popad 0x0000002f je 00007FC0228D9FD6h 0x00000035 push eax 0x00000036 push edx 0x00000037 push eax 0x00000038 push edx 0x00000039 pushad 0x0000003a popad 0x0000003b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53101EA second address: 5310206 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EC8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5310206 second address: 5310266 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E2Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 cmp dword ptr [esi+08h], DDEEDDEEh 0x00000010 jmp 00007FBFB0CD3E36h 0x00000015 mov ecx, esi 0x00000017 pushad 0x00000018 pushfd 0x00000019 jmp 00007FBFB0CD3E2Eh 0x0000001e sbb ax, 09C8h 0x00000023 jmp 00007FBFB0CD3E2Bh 0x00000028 popfd 0x00000029 mov ch, E3h 0x0000002b popad 0x0000002c je 00007FC0228D9F71h 0x00000032 pushad 0x00000033 mov cx, dx 0x00000036 push eax 0x00000037 push edx 0x00000038 push edx 0x00000039 pop ecx 0x0000003a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5310266 second address: 531028C instructions: 0x00000000 rdtsc 0x00000002 mov si, bx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 test byte ptr [76FA6968h], 00000002h 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FBFB1286EC3h 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 531028C second address: 5310290 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5310290 second address: 5310296 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5310296 second address: 53102CD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E34h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jne 00007FC0228D9F2Eh 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FBFB0CD3E37h 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53102CD second address: 53102D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53102D3 second address: 53102D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53103E7 second address: 53103EB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53103EB second address: 53103F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5310466 second address: 5310483 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 popad 0x00000006 pop esi 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FBFB1286EC4h 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5310483 second address: 53104D5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E2Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d call 00007FBFB0CD3E2Bh 0x00000012 pop eax 0x00000013 pushfd 0x00000014 jmp 00007FBFB0CD3E39h 0x00000019 xor ecx, 65EBD636h 0x0000001f jmp 00007FBFB0CD3E31h 0x00000024 popfd 0x00000025 popad 0x00000026 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53104D5 second address: 5310521 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop ecx 0x00000005 pushfd 0x00000006 jmp 00007FBFB1286EC3h 0x0000000b add si, 136Eh 0x00000010 jmp 00007FBFB1286EC9h 0x00000015 popfd 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 mov esp, ebp 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007FBFB1286EBDh 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 536182A second address: 536188B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FBFB0CD3E37h 0x00000008 call 00007FBFB0CD3E38h 0x0000000d pop eax 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 jmp 00007FBFB0CD3E30h 0x00000017 xchg eax, ebp 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007FBFB0CD3E37h 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 536188B second address: 53618E5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EC9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c jmp 00007FBFB1286EBCh 0x00000011 pushfd 0x00000012 jmp 00007FBFB1286EC2h 0x00000017 or ecx, 19F4B028h 0x0000001d jmp 00007FBFB1286EBBh 0x00000022 popfd 0x00000023 popad 0x00000024 push 0000007Fh 0x00000026 push eax 0x00000027 push edx 0x00000028 push eax 0x00000029 push edx 0x0000002a push eax 0x0000002b push edx 0x0000002c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53618E5 second address: 53618E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53618E9 second address: 53618ED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53618ED second address: 53618F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53618F3 second address: 5361910 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBFB1286EC9h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5361910 second address: 536192F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E31h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push 00000001h 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 536192F second address: 5361933 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5361933 second address: 5361937 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5361937 second address: 536193D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 536193D second address: 5361943 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 533078A second address: 53307C9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EC9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FBFB1286EBEh 0x0000000f push eax 0x00000010 jmp 00007FBFB1286EBBh 0x00000015 xchg eax, ebp 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53307C9 second address: 53307CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53307CD second address: 53307E8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EC7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53307E8 second address: 5330812 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov eax, edi 0x00000005 call 00007FBFB0CD3E2Bh 0x0000000a pop ecx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov ebp, esp 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FBFB0CD3E32h 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5330812 second address: 5330824 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBFB1286EBEh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5330824 second address: 533084D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E2Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FBFB0CD3E35h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5310605 second address: 531060B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 531060B second address: 5310629 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E33h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5310629 second address: 531062F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 531062F second address: 5310635 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5310635 second address: 5310639 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5370D23 second address: 5370D6F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FBFB0CD3E31h 0x00000009 and cx, 16E6h 0x0000000e jmp 00007FBFB0CD3E31h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 push esp 0x00000018 pushad 0x00000019 mov eax, 5C89C00Fh 0x0000001e mov di, ax 0x00000021 popad 0x00000022 mov dword ptr [esp], ebp 0x00000025 push eax 0x00000026 push edx 0x00000027 jmp 00007FBFB0CD3E2Dh 0x0000002c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5340502 second address: 5340506 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5340506 second address: 5340516 instructions: 0x00000000 rdtsc 0x00000002 mov dx, si 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 sub esp, 44h 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5340516 second address: 5340521 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 mov bx, si 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5340521 second address: 5340562 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FBFB0CD3E2Eh 0x00000008 adc cl, FFFFFFD8h 0x0000000b jmp 00007FBFB0CD3E2Bh 0x00000010 popfd 0x00000011 pop edx 0x00000012 pop eax 0x00000013 popad 0x00000014 xchg eax, ebx 0x00000015 pushad 0x00000016 push ecx 0x00000017 pushad 0x00000018 popad 0x00000019 pop ebx 0x0000001a jmp 00007FBFB0CD3E2Eh 0x0000001f popad 0x00000020 push eax 0x00000021 push eax 0x00000022 push edx 0x00000023 pushad 0x00000024 movzx ecx, bx 0x00000027 push eax 0x00000028 push edx 0x00000029 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5340562 second address: 5340567 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5340567 second address: 53405C7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, ecx 0x00000005 push eax 0x00000006 pop ebx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xchg eax, ebx 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007FBFB0CD3E36h 0x00000012 adc esi, 4559B5C8h 0x00000018 jmp 00007FBFB0CD3E2Bh 0x0000001d popfd 0x0000001e push eax 0x0000001f push edx 0x00000020 pushfd 0x00000021 jmp 00007FBFB0CD3E36h 0x00000026 or ecx, 1A83B828h 0x0000002c jmp 00007FBFB0CD3E2Bh 0x00000031 popfd 0x00000032 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53405C7 second address: 5340675 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EC8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a xchg eax, esi 0x0000000b jmp 00007FBFB1286EC0h 0x00000010 push eax 0x00000011 pushad 0x00000012 pushfd 0x00000013 jmp 00007FBFB1286EC1h 0x00000018 xor ax, B1A6h 0x0000001d jmp 00007FBFB1286EC1h 0x00000022 popfd 0x00000023 pushfd 0x00000024 jmp 00007FBFB1286EC0h 0x00000029 or esi, 1D05DF48h 0x0000002f jmp 00007FBFB1286EBBh 0x00000034 popfd 0x00000035 popad 0x00000036 xchg eax, esi 0x00000037 jmp 00007FBFB1286EC6h 0x0000003c xchg eax, edi 0x0000003d jmp 00007FBFB1286EC0h 0x00000042 push eax 0x00000043 pushad 0x00000044 mov eax, ebx 0x00000046 push eax 0x00000047 push edx 0x00000048 movsx edx, cx 0x0000004b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5340675 second address: 534069A instructions: 0x00000000 rdtsc 0x00000002 mov bx, ax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 xchg eax, edi 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FBFB0CD3E38h 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 534069A second address: 534069E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 534069E second address: 53406A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53406A4 second address: 534071B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushfd 0x00000006 jmp 00007FBFB1286EBAh 0x0000000b add esi, 1B680998h 0x00000011 jmp 00007FBFB1286EBBh 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a mov edi, dword ptr [ebp+08h] 0x0000001d jmp 00007FBFB1286EC6h 0x00000022 mov dword ptr [esp+24h], 00000000h 0x0000002a jmp 00007FBFB1286EC0h 0x0000002f lock bts dword ptr [edi], 00000000h 0x00000034 jmp 00007FBFB1286EC0h 0x00000039 jc 00007FC022E08BDAh 0x0000003f push eax 0x00000040 push edx 0x00000041 push eax 0x00000042 push edx 0x00000043 pushad 0x00000044 popad 0x00000045 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 534071B second address: 5340721 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5340721 second address: 5340756 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FBFB1286EC2h 0x00000009 xor eax, 7C2E98B8h 0x0000000f jmp 00007FBFB1286EBBh 0x00000014 popfd 0x00000015 mov dx, si 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b pop edi 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 popad 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5340756 second address: 534076D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E33h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 534076D second address: 5340773 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5340773 second address: 5340788 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop esi 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FBFB0CD3E2Ah 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 534019C second address: 53401A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53401A0 second address: 53401A4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53401A4 second address: 53401AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53401AA second address: 53401B0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53401B0 second address: 53401B4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53401B4 second address: 534022F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 jmp 00007FBFB0CD3E2Eh 0x0000000e push eax 0x0000000f pushad 0x00000010 mov al, bl 0x00000012 pushad 0x00000013 pushfd 0x00000014 jmp 00007FBFB0CD3E38h 0x00000019 xor esi, 3916EA68h 0x0000001f jmp 00007FBFB0CD3E2Bh 0x00000024 popfd 0x00000025 jmp 00007FBFB0CD3E38h 0x0000002a popad 0x0000002b popad 0x0000002c xchg eax, ebp 0x0000002d push eax 0x0000002e push edx 0x0000002f jmp 00007FBFB0CD3E37h 0x00000034 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 534022F second address: 534024F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov al, bl 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a pushad 0x0000000b call 00007FBFB1286EC3h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 534024F second address: 534026E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jmp 00007FBFB0CD3E2Fh 0x0000000a popad 0x0000000b xchg eax, ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push ebx 0x00000010 pop eax 0x00000011 movsx edi, si 0x00000014 popad 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 534026E second address: 5340286 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBFB1286EC4h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5340286 second address: 53402DC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E2Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007FBFB0CD3E2Fh 0x00000013 or eax, 576D23DEh 0x00000019 jmp 00007FBFB0CD3E39h 0x0000001e popfd 0x0000001f push esi 0x00000020 mov bx, BFF2h 0x00000024 pop edx 0x00000025 popad 0x00000026 xchg eax, ebx 0x00000027 push eax 0x00000028 push edx 0x00000029 pushad 0x0000002a mov edi, 6A29E216h 0x0000002f mov bl, 09h 0x00000031 popad 0x00000032 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53402DC second address: 5340301 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, 50772AFAh 0x00000008 call 00007FBFB1286EBBh 0x0000000d pop ecx 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push ebp 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FBFB1286EBBh 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5340301 second address: 5340330 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E39h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], esi 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FBFB0CD3E2Dh 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5340330 second address: 5340379 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EC1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov esi, dword ptr [ebp+08h] 0x0000000c pushad 0x0000000d mov eax, 783DB1D3h 0x00000012 mov eax, 42A7982Fh 0x00000017 popad 0x00000018 sub ecx, ecx 0x0000001a pushad 0x0000001b movsx ebx, ax 0x0000001e mov ch, F1h 0x00000020 popad 0x00000021 push esp 0x00000022 jmp 00007FBFB1286EC2h 0x00000027 mov dword ptr [esp], edi 0x0000002a push eax 0x0000002b push edx 0x0000002c push eax 0x0000002d push edx 0x0000002e push eax 0x0000002f push edx 0x00000030 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5340379 second address: 534037D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 534037D second address: 5340381 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5340381 second address: 5340387 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5340387 second address: 53403BE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EC4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, 00000001h 0x0000000e jmp 00007FBFB1286EC0h 0x00000013 lock cmpxchg dword ptr [esi], ecx 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53403BE second address: 53403C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53403C2 second address: 53403C6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53403C6 second address: 53403CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53403CC second address: 53403D2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53403D2 second address: 53403D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53403D6 second address: 53403E9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ecx, eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push edi 0x0000000e pop eax 0x0000000f movsx edx, ax 0x00000012 popad 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53403E9 second address: 5340405 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBFB0CD3E38h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5340405 second address: 5340420 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EBBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b cmp ecx, 01h 0x0000000e pushad 0x0000000f mov di, ax 0x00000012 push eax 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5340420 second address: 5340437 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 jne 00007FC022855FCEh 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 mov edi, 590CEE76h 0x00000016 popad 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5340437 second address: 534043D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 534043D second address: 5340441 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5340441 second address: 5340461 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edi 0x00000009 jmp 00007FBFB1286EC2h 0x0000000e pop esi 0x0000000f pushad 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5340461 second address: 5340470 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a mov al, 28h 0x0000000c mov al, dh 0x0000000e popad 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52A0636 second address: 52A063B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52A063B second address: 52A066E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E37h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FBFB0CD3E35h 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52A066E second address: 52A06A7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EC1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007FBFB1286EBAh 0x00000013 add ecx, 10F058D8h 0x00000019 jmp 00007FBFB1286EBBh 0x0000001e popfd 0x0000001f pushad 0x00000020 popad 0x00000021 popad 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52A06A7 second address: 52A06C4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, di 0x00000006 mov bh, 3Ch 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FBFB0CD3E2Fh 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52A06C4 second address: 52A06DC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBFB1286EC4h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52A06DC second address: 52A0703 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E2Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 jmp 00007FBFB0CD3E2Bh 0x00000015 mov esi, 0837B23Fh 0x0000001a popad 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52A0703 second address: 52A0748 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EC5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub esp, 10h 0x0000000c pushad 0x0000000d mov bh, al 0x0000000f push eax 0x00000010 push edx 0x00000011 pushfd 0x00000012 jmp 00007FBFB1286EBFh 0x00000017 jmp 00007FBFB1286EC3h 0x0000001c popfd 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52A0748 second address: 52A075C instructions: 0x00000000 rdtsc 0x00000002 mov bx, si 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 lea eax, dword ptr [ebp-10h] 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e movsx edx, si 0x00000011 push eax 0x00000012 pop edx 0x00000013 popad 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52A075C second address: 52A0762 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52A0762 second address: 52A0766 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52A0766 second address: 52A07A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push dword ptr [ebp+08h] 0x0000000b jmp 00007FBFB1286EC3h 0x00000010 nop 0x00000011 jmp 00007FBFB1286EC6h 0x00000016 push eax 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c popad 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52A07A2 second address: 52A07A8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52A0834 second address: 52A08F5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EBBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a jmp 00007FBFB1286EC6h 0x0000000f push dword ptr [ebp+0Ch] 0x00000012 pushad 0x00000013 call 00007FBFB1286EBEh 0x00000018 mov edx, eax 0x0000001a pop esi 0x0000001b mov edi, 3A349E82h 0x00000020 popad 0x00000021 lea eax, dword ptr [ebp-08h] 0x00000024 pushad 0x00000025 pushfd 0x00000026 jmp 00007FBFB1286EBFh 0x0000002b adc ecx, 2F2E597Eh 0x00000031 jmp 00007FBFB1286EC9h 0x00000036 popfd 0x00000037 pushfd 0x00000038 jmp 00007FBFB1286EC0h 0x0000003d sbb esi, 6FE86478h 0x00000043 jmp 00007FBFB1286EBBh 0x00000048 popfd 0x00000049 popad 0x0000004a nop 0x0000004b jmp 00007FBFB1286EC6h 0x00000050 push eax 0x00000051 push eax 0x00000052 push edx 0x00000053 jmp 00007FBFB1286EBEh 0x00000058 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5361E6F second address: 5361E73 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5361E73 second address: 5361E79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5370E9C second address: 5370ECB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FBFB0CD3E31h 0x00000009 sub ecx, 18438356h 0x0000000f jmp 00007FBFB0CD3E31h 0x00000014 popfd 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5370ECB second address: 5370EEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 xchg eax, ebp 0x00000008 pushad 0x00000009 mov ch, 7Bh 0x0000000b mov ebx, 47A5F3EAh 0x00000010 popad 0x00000011 mov ebp, esp 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FBFB1286EBCh 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5370EEC second address: 5370F03 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E2Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov bx, si 0x00000010 popad 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 528014D second address: 5280189 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, di 0x00000006 pushfd 0x00000007 jmp 00007FBFB1286EBBh 0x0000000c sbb eax, 6EFB6C2Eh 0x00000012 jmp 00007FBFB1286EC9h 0x00000017 popfd 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b xchg eax, ebp 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5280189 second address: 528018D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 528018D second address: 52801A0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EBFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52801A0 second address: 52801B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBFB0CD3E34h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52801B8 second address: 52801BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52801BC second address: 52801D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a mov ebx, ecx 0x0000000c mov ecx, 7328C27Fh 0x00000011 popad 0x00000012 xchg eax, ebp 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52801D5 second address: 52801DB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52801DB second address: 5280213 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E36h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b jmp 00007FBFB0CD3E30h 0x00000010 pop ebp 0x00000011 pushad 0x00000012 mov eax, 4998A69Dh 0x00000017 pushad 0x00000018 mov edi, eax 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52A0B89 second address: 52A0B8F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52A0B8F second address: 52A0BE2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a jmp 00007FBFB0CD3E2Ah 0x0000000f pushfd 0x00000010 jmp 00007FBFB0CD3E32h 0x00000015 adc si, E8C8h 0x0000001a jmp 00007FBFB0CD3E2Bh 0x0000001f popfd 0x00000020 popad 0x00000021 mov dword ptr [esp], ebp 0x00000024 push eax 0x00000025 push edx 0x00000026 jmp 00007FBFB0CD3E35h 0x0000002b rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52A0BE2 second address: 52A0C3F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FBFB1286EC7h 0x00000009 and ax, 546Eh 0x0000000e jmp 00007FBFB1286EC9h 0x00000013 popfd 0x00000014 mov dx, cx 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a mov ebp, esp 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007FBFB1286EC9h 0x00000023 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52A0C3F second address: 52A0C45 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52A0C45 second address: 52A0C49 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52A0C49 second address: 52A0C66 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FBFB0CD3E32h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52D0827 second address: 52D0850 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FBFB1286EBEh 0x00000008 or si, 27F8h 0x0000000d jmp 00007FBFB1286EBBh 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 mov bx, si 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52D0850 second address: 52D0863 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov ebp, esp 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FBFB0CD3E2Ah 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52D0863 second address: 52D0869 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 52D0869 second address: 52D086D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5370B25 second address: 5370B3A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EC1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5370523 second address: 5370540 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB0CD3E39h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5370540 second address: 537058D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBFB1286EC1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 add dword ptr [esp], 4D6D850Bh 0x00000010 pushad 0x00000011 mov ecx, 59A4F243h 0x00000016 mov ax, 6F9Fh 0x0000001a popad 0x0000001b call 00007FBFB1286EB9h 0x00000020 jmp 00007FBFB1286EC2h 0x00000025 push eax 0x00000026 pushad 0x00000027 mov edi, 19257BB4h 0x0000002c push eax 0x0000002d push edx 0x0000002e push ebx 0x0000002f pop esi 0x00000030 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 537058D second address: 53705CA instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b pushad 0x0000000c mov bx, cx 0x0000000f mov ebx, esi 0x00000011 popad 0x00000012 mov eax, dword ptr [eax] 0x00000014 jmp 00007FBFB0CD3E2Fh 0x00000019 mov dword ptr [esp+04h], eax 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007FBFB0CD3E34h 0x00000024 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53705CA second address: 53705F8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FBFB1286EC1h 0x00000009 and si, 7236h 0x0000000e jmp 00007FBFB1286EC1h 0x00000013 popfd 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 53705F8 second address: 5370664 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pop eax 0x00000008 pushad 0x00000009 pushfd 0x0000000a jmp 00007FBFB0CD3E2Ah 0x0000000f sub si, 3158h 0x00000014 jmp 00007FBFB0CD3E2Bh 0x00000019 popfd 0x0000001a pushfd 0x0000001b jmp 00007FBFB0CD3E38h 0x00000020 and ax, 3BB8h 0x00000025 jmp 00007FBFB0CD3E2Bh 0x0000002a popfd 0x0000002b popad 0x0000002c call 00007FC0209FA168h 0x00000031 push 75094FB0h 0x00000036 push dword ptr fs:[00000000h] 0x0000003d mov eax, dword ptr [esp+10h] 0x00000041 mov dword ptr [esp+10h], ebp 0x00000045 lea ebp, dword ptr [esp+10h] 0x00000049 sub esp, eax 0x0000004b push ebx 0x0000004c push esi 0x0000004d push edi 0x0000004e mov eax, dword ptr [750DA500h] 0x00000053 xor dword ptr [ebp-04h], eax 0x00000056 xor eax, ebp 0x00000058 mov dword ptr [ebp-1Ch], eax 0x0000005b push eax 0x0000005c mov dword ptr [ebp-18h], esp 0x0000005f push dword ptr [ebp-08h] 0x00000062 mov eax, dword ptr [ebp-04h] 0x00000065 mov dword ptr [ebp-04h], FFFFFFFEh 0x0000006c mov dword ptr [ebp-08h], eax 0x0000006f lea eax, dword ptr [ebp-10h] 0x00000072 mov dword ptr fs:[00000000h], eax 0x00000078 ret 0x00000079 push eax 0x0000007a push edx 0x0000007b jmp 00007FBFB0CD3E35h 0x00000080 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 5370664 second address: 537066A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 537066A second address: 537066E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeRDTSC instruction interceptor: First address: 537066E second address: 5370693 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebx, dword ptr [ebp+08h] 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e call 00007FBFB1286EC0h 0x00000013 pop eax 0x00000014 mov ebx, 143ED7B6h 0x00000019 popad 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeSpecial instruction interceptor: First address: 95DCB5 instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeSpecial instruction interceptor: First address: B0A71E instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeSpecial instruction interceptor: First address: B0AB13 instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeSpecial instruction interceptor: First address: B0926F instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeSpecial instruction interceptor: First address: B1BB31 instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeSpecial instruction interceptor: First address: B94687 instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 58DCB5 instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 73A71E instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 73AB13 instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 73926F instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 74BB31 instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 7C4687 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 57DCB5 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 72A71E instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 72AB13 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 72926F instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 73BB31 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 7B4687 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeCode function: 0_2_05370D15 rdtsc 0_2_05370D15
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeWindow / User API: threadDelayed 1091Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeWindow / User API: threadDelayed 1165Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1199Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1076Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 759Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1223Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1102Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 770Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1573Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1902Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 622Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1219Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_6-23936
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_8-24135
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-23680
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exe TID: 2212Thread sleep time: -32016s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exe TID: 4416Thread sleep count: 1091 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exe TID: 4416Thread sleep time: -2183091s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exe TID: 1708Thread sleep count: 245 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exe TID: 2788Thread sleep count: 251 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exe TID: 3380Thread sleep count: 1165 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exe TID: 3380Thread sleep time: -2331165s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 4952Thread sleep count: 122 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 4952Thread sleep time: -244122s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2716Thread sleep count: 112 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2716Thread sleep time: -224112s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6256Thread sleep time: -36000s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3480Thread sleep count: 124 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3480Thread sleep time: -248124s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6544Thread sleep count: 1199 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6544Thread sleep time: -121099s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 4424Thread sleep count: 1076 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 4424Thread sleep count: 759 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 4424Thread sleep time: -75900s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5780Thread sleep count: 128 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5780Thread sleep time: -256128s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3608Thread sleep count: 110 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3608Thread sleep time: -220110s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 572Thread sleep count: 109 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 572Thread sleep time: -218109s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5036Thread sleep count: 89 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5036Thread sleep time: -178089s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1964Thread sleep count: 135 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1964Thread sleep time: -270135s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5064Thread sleep count: 127 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5064Thread sleep time: -254127s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1868Thread sleep count: 1223 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1868Thread sleep time: -123523s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5692Thread sleep count: 1102 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5692Thread sleep count: 770 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5692Thread sleep time: -77000s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6200Thread sleep count: 71 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6200Thread sleep time: -142071s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6516Thread sleep time: -46023s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 320Thread sleep count: 1573 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 320Thread sleep time: -3147573s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7032Thread sleep count: 101 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7032Thread sleep count: 253 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 4144Thread sleep count: 256 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 5260Thread sleep count: 1902 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 5260Thread sleep time: -3805902s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6844Thread sleep count: 622 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6844Thread sleep time: -1244622s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 2448Thread sleep count: 36 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 2448Thread sleep time: -72036s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 3808Thread sleep count: 1219 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 3808Thread sleep time: -2439219s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 4072Thread sleep count: 33 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 4072Thread sleep count: 258 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 1292Thread sleep count: 241 > 30Jump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: RageMP131.exe, RageMP131.exe, 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
            Source: MPGPH131.exe, 00000006.00000002.4485725451.0000000000ECD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}H
            Source: RageMP131.exe, 0000000A.00000002.4485711166.0000000000E8E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: RageMP131.exe, 0000000A.00000002.4485711166.0000000000EA0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 3c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_270C6B9F"
            Source: Lisect_AVT_24003_G1B_108.exe, 00000000.00000002.4485642418.000000000137E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}@
            Source: MPGPH131.exe, 00000007.00000003.2099031911.000000000138E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0
            Source: Lisect_AVT_24003_G1B_108.exe, 00000000.00000002.4485642418.00000000013BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{
            Source: RageMP131.exe, 00000008.00000002.4485499780.0000000000F60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}=C:
            Source: RageMP131.exe, 0000000A.00000002.4485711166.0000000000EA0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 3c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_270C6B9F
            Source: RageMP131.exe, 0000000A.00000002.4485711166.0000000000EA0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}w
            Source: MPGPH131.exe, 00000007.00000002.4485715827.000000000135A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&#
            Source: RageMP131.exe, 00000008.00000002.4485499780.0000000000FB5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_270C6B9F?
            Source: RageMP131.exe, 00000008.00000003.2207963452.0000000000FB5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: RageMP131.exe, 00000008.00000002.4485499780.0000000000F6E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}r
            Source: RageMP131.exe, 00000008.00000002.4485499780.0000000000FB5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_270C6B9F
            Source: MPGPH131.exe, 00000006.00000002.4485725451.0000000000F00000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.4485715827.000000000135A000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.4485499780.0000000000FA2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: RageMP131.exe, 00000008.00000002.4485499780.0000000000FA2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&
            Source: RageMP131.exe, 0000000A.00000002.4485711166.0000000000E8E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&T
            Source: RageMP131.exe, 00000008.00000002.4485499780.0000000000F60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: MPGPH131.exe, 00000006.00000002.4485725451.0000000000ECD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}%
            Source: RageMP131.exe, 00000008.00000002.4485499780.0000000000FA2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: MPGPH131.exe, 00000006.00000002.4485725451.0000000000F12000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_270C6B9F&
            Source: RageMP131.exe, 0000000A.00000002.4485711166.0000000000E8E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll4
            Source: Lisect_AVT_24003_G1B_108.exe, 00000000.00000002.4485642418.0000000001370000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000Jk
            Source: Lisect_AVT_24003_G1B_108.exe, 00000000.00000002.4485642418.00000000013C5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 9e146be9-c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_270C6B9F
            Source: Lisect_AVT_24003_G1B_108.exe, 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.4483321641.000000000071E000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000002.4484284014.000000000071E000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000008.00000002.4484155637.000000000070E000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
            Source: RageMP131.exe, 0000000A.00000003.2282768505.0000000000EA0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}M
            Source: RageMP131.exe, 0000000A.00000002.4485711166.0000000000EA0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}w
            Source: MPGPH131.exe, 00000006.00000002.4485326045.0000000000B0D000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}L
            Source: Lisect_AVT_24003_G1B_108.exe, 00000000.00000002.4485642418.00000000013B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll||
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeSystem information queried: ModuleInformationJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeProcess information queried: ProcessInformationJump to behavior

            Anti Debugging

            barindex
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 10_2_04FB0D96 Start: 04FB0DD0 End: 04FB0D6510_2_04FB0D96
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: regmonclass
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: gbdyllo
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: procmon_window_class
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: ollydbg
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: filemonclass
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: NTICE
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: SICE
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: SIWVID
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeCode function: 0_2_05370D15 rdtsc 0_2_05370D15
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeCode function: 0_2_00824AB0 mov eax, dword ptr fs:[00000030h]0_2_00824AB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00454AB0 mov eax, dword ptr fs:[00000030h]6_2_00454AB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00454AB0 mov eax, dword ptr fs:[00000030h]7_2_00454AB0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00444AB0 mov eax, dword ptr fs:[00000030h]8_2_00444AB0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 10_2_00444AB0 mov eax, dword ptr fs:[00000030h]10_2_00444AB0
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.4484284014.000000000071E000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, RageMP131.exe, 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: Program Manager
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeCode function: 0_2_008ECCDC GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,0_2_008ECCDC
            Source: C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0000000A.00000003.2265416340.0000000004D10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000003.2179548739.0000000004E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000003.2078685252.0000000004C70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.2027415909.00000000050D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000003.2079204683.00000000051D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Lisect_AVT_24003_G1B_108.exe PID: 1992, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 5012, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 6484, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 5080, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 6620, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0000000A.00000003.2265416340.0000000004D10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000003.2179548739.0000000004E30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000003.2078685252.0000000004C70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.2027415909.00000000050D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000003.2079204683.00000000051D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Lisect_AVT_24003_G1B_108.exe PID: 1992, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 5012, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 6484, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 5080, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 6620, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Command and Scripting Interpreter
            1
            Scheduled Task/Job
            2
            Process Injection
            1
            Masquerading
            OS Credential Dumping1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Scheduled Task/Job
            1
            Registry Run Keys / Startup Folder
            1
            Scheduled Task/Job
            24
            Virtualization/Sandbox Evasion
            LSASS Memory741
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAt1
            DLL Side-Loading
            1
            Registry Run Keys / Startup Folder
            2
            Process Injection
            Security Account Manager24
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive1
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            NTDS2
            Process Discovery
            Distributed Component Object ModelInput Capture1
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
            Obfuscated Files or Information
            LSA Secrets1
            Application Window Discovery
            SSHKeylogging1
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
            Software Packing
            Cached Domain Credentials214
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1481265 Sample: Lisect_AVT_24003_G1B_108.exe Startdate: 25/07/2024 Architecture: WINDOWS Score: 100 35 198.187.3.20.in-addr.arpa 2->35 39 Antivirus / Scanner detection for submitted sample 2->39 41 Multi AV Scanner detection for submitted file 2->41 43 Yara detected RisePro Stealer 2->43 45 3 other signatures 2->45 8 Lisect_AVT_24003_G1B_108.exe 1 9 2->8         started        13 RageMP131.exe 2 2->13         started        15 MPGPH131.exe 2 2->15         started        17 2 other processes 2->17 signatures3 process4 dnsIp5 37 193.233.132.62, 49704, 49705, 49706 FREE-NET-ASFREEnetEU Russian Federation 8->37 27 C:\Users\user\AppData\Local\...\RageMP131.exe, PE32 8->27 dropped 29 C:\ProgramData\MPGPH131\MPGPH131.exe, PE32 8->29 dropped 31 C:\Users\...\RageMP131.exe:Zone.Identifier, ASCII 8->31 dropped 33 C:\...\MPGPH131.exe:Zone.Identifier, ASCII 8->33 dropped 47 Detected unpacking (changes PE section rights) 8->47 49 Found stalling execution ending in API Sleep call 8->49 51 Uses schtasks.exe or at.exe to add and modify task schedules 8->51 53 Tries to detect virtualization through RDTSC time measurements 8->53 19 schtasks.exe 1 8->19         started        21 schtasks.exe 1 8->21         started        55 Antivirus detection for dropped file 13->55 57 Multi AV Scanner detection for dropped file 13->57 59 Tries to detect sandboxes and other dynamic analysis tools (window names) 13->59 61 Potentially malicious time measurement code found 13->61 63 Machine Learning detection for dropped file 15->63 65 Tries to evade debugger and weak emulator (self modifying code) 15->65 67 Hides threads from debuggers 15->67 69 Tries to detect sandboxes / dynamic malware analysis system (registry check) 17->69 71 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 17->71 file6 signatures7 process8 process9 23 conhost.exe 19->23         started        25 conhost.exe 21->25         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Lisect_AVT_24003_G1B_108.exe63%ReversingLabsWin32.Trojan.Znyonm
            Lisect_AVT_24003_G1B_108.exe100%AviraTR/Zenpak.bowul
            Lisect_AVT_24003_G1B_108.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe100%AviraTR/Zenpak.bowul
            C:\ProgramData\MPGPH131\MPGPH131.exe100%AviraTR/Zenpak.bowul
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe100%Joe Sandbox ML
            C:\ProgramData\MPGPH131\MPGPH131.exe100%Joe Sandbox ML
            C:\ProgramData\MPGPH131\MPGPH131.exe63%ReversingLabsWin32.Trojan.Znyonm
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe63%ReversingLabsWin32.Trojan.Znyonm
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.winimage.com/zLibDll0%URL Reputationsafe
            https://t.me/RiseProSUPPORTt0%Avira URL Cloudsafe
            https://t.me/RiseProSUPPORT0%Avira URL Cloudsafe
            https://t.me/RiseProSUPPORT-h0%Avira URL Cloudsafe
            https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%Avira URL Cloudsafe
            https://t.me/RiseProSUPPORT;0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            198.187.3.20.in-addr.arpa
            unknown
            unknownfalse
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dllLisect_AVT_24003_G1B_108.exe, 00000000.00000003.2027415909.00000000050D0000.00000004.00001000.00020000.00000000.sdmp, Lisect_AVT_24003_G1B_108.exe, 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000003.2078685252.0000000004C70000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000003.2079204683.00000000051D0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000003.2179548739.0000000004E30000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000A.00000003.2265416340.0000000004D10000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.winimage.com/zLibDllLisect_AVT_24003_G1B_108.exe, 00000000.00000003.2027415909.00000000050D0000.00000004.00001000.00020000.00000000.sdmp, Lisect_AVT_24003_G1B_108.exe, 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000003.2078685252.0000000004C70000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000003.2079204683.00000000051D0000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000003.2179548739.0000000004E30000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000A.00000003.2265416340.0000000004D10000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmpfalse
              • URL Reputation: safe
              unknown
              https://t.me/RiseProSUPPORT-hRageMP131.exe, 00000008.00000002.4485499780.0000000000F6E000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://t.me/RiseProSUPPORTLisect_AVT_24003_G1B_108.exe, 00000000.00000002.4485642418.000000000137E000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.4485725451.0000000000ECD000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.4485715827.000000000135A000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.4485499780.0000000000F6E000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000A.00000002.4485711166.0000000000E6B000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://t.me/RiseProSUPPORTtMPGPH131.exe, 00000006.00000002.4485725451.0000000000ECD000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://t.me/RiseProSUPPORT;Lisect_AVT_24003_G1B_108.exe, 00000000.00000002.4485642418.000000000137E000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              193.233.132.62
              unknownRussian Federation
              2895FREE-NET-ASFREEnetEUfalse
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1481265
              Start date and time:2024-07-25 06:57:54 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 11m 28s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:13
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:Lisect_AVT_24003_G1B_108.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@11/5@1/1
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:Failed
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240000 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing behavior information.
              • VT rate limit hit for: Lisect_AVT_24003_G1B_108.exe
              TimeTypeDescription
              00:59:13API Interceptor3375833x Sleep call for process: Lisect_AVT_24003_G1B_108.exe modified
              00:59:19API Interceptor5507x Sleep call for process: MPGPH131.exe modified
              00:59:28API Interceptor4696640x Sleep call for process: RageMP131.exe modified
              06:58:47Task SchedulerRun new task: MPGPH131 HR path: C:\ProgramData\MPGPH131\MPGPH131.exe
              06:58:47Task SchedulerRun new task: MPGPH131 LG path: C:\ProgramData\MPGPH131\MPGPH131.exe
              06:58:49AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
              06:58:58AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              193.233.132.62SecuriteInfo.com.Win32.PWSX-gen.14899.4987.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              SecuriteInfo.com.Win32.PWSX-gen.580.27252.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              SecuriteInfo.com.Win32.PWSX-gen.15960.19323.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              9iz0QM9rMM.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              4fMLTRkOfB.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              q7a5JOlhLZ.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              7jv1U7CgKF.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              file.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              SecuriteInfo.com.Win32.PWSX-gen.10022.32492.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              file.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              • 193.233.132.62:57893/hera/amadka.exe
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              FREE-NET-ASFREEnetEULisect_AVT_24003_G1A_89.exeGet hashmaliciousBdaejec, RisePro StealerBrowse
              • 193.233.132.62
              Lisect_AVT_24003_G1A_37.exeGet hashmaliciousBdaejec, RisePro StealerBrowse
              • 193.233.132.62
              LisectAVT_2403002A_262.exeGet hashmaliciousRisePro StealerBrowse
              • 193.233.132.190
              LisectAVT_2403002A_224.exeGet hashmaliciousRisePro StealerBrowse
              • 193.233.132.74
              hunta[1].exeGet hashmaliciousBdaejec, RisePro StealerBrowse
              • 193.233.132.62
              External Own 4.20.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
              • 147.45.47.64
              Aquantia_Setup 2.11.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
              • 147.45.47.64
              AdobeUpdaterV131.exeGet hashmaliciousBdaejec, RisePro StealerBrowse
              • 193.233.132.62
              installer.exeGet hashmaliciousLummaC, PureLog Stealer, Xmrig, zgRATBrowse
              • 147.45.47.81
              92.249.48.47-skid.arm7-2024-07-20T09_04_19.elfGet hashmaliciousMirai, MoobotBrowse
              • 147.45.93.156
              No context
              No context
              Process:C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exe
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):2401804
              Entropy (8bit):7.9335791162670946
              Encrypted:false
              SSDEEP:49152:hQuzfd1pUPALeftwHL1STPuAdwGFGB8QTsEVLYt:nbvq2ex9dwn1DL4
              MD5:0B4B3E5E4A2EE4BD9BA8D9950639F269
              SHA1:7A0FFCB4A3B75704478ED80C20D4DC830AB07EBF
              SHA-256:B240341D8ADFED0F14D665DCBAD14C542FA2E6F57A8C1904C0E5CCFB10270B17
              SHA-512:1DAFE222D8112CCAB45436256ADB9736F3E2A47A61CB393819D40D66EDFE54765EE878D6B49AF056169159A737E41450BF2E613E24CB93AF2A955C6B07119083
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 63%
              Reputation:low
              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......C.........L.....L.....L.....H.G...H.....H.....H...R.L.....L.....L...............E.....-........Rich..................PE..L....~.e...............".....,.......0\...........@..........................`\.....c.%...@.................................T...h....p.............................................................................................................. . .`..........................@....rsrc........p... ..................@....idata ............. ..............@... . ,.........."..............@...rhfejcgk.`....@..Z...$..............@...khoopwui..... \......~$.............@....taggant.0...0\.."....$.............@...........................................................................................................................................................................................
              Process:C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):26
              Entropy (8bit):3.95006375643621
              Encrypted:false
              SSDEEP:3:ggPYV:rPYV
              MD5:187F488E27DB4AF347237FE461A079AD
              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
              Malicious:true
              Reputation:high, very likely benign file
              Preview:[ZoneTransfer]....ZoneId=0
              Process:C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exe
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):2401804
              Entropy (8bit):7.9335791162670946
              Encrypted:false
              SSDEEP:49152:hQuzfd1pUPALeftwHL1STPuAdwGFGB8QTsEVLYt:nbvq2ex9dwn1DL4
              MD5:0B4B3E5E4A2EE4BD9BA8D9950639F269
              SHA1:7A0FFCB4A3B75704478ED80C20D4DC830AB07EBF
              SHA-256:B240341D8ADFED0F14D665DCBAD14C542FA2E6F57A8C1904C0E5CCFB10270B17
              SHA-512:1DAFE222D8112CCAB45436256ADB9736F3E2A47A61CB393819D40D66EDFE54765EE878D6B49AF056169159A737E41450BF2E613E24CB93AF2A955C6B07119083
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 63%
              Reputation:low
              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......C.........L.....L.....L.....H.G...H.....H.....H...R.L.....L.....L...............E.....-........Rich..................PE..L....~.e...............".....,.......0\...........@..........................`\.....c.%...@.................................T...h....p.............................................................................................................. . .`..........................@....rsrc........p... ..................@....idata ............. ..............@... . ,.........."..............@...rhfejcgk.`....@..Z...$..............@...khoopwui..... \......~$.............@....taggant.0...0\.."....$.............@...........................................................................................................................................................................................
              Process:C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):26
              Entropy (8bit):3.95006375643621
              Encrypted:false
              SSDEEP:3:ggPYV:rPYV
              MD5:187F488E27DB4AF347237FE461A079AD
              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
              Malicious:true
              Reputation:high, very likely benign file
              Preview:[ZoneTransfer]....ZoneId=0
              Process:C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exe
              File Type:ASCII text, with no line terminators
              Category:modified
              Size (bytes):13
              Entropy (8bit):2.873140679513133
              Encrypted:false
              SSDEEP:3:LEerSQ:FN
              MD5:9CD5E558DD7049CE1EC209969A5F5665
              SHA1:1441F4CDDA24CE5B3D0113051ED2AAE3617E7AD4
              SHA-256:03E00898995433C4B4AE6B494AA01192160DB98A3A1952E1045A644D6FC3ECA3
              SHA-512:12A2BB046C9D148851026F43665A4378EA4B331E5459E9F74B78E039B028C1DF7399B0CB0441BB1095F7CBE95BFEBA6080A44AEB17E890832C546E1459EE2B29
              Malicious:false
              Reputation:low
              Preview:1721890105732
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):7.9335791162670946
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.96%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:Lisect_AVT_24003_G1B_108.exe
              File size:2'401'804 bytes
              MD5:0b4b3e5e4a2ee4bd9ba8d9950639f269
              SHA1:7a0ffcb4a3b75704478ed80c20d4dc830ab07ebf
              SHA256:b240341d8adfed0f14d665dcbad14c542fa2e6f57a8c1904c0e5ccfb10270b17
              SHA512:1dafe222d8112ccab45436256adb9736f3e2a47a61cb393819d40d66edfe54765ee878d6b49af056169159a737e41450bf2e613e24cb93af2a955c6b07119083
              SSDEEP:49152:hQuzfd1pUPALeftwHL1STPuAdwGFGB8QTsEVLYt:nbvq2ex9dwn1DL4
              TLSH:CAB533DEAD048197FB94363949C1EAFA111BED909975A0DC7CD8BF63B9B3D2A102340C
              File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......C...............L.......L.......L.......H.G.....H.......H.......H...R...L.......L.......L.........................E.......-....
              Icon Hash:7192ecece8b2924d
              Entrypoint:0x9c3000
              Entrypoint Section:.taggant
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
              Time Stamp:0x65CC7EFE [Wed Feb 14 08:51:10 2024 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:6
              OS Version Minor:0
              File Version Major:6
              File Version Minor:0
              Subsystem Version Major:6
              Subsystem Version Minor:0
              Import Hash:2eabe9054cad5152567f0699947a2c5b
              Instruction
              jmp 00007FBFB1280FAAh
              je 00007FBFB1280FCAh
              add byte ptr [eax], al
              jmp 00007FBFB1282FA5h
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x1490540x68.idata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x1370000x110a0.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1491f80x8.idata
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              0x10000x1360000x8f000a059c558f44abe316df30e7c3bdc3636False0.9993563565340909data7.988833024480807IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x1370000x110a00x2000cf81fe283096f6e0b32b20a2965e4a13False0.982666015625data7.902596502928978IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .idata 0x1490000x10000x200588e00183b8b4dbb8c7106492f04143dFalse0.14453125data0.9824704719748909IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              0x14a0000x2c20000x20001b91f8971830b7333c6648e2b8eb7c7unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              rhfejcgk0x40c0000x1b60000x1b5a008683e151f3c35636d38253eac6ebd28aFalse0.9608348507569265data7.913857553386715IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              khoopwui0x5c20000x10000x6002e514d738a9829801a2fa61260c1b946False0.5696614583333334data4.979910669069895IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .taggant0x5c30000x30000x220045e562a30076b12da1314a3e8121716fFalse0.006433823529411764DOS executable (COM)0.019571456231530684IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_ICON0x5b0a7c0x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 3779 x 3779 px/mRussianRussia0.10367620962971726
              RT_GROUP_ICON0x5c12a40x14dataRussianRussia1.15
              RT_VERSION0x5c12b80x2b4dataRussianRussia0.48121387283236994
              RT_MANIFEST0x5c156c0x2e6XML 1.0 document, ASCII text, with CRLF line terminators0.45417789757412397
              RT_MANIFEST0x5c18520x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
              DLLImport
              kernel32.dlllstrcpy
              Language of compilation systemCountry where language is spokenMap
              RussianRussia
              EnglishUnited States
              TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
              2024-07-25T06:58:51.799868+0200TCP2049060ET MALWARE RisePro TCP Heartbeat Packet4970550500192.168.2.5193.233.132.62
              2024-07-25T06:58:50.127587+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4970450500192.168.2.5193.233.132.62
              2024-07-25T06:58:54.752913+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4970550500192.168.2.5193.233.132.62
              2024-07-25T06:59:13.143304+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4971550500192.168.2.5193.233.132.62
              2024-07-25T06:59:23.343383+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4436210952.165.165.26192.168.2.5
              2024-07-25T06:59:03.946343+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434970720.12.23.50192.168.2.5
              2024-07-25T06:58:54.752808+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4970650500192.168.2.5193.233.132.62
              2024-07-25T06:58:47.148505+0200TCP2049060ET MALWARE RisePro TCP Heartbeat Packet4970450500192.168.2.5193.233.132.62
              2024-07-25T06:59:05.660986+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4970850500192.168.2.5193.233.132.62
              2024-07-25T06:59:22.123324+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4436210852.165.165.26192.168.2.5
              TimestampSource PortDest PortSource IPDest IP
              Jul 25, 2024 06:58:47.117734909 CEST4970450500192.168.2.5193.233.132.62
              Jul 25, 2024 06:58:47.123430014 CEST5050049704193.233.132.62192.168.2.5
              Jul 25, 2024 06:58:47.123579979 CEST4970450500192.168.2.5193.233.132.62
              Jul 25, 2024 06:58:47.148504972 CEST4970450500192.168.2.5193.233.132.62
              Jul 25, 2024 06:58:47.153429031 CEST5050049704193.233.132.62192.168.2.5
              Jul 25, 2024 06:58:50.127587080 CEST4970450500192.168.2.5193.233.132.62
              Jul 25, 2024 06:58:50.134040117 CEST5050049704193.233.132.62192.168.2.5
              Jul 25, 2024 06:58:51.750699997 CEST4970550500192.168.2.5193.233.132.62
              Jul 25, 2024 06:58:51.751647949 CEST4970650500192.168.2.5193.233.132.62
              Jul 25, 2024 06:58:51.755628109 CEST5050049705193.233.132.62192.168.2.5
              Jul 25, 2024 06:58:51.755722046 CEST4970550500192.168.2.5193.233.132.62
              Jul 25, 2024 06:58:51.756465912 CEST5050049706193.233.132.62192.168.2.5
              Jul 25, 2024 06:58:51.756534100 CEST4970650500192.168.2.5193.233.132.62
              Jul 25, 2024 06:58:51.797506094 CEST4970650500192.168.2.5193.233.132.62
              Jul 25, 2024 06:58:51.799868107 CEST4970550500192.168.2.5193.233.132.62
              Jul 25, 2024 06:58:51.802391052 CEST5050049706193.233.132.62192.168.2.5
              Jul 25, 2024 06:58:51.804757118 CEST5050049705193.233.132.62192.168.2.5
              Jul 25, 2024 06:58:54.752808094 CEST4970650500192.168.2.5193.233.132.62
              Jul 25, 2024 06:58:54.752912998 CEST4970550500192.168.2.5193.233.132.62
              Jul 25, 2024 06:58:54.757841110 CEST5050049706193.233.132.62192.168.2.5
              Jul 25, 2024 06:58:54.757855892 CEST5050049705193.233.132.62192.168.2.5
              Jul 25, 2024 06:59:02.666912079 CEST4970850500192.168.2.5193.233.132.62
              Jul 25, 2024 06:59:02.672028065 CEST5050049708193.233.132.62192.168.2.5
              Jul 25, 2024 06:59:02.672137976 CEST4970850500192.168.2.5193.233.132.62
              Jul 25, 2024 06:59:02.692729950 CEST4970850500192.168.2.5193.233.132.62
              Jul 25, 2024 06:59:02.699664116 CEST5050049708193.233.132.62192.168.2.5
              Jul 25, 2024 06:59:05.660985947 CEST4970850500192.168.2.5193.233.132.62
              Jul 25, 2024 06:59:05.667046070 CEST5050049708193.233.132.62192.168.2.5
              Jul 25, 2024 06:59:08.511400938 CEST5050049704193.233.132.62192.168.2.5
              Jul 25, 2024 06:59:08.511740923 CEST4970450500192.168.2.5193.233.132.62
              Jul 25, 2024 06:59:10.151415110 CEST4971550500192.168.2.5193.233.132.62
              Jul 25, 2024 06:59:10.156615019 CEST5050049715193.233.132.62192.168.2.5
              Jul 25, 2024 06:59:10.156749964 CEST4971550500192.168.2.5193.233.132.62
              Jul 25, 2024 06:59:10.174139023 CEST4971550500192.168.2.5193.233.132.62
              Jul 25, 2024 06:59:10.179713011 CEST5050049715193.233.132.62192.168.2.5
              Jul 25, 2024 06:59:13.137682915 CEST5050049706193.233.132.62192.168.2.5
              Jul 25, 2024 06:59:13.137743950 CEST4970650500192.168.2.5193.233.132.62
              Jul 25, 2024 06:59:13.143304110 CEST4971550500192.168.2.5193.233.132.62
              Jul 25, 2024 06:59:13.148693085 CEST5050049705193.233.132.62192.168.2.5
              Jul 25, 2024 06:59:13.148762941 CEST5050049715193.233.132.62192.168.2.5
              Jul 25, 2024 06:59:13.148771048 CEST4970550500192.168.2.5193.233.132.62
              Jul 25, 2024 06:59:24.058605909 CEST5050049708193.233.132.62192.168.2.5
              Jul 25, 2024 06:59:24.058685064 CEST4970850500192.168.2.5193.233.132.62
              Jul 25, 2024 06:59:31.562185049 CEST5050049715193.233.132.62192.168.2.5
              Jul 25, 2024 06:59:31.562429905 CEST4971550500192.168.2.5193.233.132.62
              TimestampSource PortDest PortSource IPDest IP
              Jul 25, 2024 06:59:17.682553053 CEST5364885162.159.36.2192.168.2.5
              Jul 25, 2024 06:59:18.177809000 CEST6058553192.168.2.51.1.1.1
              Jul 25, 2024 06:59:18.185745955 CEST53605851.1.1.1192.168.2.5
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Jul 25, 2024 06:59:18.177809000 CEST192.168.2.51.1.1.10xf07fStandard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Jul 25, 2024 06:59:18.185745955 CEST1.1.1.1192.168.2.50xf07fName error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:00:58:42
              Start date:25/07/2024
              Path:C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\Lisect_AVT_24003_G1B_108.exe"
              Imagebase:0x810000
              File size:2'401'804 bytes
              MD5 hash:0B4B3E5E4A2EE4BD9BA8D9950639F269
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000000.00000003.2027415909.00000000050D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
              Reputation:low
              Has exited:false

              Target ID:2
              Start time:00:58:45
              Start date:25/07/2024
              Path:C:\Windows\SysWOW64\schtasks.exe
              Wow64 process (32bit):true
              Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
              Imagebase:0xf30000
              File size:187'904 bytes
              MD5 hash:48C2FE20575769DE916F48EF0676A965
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:3
              Start time:00:58:45
              Start date:25/07/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff6d64d0000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:4
              Start time:00:58:45
              Start date:25/07/2024
              Path:C:\Windows\SysWOW64\schtasks.exe
              Wow64 process (32bit):true
              Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
              Imagebase:0xf30000
              File size:187'904 bytes
              MD5 hash:48C2FE20575769DE916F48EF0676A965
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:5
              Start time:00:58:46
              Start date:25/07/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff6d64d0000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:6
              Start time:00:58:47
              Start date:25/07/2024
              Path:C:\ProgramData\MPGPH131\MPGPH131.exe
              Wow64 process (32bit):true
              Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
              Imagebase:0x440000
              File size:2'401'804 bytes
              MD5 hash:0B4B3E5E4A2EE4BD9BA8D9950639F269
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Author: Joe Security
              • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000006.00000003.2078685252.0000000004C70000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
              Antivirus matches:
              • Detection: 100%, Avira
              • Detection: 100%, Joe Sandbox ML
              • Detection: 63%, ReversingLabs
              Reputation:low
              Has exited:false

              Target ID:7
              Start time:00:58:47
              Start date:25/07/2024
              Path:C:\ProgramData\MPGPH131\MPGPH131.exe
              Wow64 process (32bit):true
              Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
              Imagebase:0x440000
              File size:2'401'804 bytes
              MD5 hash:0B4B3E5E4A2EE4BD9BA8D9950639F269
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Author: Joe Security
              • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000007.00000003.2079204683.00000000051D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
              Reputation:low
              Has exited:false

              Target ID:8
              Start time:00:58:58
              Start date:25/07/2024
              Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
              Imagebase:0x430000
              File size:2'401'804 bytes
              MD5 hash:0B4B3E5E4A2EE4BD9BA8D9950639F269
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000008.00000003.2179548739.0000000004E30000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
              Antivirus matches:
              • Detection: 100%, Avira
              • Detection: 100%, Joe Sandbox ML
              • Detection: 63%, ReversingLabs
              Reputation:low
              Has exited:false

              Target ID:10
              Start time:00:59:06
              Start date:25/07/2024
              Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
              Imagebase:0x430000
              File size:2'401'804 bytes
              MD5 hash:0B4B3E5E4A2EE4BD9BA8D9950639F269
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 0000000A.00000003.2265416340.0000000004D10000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
              Reputation:low
              Has exited:false

              Reset < >

                Execution Graph

                Execution Coverage:1.8%
                Dynamic/Decrypted Code Coverage:1.2%
                Signature Coverage:5.2%
                Total number of Nodes:251
                Total number of Limit Nodes:24
                execution_graph 23845 818b00 RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 23851 812540 RtlAllocateHeap RtlAllocateHeap RtlAllocateHeap std::locale::_Locimp::_Locimp 23846 82a100 7 API calls 3 library calls 23828 8f0880 RtlAllocateHeap ___except_validate_context_record __freea _ValidateLocalCookies __IsNonwritableInCurrentImage 23491 8f6658 23492 8f666b ___std_exception_copy 23491->23492 23497 8f6533 23492->23497 23494 8f6677 23504 8f1f4c RtlAllocateHeap ___std_exception_copy 23494->23504 23496 8f6683 23498 8f653f std::_Locinfo::_Locinfo_dtor 23497->23498 23499 8f6549 23498->23499 23501 8f656c 23498->23501 23519 8f2193 RtlAllocateHeap ___std_exception_copy __Getctype 23499->23519 23503 8f6564 23501->23503 23505 8f65ca 23501->23505 23503->23494 23504->23496 23506 8f65fa 23505->23506 23507 8f65d7 23505->23507 23509 8f65f2 23506->23509 23520 8f3041 23506->23520 23544 8f2193 RtlAllocateHeap ___std_exception_copy __Getctype 23507->23544 23509->23503 23515 8f6626 23537 9024af 23515->23537 23519->23503 23521 8f3081 23520->23521 23522 8f305a 23520->23522 23526 90485d 23521->23526 23522->23521 23523 9039f2 RtlAllocateHeap 23522->23523 23524 8f3076 23523->23524 23546 902dfb 23524->23546 23527 904874 23526->23527 23528 8f661a 23526->23528 23527->23528 23614 904823 RtlAllocateHeap __dosmaperr 23527->23614 23530 9039f2 23528->23530 23531 903a13 23530->23531 23532 9039fe 23530->23532 23531->23515 23615 8facaf RtlAllocateHeap __dosmaperr 23532->23615 23534 903a03 23616 8f2210 RtlAllocateHeap ___std_exception_copy 23534->23616 23536 903a0e 23536->23515 23539 9024d8 23537->23539 23541 8f662d 23537->23541 23538 902527 23621 8f2193 RtlAllocateHeap ___std_exception_copy __Getctype 23538->23621 23539->23538 23542 9024ff 23539->23542 23541->23509 23545 904823 RtlAllocateHeap __dosmaperr 23541->23545 23617 90241e 23542->23617 23544->23509 23545->23509 23547 902e07 std::_Locinfo::_Locinfo_dtor 23546->23547 23548 902e48 23547->23548 23550 902e8e 23547->23550 23551 902e0f 23547->23551 23567 8f2193 RtlAllocateHeap ___std_exception_copy __Getctype 23548->23567 23550->23551 23553 902f0c 23550->23553 23551->23521 23556 902f34 23553->23556 23566 902f57 23553->23566 23554 902f38 23573 8f2193 RtlAllocateHeap ___std_exception_copy __Getctype 23554->23573 23556->23554 23557 902f93 23556->23557 23558 902fb1 23557->23558 23574 8fbbed 23557->23574 23568 902a51 23558->23568 23562 903010 23564 903079 WriteFile 23562->23564 23562->23566 23563 902fc9 23563->23566 23577 902622 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_dtor _ValidateLocalCookies std::locale::_Locimp::_Locimp 23563->23577 23564->23566 23566->23551 23567->23551 23578 90e7b4 23568->23578 23570 902a91 23570->23562 23570->23563 23571 902a63 23571->23570 23587 8f7780 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_dtor ___std_exception_copy 23571->23587 23573->23566 23591 8fbacc 23574->23591 23576 8fbc06 23576->23558 23577->23566 23579 90e7c1 23578->23579 23580 90e7ce 23578->23580 23588 8facaf RtlAllocateHeap __dosmaperr 23579->23588 23582 90e7da 23580->23582 23589 8facaf RtlAllocateHeap __dosmaperr 23580->23589 23582->23571 23584 90e7c6 23584->23571 23585 90e7fb 23590 8f2210 RtlAllocateHeap ___std_exception_copy 23585->23590 23587->23570 23588->23584 23589->23585 23590->23584 23596 90814e 23591->23596 23593 8fbade 23594 8fbafa SetFilePointerEx 23593->23594 23595 8fbae6 23593->23595 23594->23595 23595->23576 23597 908170 23596->23597 23598 90815b 23596->23598 23602 908195 23597->23602 23611 8fac9c RtlAllocateHeap __dosmaperr 23597->23611 23609 8fac9c RtlAllocateHeap __dosmaperr 23598->23609 23601 908160 23610 8facaf RtlAllocateHeap __dosmaperr 23601->23610 23602->23593 23603 9081a0 23612 8facaf RtlAllocateHeap __dosmaperr 23603->23612 23606 908168 23606->23593 23607 9081a8 23613 8f2210 RtlAllocateHeap ___std_exception_copy 23607->23613 23609->23601 23610->23606 23611->23603 23612->23607 23613->23606 23614->23528 23615->23534 23616->23536 23618 90242a std::_Locinfo::_Locinfo_dtor 23617->23618 23620 902469 23618->23620 23622 902582 23618->23622 23620->23541 23621->23541 23623 90814e RtlAllocateHeap 23622->23623 23626 902592 23623->23626 23624 902598 23634 9080bd RtlAllocateHeap __dosmaperr 23624->23634 23626->23624 23627 9025ca 23626->23627 23629 90814e RtlAllocateHeap 23626->23629 23627->23624 23628 90814e RtlAllocateHeap 23627->23628 23630 9025d6 FindCloseChangeNotification 23628->23630 23631 9025c1 23629->23631 23630->23624 23632 90814e RtlAllocateHeap 23631->23632 23632->23627 23633 9025f0 23633->23620 23634->23633 23843 8fabd8 SetFilePointerEx WriteFile RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 23637 8f2dd0 23640 8f2d0e 23637->23640 23639 8f2de2 23642 8f2d1a std::_Locinfo::_Locinfo_dtor 23640->23642 23641 8f2d21 23658 8facaf RtlAllocateHeap __dosmaperr 23641->23658 23642->23641 23644 8f2d41 23642->23644 23646 8f2d46 23644->23646 23647 8f2d53 23644->23647 23645 8f2d26 23659 8f2210 RtlAllocateHeap ___std_exception_copy 23645->23659 23660 8facaf RtlAllocateHeap __dosmaperr 23646->23660 23654 9040f8 23647->23654 23651 8f2d31 23651->23639 23652 8f2d5c 23652->23651 23661 8facaf RtlAllocateHeap __dosmaperr 23652->23661 23655 904104 std::_Lockit::_Lockit std::_Locinfo::_Locinfo_dtor 23654->23655 23662 90419c 23655->23662 23657 90411f 23657->23652 23658->23645 23659->23651 23660->23651 23661->23651 23663 9041bf 23662->23663 23667 904205 23663->23667 23668 903e63 23663->23668 23665 904220 23672 904823 RtlAllocateHeap __dosmaperr 23665->23672 23667->23657 23671 903e70 __Getctype std::_Facet_Register 23668->23671 23669 903e9b RtlAllocateHeap 23670 903eae __dosmaperr 23669->23670 23669->23671 23670->23665 23671->23669 23671->23670 23672->23667 23673 82ec20 23674 82f0bf 23673->23674 23680 82ec5e 23673->23680 23675 82eca7 setsockopt recv 23675->23680 23677 82f0aa Sleep 23677->23674 23677->23680 23678 82ecff 23715 878610 23678->23715 23680->23674 23680->23675 23680->23677 23680->23678 23682 82f09c Sleep 23680->23682 23691 82db60 WSAStartup 23680->23691 23697 824a90 23680->23697 23700 82e060 23680->23700 23682->23677 23683 82ed38 recv 23684 82ed59 recv 23683->23684 23690 82ed7a 23683->23690 23684->23690 23687 878610 2 API calls 23687->23690 23689 82edf1 recv 23689->23690 23690->23682 23690->23687 23690->23689 23720 875d50 23690->23720 23737 82e460 6 API calls 23690->23737 23692 82db98 23691->23692 23693 82dc56 23691->23693 23692->23693 23694 82dc24 socket 23692->23694 23693->23680 23694->23693 23695 82dc3a connect 23694->23695 23695->23693 23696 82dc4c closesocket 23695->23696 23696->23693 23696->23694 23738 8ec6dc 23697->23738 23699 824a9b __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 23699->23680 23701 875d50 2 API calls 23700->23701 23706 82e0aa 23701->23706 23703 82e204 23704 82e44b 23703->23704 23705 82e22e 23703->23705 23750 8f2220 RtlAllocateHeap ___std_exception_copy __Getctype 23704->23750 23708 878610 2 API calls 23705->23708 23712 82e26e std::locale::_Locimp::_Locimp 23705->23712 23745 875bd0 23706->23745 23708->23712 23709 82e3b7 23713 82e423 23709->23713 23751 8f2220 RtlAllocateHeap ___std_exception_copy __Getctype 23709->23751 23712->23709 23714 82e393 WSASend 23712->23714 23713->23680 23714->23709 23714->23712 23716 878657 23715->23716 23719 878628 std::locale::_Setgloballocale 23715->23719 23753 87ba20 23716->23753 23718 87866a 23718->23683 23719->23683 23721 875d7a 23720->23721 23722 875e32 23721->23722 23723 875d8b 23721->23723 23787 812040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 23722->23787 23724 875d97 std::locale::_Locimp::_Locimp 23723->23724 23727 875dbc 23723->23727 23729 875df5 23723->23729 23730 875dfe 23723->23730 23724->23690 23726 875e37 23788 811fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 23726->23788 23731 8ecd02 std::_Facet_Register 2 API calls 23727->23731 23729->23726 23729->23727 23734 8ecd02 std::_Facet_Register 2 API calls 23730->23734 23735 875dd6 std::locale::_Locimp::_Locimp 23730->23735 23732 875dcf 23731->23732 23732->23735 23789 8f2220 RtlAllocateHeap ___std_exception_copy __Getctype 23732->23789 23734->23735 23735->23690 23737->23690 23741 8eccdc 23738->23741 23742 8ecced GetSystemTimePreciseAsFileTime 23741->23742 23744 8ec6ea 23741->23744 23742->23744 23744->23699 23746 875bde 23745->23746 23748 875c01 23745->23748 23746->23748 23752 8f2220 RtlAllocateHeap ___std_exception_copy __Getctype 23746->23752 23748->23703 23754 87ba45 23753->23754 23755 87bb6c 23753->23755 23758 87baa6 23754->23758 23759 87bab3 23754->23759 23761 87ba5a 23754->23761 23776 812040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 23755->23776 23757 87bb71 23777 811fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 23757->23777 23758->23757 23758->23761 23763 8ecd02 std::_Facet_Register 2 API calls 23759->23763 23766 87ba6a std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 23759->23766 23768 8ecd02 23761->23768 23763->23766 23767 87bb2a std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 23766->23767 23778 8f2220 RtlAllocateHeap ___std_exception_copy __Getctype 23766->23778 23767->23718 23770 8ecd07 std::_Facet_Register 23768->23770 23771 8ecd21 23770->23771 23773 811fa0 Concurrency::cancel_current_task 23770->23773 23780 8fb99c 23770->23780 23771->23766 23772 8ecd2d 23772->23772 23773->23772 23779 8ee0c1 RtlAllocateHeap RtlAllocateHeap __freea ___std_exception_copy 23773->23779 23775 811fe3 23775->23766 23776->23757 23777->23766 23779->23775 23785 90489d __Getctype std::_Facet_Register 23780->23785 23781 9048db 23786 8facaf RtlAllocateHeap __dosmaperr 23781->23786 23783 9048c6 RtlAllocateHeap 23784 9048d9 23783->23784 23783->23785 23784->23770 23785->23781 23785->23783 23786->23784 23787->23726 23788->23732 23790 53707d4 GetCurrentHwProfileW 23791 5370810 23790->23791 23793 8f6ba6 23794 8f6bb9 ___std_exception_copy 23793->23794 23799 8f68fd 23794->23799 23796 8f6bce 23806 8f1f4c RtlAllocateHeap ___std_exception_copy 23796->23806 23798 8f6bdb 23801 8f6909 std::_Locinfo::_Locinfo_dtor 23799->23801 23800 8f690f 23816 8f2193 RtlAllocateHeap ___std_exception_copy __Getctype 23800->23816 23801->23800 23803 8f6952 23801->23803 23807 8f6a80 23803->23807 23805 8f692a 23805->23796 23806->23798 23808 8f6aa6 23807->23808 23809 8f6a93 23807->23809 23817 8f69a7 23808->23817 23809->23805 23811 8f6ac9 23812 8f3041 4 API calls 23811->23812 23815 8f6b57 23811->23815 23814 8f6af7 23812->23814 23813 8fbbed 2 API calls 23813->23815 23814->23813 23815->23805 23816->23805 23818 8f69b8 23817->23818 23819 8f6a10 23817->23819 23818->23819 23821 8fbbad SetFilePointerEx RtlAllocateHeap ___std_exception_copy 23818->23821 23819->23811 23821->23819 23829 824ab0 GetPEB RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 23825 5370683 GetCurrentHwProfileW

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 51 82db60-82db92 WSAStartup 52 82dc66-82dc6f 51->52 53 82db98-82dbc2 call 817d20 * 2 51->53 58 82dbc4-82dbc8 53->58 59 82dbce-82dc14 53->59 58->52 58->59 61 82dc60 59->61 62 82dc16-82dc1c 59->62 61->52 63 82dc74-82dc7e 62->63 64 82dc1e 62->64 63->61 68 82dc80-82dc88 63->68 65 82dc24-82dc38 socket 64->65 65->61 67 82dc3a-82dc4a connect 65->67 69 82dc70 67->69 70 82dc4c-82dc54 closesocket 67->70 69->63 70->65 71 82dc56-82dc5a 70->71 71->61
                APIs
                • WSAStartup.WS2_32 ref: 0082DB8B
                • socket.WS2_32(?,?,?,?,?,?,50500,?,?), ref: 0082DC2E
                • connect.WS2_32(00000000,?,?,?,?,?,50500,?,?), ref: 0082DC42
                • closesocket.WS2_32(00000000), ref: 0082DC4D
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID: Startupclosesocketconnectsocket
                • String ID: 50500
                • API String ID: 3098855095-2230786414
                • Opcode ID: 27e0542465ed055ee02618523c990a27f3b2aa598a621d0ee72defd12cab761e
                • Instruction ID: 055ede28e83c77139e76e814f3cd22d4d50c5d9a240f27c7e85f9081b9232c5a
                • Opcode Fuzzy Hash: 27e0542465ed055ee02618523c990a27f3b2aa598a621d0ee72defd12cab761e
                • Instruction Fuzzy Hash: 1C31E1725043156BC7219B289C85A2FBBE9FF89334F111F1DF8A8A32E0E3709844C692
                Memory Dump Source
                • Source File: 00000000.00000002.4491060539.0000000005370000.00000040.00001000.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5370000_Lisect_AVT_24003_G1B_108.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fdd854fe1d9fa0bcf1a2bb296adfbb3cd9e3e11fa814e076ceec236fceb7cce4
                • Instruction ID: 0d7af3827f17df919cdaa3dc70bef6b83b770738c64d9b2e34f23832f91824bd
                • Opcode Fuzzy Hash: fdd854fe1d9fa0bcf1a2bb296adfbb3cd9e3e11fa814e076ceec236fceb7cce4
                • Instruction Fuzzy Hash: 5201F9EB44C208BF615AD5859B189F67A5FE5CB3307318016F40787E01E2A95E459930

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 0 82ec20-82ec58 1 82ec5e 0->1 2 82f0bf-82f0d3 0->2 3 82ec64-82ec6c 1->3 4 82eca7-82ecf0 setsockopt recv 3->4 5 82ec6e-82ec94 call 82db60 3->5 4->2 10 82ecf6-82ecf9 4->10 7 82ec99-82eca1 5->7 7->4 9 82f0aa-82f0b9 Sleep 7->9 9->2 9->3 11 82f037-82f053 call 824a90 10->11 12 82ecff-82ed53 call 878610 recv 10->12 17 82f055 11->17 18 82f09c-82f0a4 Sleep 11->18 22 82efe4-82eff1 12->22 23 82ed59-82ed74 recv 12->23 20 82f057-82f05d 17->20 21 82f05f-82f086 call 82e060 17->21 18->9 20->18 20->21 31 82f08b-82f097 21->31 22->18 24 82eff7-82f003 22->24 23->22 25 82ed7a-82edb1 23->25 27 82f005-82f013 24->27 28 82f019-82f023 call 8ecf83 24->28 29 82edb3-82ee11 call 878610 recv 25->29 30 82ee14-82ee44 call 875d50 25->30 27->28 28->18 29->30 38 82ef64-82efb3 call 82e460 30->38 39 82ee4a 30->39 31->18 38->22 46 82efb5-82efc4 38->46 40 82ee50-82ef5e 39->40 40->38 47 82efc6-82efd4 46->47 48 82efda-82efe1 call 8ecf83 46->48 47->48 48->22
                APIs
                • setsockopt.WS2_32(00000380,0000FFFF,00001006,?,00000008), ref: 0082ECC6
                • recv.WS2_32(?,00000004,00000002), ref: 0082ECE1
                • recv.WS2_32(00000000,0000000C,00000002,0000000C), ref: 0082ED4E
                • recv.WS2_32(00000000,0000000C,00000008), ref: 0082ED6F
                • recv.WS2_32(00000000,?,00000008), ref: 0082EE0C
                  • Part of subcall function 0082DB60: WSAStartup.WS2_32 ref: 0082DB8B
                  • Part of subcall function 0082DB60: socket.WS2_32(?,?,?,?,?,?,50500,?,?), ref: 0082DC2E
                  • Part of subcall function 0082DB60: connect.WS2_32(00000000,?,?,?,?,?,50500,?,?), ref: 0082DC42
                  • Part of subcall function 0082DB60: closesocket.WS2_32(00000000), ref: 0082DC4D
                • recv.WS2_32(?,00000004,00000008), ref: 0082F033
                • Sleep.KERNELBASE(00000001), ref: 0082F09E
                • Sleep.KERNELBASE(00000064), ref: 0082F0AC
                • __Mtx_unlock.LIBCPMT ref: 0082F211
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID: recv$Sleep$Mtx_unlockStartupclosesocketconnectsetsockoptsocket
                • String ID: 50500
                • API String ID: 2930922264-2230786414
                • Opcode ID: 139df7d621183a3ca9090dd432199e9417cbaff1fe8193cdfc0e9e2d01fd2999
                • Instruction ID: 3e8601444f626dc9d760e81fd5d50f8ca8d9dfeb87981377496f55d65e4ba189
                • Opcode Fuzzy Hash: 139df7d621183a3ca9090dd432199e9417cbaff1fe8193cdfc0e9e2d01fd2999
                • Instruction Fuzzy Hash: 61B1DF71D14258DFEB24DFA8DC45BADBBB1FF46300F248269E444E7292DB70A985CB41

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 72 82e060-82e0af call 875d50 75 82e1d4-82e20a call 875bd0 72->75 76 82e0b5-82e0b8 72->76 85 82e238-82e26c call 817d20 75->85 86 82e20c-82e218 75->86 77 82e0c0-82e0e6 76->77 79 82e0f8-82e107 77->79 80 82e0e8-82e0f3 77->80 83 82e117-82e123 79->83 84 82e109-82e112 79->84 82 82e1c7 80->82 87 82e1ca-82e1ce 82->87 88 82e133-82e13f 83->88 89 82e125-82e12e 83->89 84->82 98 82e282-82e28a call 878610 85->98 99 82e26e-82e280 85->99 90 82e21a-82e228 86->90 91 82e22e-82e235 call 8ecf83 86->91 87->75 87->77 94 82e141-82e14a 88->94 95 82e14c-82e158 88->95 89->82 90->91 96 82e44b call 8f2220 90->96 91->85 94->82 100 82e165-82e171 95->100 101 82e15a-82e163 95->101 106 82e450-82e455 call 8f2220 96->106 104 82e28f-82e2e2 call 817d20 * 2 98->104 99->104 107 82e173-82e17c 100->107 108 82e17e-82e18a 100->108 101->82 120 82e316-82e32c call 817d20 104->120 121 82e2e4-82e313 call 817d20 call 8ee9e0 104->121 107->82 111 82e197-82e1a3 108->111 112 82e18c-82e195 108->112 113 82e1b0-82e1b9 111->113 114 82e1a5-82e1ae 111->114 112->82 113->87 117 82e1bb-82e1c3 113->117 114->82 117->82 126 82e332-82e338 120->126 127 82e3b7 120->127 121->120 129 82e340-82e36c 126->129 130 82e3bb-82e3c1 127->130 132 82e370-82e37b 129->132 133 82e3c3-82e3cf 130->133 134 82e3eb-82e403 130->134 132->132 137 82e37d-82e3ab WSASend 132->137 138 82e3e1-82e3e8 call 8ecf83 133->138 139 82e3d1-82e3df 133->139 135 82e435-82e44a 134->135 136 82e405-82e411 134->136 140 82e413-82e421 136->140 141 82e42b-82e432 call 8ecf83 136->141 149 82e425-82e429 137->149 150 82e3ad-82e3b5 137->150 138->134 139->106 139->138 140->106 144 82e423 140->144 141->135 144->141 149->130 150->127 150->129
                APIs
                • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,009147E8,00000000,00000000,-009465B0), ref: 0082E3A6
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID: Send
                • String ID: 131$50500$Ws2_32.dll
                • API String ID: 121738739-3512819870
                • Opcode ID: a407e65eb7dcba91e019eacce6159520e8e5bbbca5b444fe1eb470681968ed83
                • Instruction ID: ecba2af7c435de5aa9913c7ba490ea9cc4ba21eebc0271d3de737d51dbb99b92
                • Opcode Fuzzy Hash: a407e65eb7dcba91e019eacce6159520e8e5bbbca5b444fe1eb470681968ed83
                • Instruction Fuzzy Hash: 15D1E030E0425CDFDB14CBA8DC54BADBBF5FF06305F684268D855AB282D7709886CB99

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 151 5370683-53707cf 167 53707e8-53707f7 GetCurrentHwProfileW 151->167 168 5370810-5370a7a call 5370937 167->168
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 053707EE
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4491060539.0000000005370000.00000040.00001000.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5370000_Lisect_AVT_24003_G1B_108.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID: qvF
                • API String ID: 2104809126-2313467579
                • Opcode ID: da0bc040d7ded59d4f74cf8ee16a40504d95a87d83fc2a948348d45fc33c2c67
                • Instruction ID: c91aecccc4539de153ecad207a7c02438b214b739f86638430fa440e9186bc09
                • Opcode Fuzzy Hash: da0bc040d7ded59d4f74cf8ee16a40504d95a87d83fc2a948348d45fc33c2c67
                • Instruction Fuzzy Hash: EF4132A7D0C22CFDA27EC195575CAF66AAFA6D7330B308166F407D6A01E6DC0A494DB0

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 239 537069f-53707cf 255 53707e8-53707f7 GetCurrentHwProfileW 239->255 256 5370810-5370a7a call 5370937 255->256
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 053707EE
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4491060539.0000000005370000.00000040.00001000.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5370000_Lisect_AVT_24003_G1B_108.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID: qvF
                • API String ID: 2104809126-2313467579
                • Opcode ID: a8251be65d799ca549bd492efe96f40c226c23241f7d9a094b69a8ca26c8a982
                • Instruction ID: e99aaaa84ea1e89fadf8e73a322e6d6d3dc7134a616817fbf18566dc02417d77
                • Opcode Fuzzy Hash: a8251be65d799ca549bd492efe96f40c226c23241f7d9a094b69a8ca26c8a982
                • Instruction Fuzzy Hash: 9D4136A7D0C22CFDA27EC195575C6F666AFA7D7330B304066F407E6A01E6DC0A494DB0

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 195 537068c-53707cf 211 53707e8-53707f7 GetCurrentHwProfileW 195->211 212 5370810-5370a7a call 5370937 211->212
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 053707EE
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4491060539.0000000005370000.00000040.00001000.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5370000_Lisect_AVT_24003_G1B_108.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID: qvF
                • API String ID: 2104809126-2313467579
                • Opcode ID: 4cf6571e022379ddfa6fe3ae356d9084d2b9f223f7977fc33372caa35a9ab2b9
                • Instruction ID: 5e99ba7e77d7f5190db542765df484fbbeb7cd854bbbc3b85548b09ec140551f
                • Opcode Fuzzy Hash: 4cf6571e022379ddfa6fe3ae356d9084d2b9f223f7977fc33372caa35a9ab2b9
                • Instruction Fuzzy Hash: AC4113A7D0C22CFDA17AC195575CAFA6AAFA7D7330B304066F407E6A01E6DC0A494D71

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 283 53706e0-53707cf 295 53707e8-53707f7 GetCurrentHwProfileW 283->295 296 5370810-5370a7a call 5370937 295->296
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 053707EE
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4491060539.0000000005370000.00000040.00001000.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5370000_Lisect_AVT_24003_G1B_108.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID: qvF
                • API String ID: 2104809126-2313467579
                • Opcode ID: e194c41c4260b361d5655911309d4aff8a0569e42e40a883fbffcb46452b6b57
                • Instruction ID: 0101ddbf736c745c0b265b82a932d70f1e6e25fc6eb70ce5c30aa767372ec3b4
                • Opcode Fuzzy Hash: e194c41c4260b361d5655911309d4aff8a0569e42e40a883fbffcb46452b6b57
                • Instruction Fuzzy Hash: D74136A7D0C22CFDA27EC191575CAF66AAFA697330B3040A6F407D6A01E6DC0A454DB1

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 323 5370721-5370722 324 5370724 323->324 325 53706c1-537071b 323->325 327 5370726-53707cf 324->327 325->327 338 53707e8-53707f7 GetCurrentHwProfileW 327->338 339 5370810-5370a7a call 5370937 338->339
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 053707EE
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4491060539.0000000005370000.00000040.00001000.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5370000_Lisect_AVT_24003_G1B_108.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID: qvF
                • API String ID: 2104809126-2313467579
                • Opcode ID: 9a760679ef13b671855afbe01842889910b5459052c4ccf13d79c09830461809
                • Instruction ID: d57d68d57ac3e7b18a313ae6c234b8d84889fb3dd14ba4fbe657a856d00649c6
                • Opcode Fuzzy Hash: 9a760679ef13b671855afbe01842889910b5459052c4ccf13d79c09830461809
                • Instruction Fuzzy Hash: 594124A7D0C22CFDA27EC195575CAF66AAFB7C7330B304066B40BD6A01E6DC0A494D71

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 366 53706c5-53707cf 378 53707e8-53707f7 GetCurrentHwProfileW 366->378 379 5370810-5370a7a call 5370937 378->379
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 053707EE
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4491060539.0000000005370000.00000040.00001000.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5370000_Lisect_AVT_24003_G1B_108.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID: qvF
                • API String ID: 2104809126-2313467579
                • Opcode ID: 96441ddc8f973629c92caab460820952e104ada4f5ce953d0d07556323ae0ac9
                • Instruction ID: 5af3fff87dc144cad8dbfc3d95c320dcdc0e3d40066abab35066879c0954dbff
                • Opcode Fuzzy Hash: 96441ddc8f973629c92caab460820952e104ada4f5ce953d0d07556323ae0ac9
                • Instruction Fuzzy Hash: 684146A7D0C22CFDA27EC195575CAF66AAFB687330B3040A6F407D6902E2DC4A459DB1

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 406 5370749-537074c 407 5370711-5370744 406->407 408 537074e-537074f 406->408 413 5370754-53707cf 407->413 410 5370751-5370753 408->410 411 537070f 408->411 410->413 411->407 420 53707e8-53707f7 GetCurrentHwProfileW 413->420 421 5370810-5370a7a call 5370937 420->421
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 053707EE
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4491060539.0000000005370000.00000040.00001000.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5370000_Lisect_AVT_24003_G1B_108.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID: qvF
                • API String ID: 2104809126-2313467579
                • Opcode ID: 038f90efb84b5bd01cee03b5759c0c35ead5f484bdd6b4fcf6287fc892fc437b
                • Instruction ID: 916dd14b01f92b671b676a337bfe27935ca20e277e72ec8cb2203563f5908218
                • Opcode Fuzzy Hash: 038f90efb84b5bd01cee03b5759c0c35ead5f484bdd6b4fcf6287fc892fc437b
                • Instruction Fuzzy Hash: D14126A7D0C22CBDA27EC191565CAF666AFB7D7330B3040A6E407D6901F2DC4E499DB1

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 448 5370705-53707cf 459 53707e8-53707f7 GetCurrentHwProfileW 448->459 460 5370810-5370a7a call 5370937 459->460
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 053707EE
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4491060539.0000000005370000.00000040.00001000.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5370000_Lisect_AVT_24003_G1B_108.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID: qvF
                • API String ID: 2104809126-2313467579
                • Opcode ID: e79a89e425f3621bc1d6e51d5395ed91bbc8d802f02ab7ea891227417da8e394
                • Instruction ID: 85c8f9cd776052e1cc58cf9c263cb574a8ceb6a1427d14f5dab2a1ec01a9f9f2
                • Opcode Fuzzy Hash: e79a89e425f3621bc1d6e51d5395ed91bbc8d802f02ab7ea891227417da8e394
                • Instruction Fuzzy Hash: 7E4113A7D0C12CFDA27AC191575CAFA6AAFA7D7330B3080A6F407D6901E6DC4A494DB1

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 487 53706f5-53707cf 498 53707e8-53707f7 GetCurrentHwProfileW 487->498 499 5370810-5370a7a call 5370937 498->499
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 053707EE
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4491060539.0000000005370000.00000040.00001000.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5370000_Lisect_AVT_24003_G1B_108.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID: qvF
                • API String ID: 2104809126-2313467579
                • Opcode ID: 098878b5926ef326a05887c7859295b1412b490e77099ba2c510044a44d3bc26
                • Instruction ID: 6908cd7a3e6979accc24e055d62ccb4936c601f7ddb2b0b9afd29bef9eebc58a
                • Opcode Fuzzy Hash: 098878b5926ef326a05887c7859295b1412b490e77099ba2c510044a44d3bc26
                • Instruction Fuzzy Hash: C14126A7D0C12CFDA27EC191575CAF666AFA7D7330B304066F407D6A01E2DC4A494DB1

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 526 5370731-53707cf 534 53707e8-53707f7 GetCurrentHwProfileW 526->534 535 5370810-5370a7a call 5370937 534->535
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 053707EE
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4491060539.0000000005370000.00000040.00001000.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5370000_Lisect_AVT_24003_G1B_108.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID: qvF
                • API String ID: 2104809126-2313467579
                • Opcode ID: 6a55549e9efe3e4c7343d7a0559897984c16814d8baff804a1f60bffe725f1a7
                • Instruction ID: a49d72e4e0f9ab479d2dd6561ead463502f085e944f4b86295bf501c94aab205
                • Opcode Fuzzy Hash: 6a55549e9efe3e4c7343d7a0559897984c16814d8baff804a1f60bffe725f1a7
                • Instruction Fuzzy Hash: 853115A7D0C22CFEA27AC1915B5CAF666AFA7D7330B304066F40BD6901E6DD4A494DB0

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 562 53707aa-53707cf 565 53707e8-53707f7 GetCurrentHwProfileW 562->565 566 5370810-5370a7a call 5370937 565->566
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 053707EE
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4491060539.0000000005370000.00000040.00001000.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5370000_Lisect_AVT_24003_G1B_108.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID: qvF
                • API String ID: 2104809126-2313467579
                • Opcode ID: 2a7d73f91268dc0ebd487e5358e85eda4b08db1ca0a516dd8a0fab4efc131902
                • Instruction ID: 52e5a56b24cff97e8bfc0381b18d4ca2f175040f147eb26435a35e604dde0a7e
                • Opcode Fuzzy Hash: 2a7d73f91268dc0ebd487e5358e85eda4b08db1ca0a516dd8a0fab4efc131902
                • Instruction Fuzzy Hash: 893138A7D0C12CBDB26AC19157586F66AAFE6C7330B308066F40BD6D01E6DC4A495DB1

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 593 53707d4-53707f7 GetCurrentHwProfileW 594 5370810-5370a7a call 5370937 593->594
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 053707EE
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4491060539.0000000005370000.00000040.00001000.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5370000_Lisect_AVT_24003_G1B_108.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID: qvF
                • API String ID: 2104809126-2313467579
                • Opcode ID: 3754f7dbd7ac31363a7b37c3981137b3070ab9af1a2b5f2d679f56a0e9a2b0bb
                • Instruction ID: 0d11b46b9b4a6d298e125de5f3e784b8e41ec742462490e79472d2a262290d1c
                • Opcode Fuzzy Hash: 3754f7dbd7ac31363a7b37c3981137b3070ab9af1a2b5f2d679f56a0e9a2b0bb
                • Instruction Fuzzy Hash: B2317CB7D0C228FDB23AC1915B196F6666FE7C7330B308026F40BD6901E6DC4E4549B1
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 053707EE
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4491060539.0000000005370000.00000040.00001000.00020000.00000000.sdmp, Offset: 05370000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5370000_Lisect_AVT_24003_G1B_108.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID: qvF
                • API String ID: 2104809126-2313467579
                • Opcode ID: d9ea21a4942057ca52f8efd0a030a1c7b6eaf7d823c3082977264e1c92fa8af0
                • Instruction ID: 4ee2110b2efafed4fb7eeda974986611b8ac2e3e8dd6e890013f3981a8e3646f
                • Opcode Fuzzy Hash: d9ea21a4942057ca52f8efd0a030a1c7b6eaf7d823c3082977264e1c92fa8af0
                • Instruction Fuzzy Hash: 213136B7D0C22CBDB26AC19157586FA66BFF6C7330B308076F40BD6901E6984E4959B1
                APIs
                • WriteFile.KERNELBASE(?,00000000,008F6AF7,?,00000000,00000000,00000000,?,00000000,?,008EC023,008F6AF7,00000000,008EC023,?,?), ref: 00903091
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID: FileWrite
                • String ID:
                • API String ID: 3934441357-0
                • Opcode ID: 921dd68d9965ffceef3a0bf65508ff046d0ea76de92d861d64025ede959afa21
                • Instruction ID: ee7b2e4a9183d62e2bab355b66fb29aa3480e6ad878bb554f3d8e9e63b2971f5
                • Opcode Fuzzy Hash: 921dd68d9965ffceef3a0bf65508ff046d0ea76de92d861d64025ede959afa21
                • Instruction Fuzzy Hash: 6F61C27190411AAFDF11DFA8C888EFEBBBDAF49304F144545E904AB282D736DA11DBA0
                APIs
                • Concurrency::cancel_current_task.LIBCPMT ref: 0087BB71
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID: Concurrency::cancel_current_task
                • String ID:
                • API String ID: 118556049-0
                • Opcode ID: b19d2212db506fa46971754378483badd225f06599945ea51feb898bce11e8e1
                • Instruction ID: 27a55fc8f13307f3cef759422548dc790faef2ecc1b673006b60d907634ea56b
                • Opcode Fuzzy Hash: b19d2212db506fa46971754378483badd225f06599945ea51feb898bce11e8e1
                • Instruction Fuzzy Hash: 3141F6729011199BCB15EF6CDC817AEBBA6FF45350F144269F819DB209D730DE1187E1
                APIs
                • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,00902469,00000000,CF830579,00941148,0000000C,00902525,008F662D,?), ref: 009025D8
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID: ChangeCloseFindNotification
                • String ID:
                • API String ID: 2591292051-0
                • Opcode ID: 6f4e99b1dd44586250fc3c93f613378097a77ed00c5bc3c54d411c848843998b
                • Instruction ID: 67913817c0cfbe7d2b08df65324873a403d7da32dab9495af0d568114dd29269
                • Opcode Fuzzy Hash: 6f4e99b1dd44586250fc3c93f613378097a77ed00c5bc3c54d411c848843998b
                • Instruction Fuzzy Hash: 871126337182141ED73523745C5EB7E678EAFC7734F29020AF9189B1C2EE619C825159
                APIs
                • SetFilePointerEx.KERNELBASE(00000000,00000000,00940E00,008EC023,00000002,008EC023,00000000,?,?,?,008FBBD6,00000000,?,008EC023,00000002,00940E00), ref: 008FBB08
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID: FilePointer
                • String ID:
                • API String ID: 973152223-0
                • Opcode ID: f841a15753dd77cada39ee18a9988a4de99584c646d27fcb7f765bdfeb8e5d84
                • Instruction ID: 3cd8dee128f59d50e255d68dfe66f886a1c0ed38d059cb25528e07e2ddaa0d36
                • Opcode Fuzzy Hash: f841a15753dd77cada39ee18a9988a4de99584c646d27fcb7f765bdfeb8e5d84
                • Instruction Fuzzy Hash: FF01D232614159AFCF198FA9CC45CAE3B69FF86330B240208F911DB291EB71ED519B90
                APIs
                • ___std_exception_copy.LIBVCRUNTIME ref: 00811FDE
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_copy
                • String ID:
                • API String ID: 2659868963-0
                • Opcode ID: ecd977b9de962f745aa16c9f988e417c8f2955967a44bc828e76fc061b7b92b4
                • Instruction ID: 20b7f41eea1c7e5eba43c37aba83b17e1b23cacb324905e51397b3cd0092a3bd
                • Opcode Fuzzy Hash: ecd977b9de962f745aa16c9f988e417c8f2955967a44bc828e76fc061b7b92b4
                • Instruction Fuzzy Hash: FF012B3590030DA7CB24ABADEC0189A7BACFE02364B508635F614D6551FB70E59183D2
                APIs
                • RtlAllocateHeap.NTDLL(00000008,008EB16C,?,?,009037E9,00000001,00000364,?,00000006,000000FF,?,008EE0EB,?,?,?,?), ref: 00903EA5
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID: AllocateHeap
                • String ID:
                • API String ID: 1279760036-0
                • Opcode ID: d5374fcddf0dc577d1d5b531b0982294e36f9ecfed158d44cdb7c0d0e60f00a3
                • Instruction ID: d026ad823d76bfa005cbc37fc68bce9dc0ee76f63de7adf889209c84d2e17eba
                • Opcode Fuzzy Hash: d5374fcddf0dc577d1d5b531b0982294e36f9ecfed158d44cdb7c0d0e60f00a3
                • Instruction Fuzzy Hash: 57F0BE326012256FDA226A76DC05B6B378EAF813A0B16C712AD089A0C1CB70EE0086E1
                APIs
                • RtlAllocateHeap.NTDLL(00000000,?,?,?,008EE0EB,?,?,?,?,?,00812D8D,008EB16C,?,?,008EB16C), ref: 009048D0
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID: AllocateHeap
                • String ID:
                • API String ID: 1279760036-0
                • Opcode ID: ab3fb651a64cd7955a37cad392b8e45e3153a6632dae913e3831c28984a9644e
                • Instruction ID: 83b2e8836c1a1d03630b5449f2852afacb2b3c5f6c89f57cf1ad35ca2f87eed3
                • Opcode Fuzzy Hash: ab3fb651a64cd7955a37cad392b8e45e3153a6632dae913e3831c28984a9644e
                • Instruction Fuzzy Hash: 68E09B751526955FD62137754D05B6B374DDF823B0F174E31AF04A60D1DB60DC1092F1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: $+$+Inf$-Inf$Inf$NaN$gfff
                • API String ID: 0-2577472133
                • Opcode ID: 0355471480e98053688096f20e32263b38493a5a1149038b6ff433aecf5326c6
                • Instruction ID: 9333478d9d99dae0788c1edb744fe0477f6ab598ed5e92219a1a27bb6d4be171
                • Opcode Fuzzy Hash: 0355471480e98053688096f20e32263b38493a5a1149038b6ff433aecf5326c6
                • Instruction Fuzzy Hash: E382AC7190CB808FDB26DF28955036ABBE1FFDA344F088A5EE4CAD7252D731D9458B42
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: BINARY$MATCH$NOCASE$RTRIM$automatic extension loading failed: %s$no such vfs: %s$sqlite_rename_table
                • API String ID: 0-1885142750
                • Opcode ID: 76a0c4cfe7cae5fb48c007fa474e6d4e96a1c03395a00f229a5a67a5217b0dfe
                • Instruction ID: 2ee3bc6b4650561f4c806c087d825bd2522227abe3d2978f806340d98854845a
                • Opcode Fuzzy Hash: 76a0c4cfe7cae5fb48c007fa474e6d4e96a1c03395a00f229a5a67a5217b0dfe
                • Instruction Fuzzy Hash: CC0215B4B04780ABEB249F26DC45B2A77F4FF42B04F148428E456DB291E7B5F945CB82
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: %s|%s$131$50500$type must be boolean, but is
                • API String ID: 0-353184664
                • Opcode ID: e73791d36259b26de5dcfcd758729384f36fd0af1e82e5af3576405ece4b4fd2
                • Instruction ID: d5df2086401098dba0af33054c68a0fb160d1d8dfd9965b01f307e86d572adec
                • Opcode Fuzzy Hash: e73791d36259b26de5dcfcd758729384f36fd0af1e82e5af3576405ece4b4fd2
                • Instruction Fuzzy Hash: C323DE709002688FDB29DF68D958BEEBBB0FF05304F1481D9D449AB292DB719E85CF91
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: /Kim$/Kim$type must be number, but is $type must be string, but is
                • API String ID: 0-1144537432
                • Opcode ID: 81fa79241835be1deb171b73f99c1af8d03698f66f9535c04b42004e33e4c9f8
                • Instruction ID: 97c6ead9eb23ada807462bae5de0ca515af7c99cc69ce0774656c82e78b9fc62
                • Opcode Fuzzy Hash: 81fa79241835be1deb171b73f99c1af8d03698f66f9535c04b42004e33e4c9f8
                • Instruction Fuzzy Hash: C491D471F002089FCB08DF6CD891799B7A9FB89320F14827EE819D7392D6759D45CB91
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID: Mtx_unlock
                • String ID:
                • API String ID: 1418687624-0
                • Opcode ID: 9552c0670b832b6aee7f64e0c840a1374494b052279fee64068258eaad4aab42
                • Instruction ID: 84f84941352031036e671bb66780131b68d986099dcaeb4975cc5b2828788a71
                • Opcode Fuzzy Hash: 9552c0670b832b6aee7f64e0c840a1374494b052279fee64068258eaad4aab42
                • Instruction Fuzzy Hash: 8E321671E002188FDB08DF68DC85BAEB7B5FF45304F148258E815EB392D771AA85CBA1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: File
                • API String ID: 0-749574446
                • Opcode ID: 3242747179d13cd60cef5c5d1418b34dcb193274d99ad18486608cf6f40bc65f
                • Instruction ID: e9c9613ee60acfcc632ae4b8d04886a9c349235a0b90b4d18721e6bcd34cf176
                • Opcode Fuzzy Hash: 3242747179d13cd60cef5c5d1418b34dcb193274d99ad18486608cf6f40bc65f
                • Instruction Fuzzy Hash: 87C1BE70D042589BDF19DFA4CD46BEEBBB9FF05304F144069E504EB292E770A984CBA2
                APIs
                • GetSystemTimePreciseAsFileTime.KERNEL32(?,008EC6EA,?,?,?,?,00824A9B,?,0082F03C), ref: 008ECCF5
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID: Time$FilePreciseSystem
                • String ID:
                • API String ID: 1802150274-0
                • Opcode ID: 55c8e319957ad8ec8bccdefa4a1f5c448e2b8325691da333bc6ba2bab5963141
                • Instruction ID: cad081667f3140836fb7cc631583baf155f178f66868506cb7be2c50f9474479
                • Opcode Fuzzy Hash: 55c8e319957ad8ec8bccdefa4a1f5c448e2b8325691da333bc6ba2bab5963141
                • Instruction Fuzzy Hash: 05D02232A9A0BC938A112FD6FC048ADBBC8FF0AF503188022EE09B7110CA515C016BC1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID: std::invalid_argument::invalid_argument
                • String ID: string too long
                • API String ID: 2141394445-2556327735
                • Opcode ID: d322beb73c5d1857adad5f40369910d09548d578e9402c1bcd3446f6aa14d7e6
                • Instruction ID: 4ca8216200c7f52c6e0087a65a199daa631978519516b0c64efe4db96e9b0736
                • Opcode Fuzzy Hash: d322beb73c5d1857adad5f40369910d09548d578e9402c1bcd3446f6aa14d7e6
                • Instruction Fuzzy Hash: 8D810275A0428A9FDB02CFA8C4117EEFFB9FF5A300F184199D980A7782C3759595C7A1
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c75b1fd408136c90835c517d75e53ec52e252a5b5c7417f783b855f3eeac263b
                • Instruction ID: 64a7dbe16fdb50e2d9d143e1cda41fb1e3e05e6aba333236cceb8e86d8f7405c
                • Opcode Fuzzy Hash: c75b1fd408136c90835c517d75e53ec52e252a5b5c7417f783b855f3eeac263b
                • Instruction Fuzzy Hash: 4B920531D002488BDF19CFA8C8547FEBB7AFF56314F248299D455E7282DB705A8ACB91
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7812efc9b04549aecba84b24a5a49a0e557f6a7234d610653b8af3f5e07826ed
                • Instruction ID: add3ad7f756307921b4321f4f66640f85d7258054c658c8baf6e6bf9a287b89e
                • Opcode Fuzzy Hash: 7812efc9b04549aecba84b24a5a49a0e557f6a7234d610653b8af3f5e07826ed
                • Instruction Fuzzy Hash: FB6259B0E002099BDF19DF99C5846ADBBB1FF88308F2881A9D814AB352D775D946CF90
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7d6eab88acd924515a17f75b29c4d7eea2e03814bf60de5d3474b6b4b1b489dc
                • Instruction ID: 02efa1b3a5968cb8eef03e239df1878dfd7755f08ef75fece72a70f3d6b91891
                • Opcode Fuzzy Hash: 7d6eab88acd924515a17f75b29c4d7eea2e03814bf60de5d3474b6b4b1b489dc
                • Instruction Fuzzy Hash: 01C1CB70A0064E8ECB24CF3CC984BBABBA1FF05314F24461DDAD6D72A1D771A945CB52
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a706a3b1c6c27a8516bd5cd5d075668304d2d59c0120b8328fe337e360b6d652
                • Instruction ID: a35ce3c7f7823e4b1aa6c7b95e8d5275c5be1ce1eb1ca6bf79ffda1be5496b36
                • Opcode Fuzzy Hash: a706a3b1c6c27a8516bd5cd5d075668304d2d59c0120b8328fe337e360b6d652
                • Instruction Fuzzy Hash: 4A712175A002468FDB118F68D8907FEBBB9FF1A300F044168D865D7792C3349956C7A0
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f7cc22953cc08329244c376f43ecb02dd8e89c8a38b4daede76ce5b0ac66f33a
                • Instruction ID: 43314cf89851b8718529e045e22968ebc88b9f9e83bd4347651150fe1c68c5af
                • Opcode Fuzzy Hash: f7cc22953cc08329244c376f43ecb02dd8e89c8a38b4daede76ce5b0ac66f33a
                • Instruction Fuzzy Hash: 96617531A341654FDBA8CF1EFCD0476B351E38A3617894229EA81CB39DC535E927E7A0
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7cc65e9ec566d855f4bcf7f83d3a0ef34481909f77aa7866fa384ed9eea63f5f
                • Instruction ID: b5579f5630379ecac2ae057d326cc944db2d526b264093e9c361c49770e17677
                • Opcode Fuzzy Hash: 7cc65e9ec566d855f4bcf7f83d3a0ef34481909f77aa7866fa384ed9eea63f5f
                • Instruction Fuzzy Hash: 7851A171E002199FCB14DFA8D941BEEBBB4FF48710F208269E815F7390D7719A448BA5
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b904313642ee8bb92eeea3ac85b95f5796e84e1ff494d4087d2543a59d71a9f0
                • Instruction ID: 91a6b96c2cf5be1d0fe3d196e6fac8e5497d22ebd1d456a68aec34588d970841
                • Opcode Fuzzy Hash: b904313642ee8bb92eeea3ac85b95f5796e84e1ff494d4087d2543a59d71a9f0
                • Instruction Fuzzy Hash: F3518172E00219EFDF04CFA8C850AFEBBB2FF88304F598059E615AB241D7349A51CB90
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                • Instruction ID: adbcdbdfcb21b20c168d433bb91263f7de9e3571814da72e52c338219c0e2f0e
                • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                • Instruction Fuzzy Hash: ED11387B20514D8BD614A63DC8B46BBA795FAC532172C42FAD282CB75AD223B8419D00
                APIs
                • std::_Lockit::_Lockit.LIBCPMT ref: 0087AEB3
                • std::_Lockit::_Lockit.LIBCPMT ref: 0087AED5
                • std::_Lockit::~_Lockit.LIBCPMT ref: 0087AEF5
                • std::_Lockit::~_Lockit.LIBCPMT ref: 0087AF1F
                • std::_Lockit::_Lockit.LIBCPMT ref: 0087AF8D
                • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0087AFD9
                • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0087AFF3
                • std::_Lockit::~_Lockit.LIBCPMT ref: 0087B088
                • std::_Facet_Register.LIBCPMT ref: 0087B095
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                • String ID: bad locale name
                • API String ID: 3375549084-1405518554
                • Opcode ID: a184d629fae884b0c9cd0c626dd86563ebc9294c6865a637a9335941f757373b
                • Instruction ID: 78069beb66945e90579061f91298943cbb1ba47825aa59241ad6cb6d81ad4541
                • Opcode Fuzzy Hash: a184d629fae884b0c9cd0c626dd86563ebc9294c6865a637a9335941f757373b
                • Instruction Fuzzy Hash: 90616EB5D002589BDB11DFA9D885B9EBBB4FF45350F148068E808E7386EB34ED05CB92
                APIs
                • std::_Lockit::_Lockit.LIBCPMT ref: 008137E9
                • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00813835
                • __Getctype.LIBCPMT ref: 0081384E
                • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0081386A
                • std::_Lockit::~_Lockit.LIBCPMT ref: 008138FF
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                • String ID: bad locale name
                • API String ID: 1840309910-1405518554
                • Opcode ID: 4a6827e29074a3c7439e1d69f0bef7c43f9defb488abc27b7b12232de2289f32
                • Instruction ID: ca9580bc4cae2eed373fa1715aeae524c37190eb2b025c018a9c1f55703e0ff0
                • Opcode Fuzzy Hash: 4a6827e29074a3c7439e1d69f0bef7c43f9defb488abc27b7b12232de2289f32
                • Instruction Fuzzy Hash: 375170F1D002489BDB10DFA9D8857DEFBB8FF14314F144169E804E7281E775AA54CB92
                APIs
                • _ValidateLocalCookies.LIBCMT ref: 008F08B7
                • ___except_validate_context_record.LIBVCRUNTIME ref: 008F08BF
                • _ValidateLocalCookies.LIBCMT ref: 008F0948
                • __IsNonwritableInCurrentImage.LIBCMT ref: 008F0973
                • _ValidateLocalCookies.LIBCMT ref: 008F09C8
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                • String ID: csm
                • API String ID: 1170836740-1018135373
                • Opcode ID: d7fdb0e7b428fa0fd424f88aabd467b8bd4808c636545135f64401e85498d9b5
                • Instruction ID: a41896436fccb4f72e9f8a5bd1571f37759cff0ca88e98c1a3b0674ef042c83f
                • Opcode Fuzzy Hash: d7fdb0e7b428fa0fd424f88aabd467b8bd4808c636545135f64401e85498d9b5
                • Instruction Fuzzy Hash: 2C416B34A0020DAFCF10DF78C884ABEBBA5FF44324F148155EA18DB293E671AA55CF91
                APIs
                • std::_Lockit::_Lockit.LIBCPMT ref: 00879543
                • std::_Lockit::_Lockit.LIBCPMT ref: 00879566
                • std::_Lockit::~_Lockit.LIBCPMT ref: 00879586
                • std::_Facet_Register.LIBCPMT ref: 008795FB
                • std::_Lockit::~_Lockit.LIBCPMT ref: 00879613
                • Concurrency::cancel_current_task.LIBCPMT ref: 0087962B
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                • String ID:
                • API String ID: 2081738530-0
                • Opcode ID: 88d1bdddd163a7bc704b47bfbb60acef715c9a69f863e0f2a91e90cfbe468bd0
                • Instruction ID: b9a536d208d29546e46ead2652c9a4dfbaa6d20ac60579c1135ec76ddb68728c
                • Opcode Fuzzy Hash: 88d1bdddd163a7bc704b47bfbb60acef715c9a69f863e0f2a91e90cfbe468bd0
                • Instruction Fuzzy Hash: DE41D4759042699FCB11EF98D840AAABB74FF06314F148259E849EB391E730ED44CBD2
                APIs
                • ___std_exception_destroy.LIBVCRUNTIME ref: 008160F2
                • ___std_exception_destroy.LIBVCRUNTIME ref: 0081617F
                • ___std_exception_copy.LIBVCRUNTIME ref: 00816248
                Strings
                • recursive_directory_iterator::operator++, xrefs: 008161CC
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_destroy$___std_exception_copy
                • String ID: recursive_directory_iterator::operator++
                • API String ID: 1206660477-953255998
                • Opcode ID: c7f8952b84adcec32bda36f14eab7711dea0981c6ef3166f9a8c02496eed72e4
                • Instruction ID: 4aa153a55dff97531e1bf7b7e919c954b0b81223b1cd7854a1aee1ba098e23bc
                • Opcode Fuzzy Hash: c7f8952b84adcec32bda36f14eab7711dea0981c6ef3166f9a8c02496eed72e4
                • Instruction Fuzzy Hash: 60E1E1B19006089FDB28DF68D845B9EB7F9FF44300F14861DE456D7781EB74AA84CBA2
                APIs
                • ___std_exception_destroy.LIBVCRUNTIME ref: 008186DE
                • ___std_exception_destroy.LIBVCRUNTIME ref: 008186ED
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_destroy
                • String ID: at line $, column
                • API String ID: 4194217158-191570568
                • Opcode ID: bdea18477d9eec8451d0077cf44711e29dba0deaa4dedae7dc8c6e40336fed63
                • Instruction ID: 15073f299c339923926ad3ceabfb0e5237b8f852a602c03b42ea7e7a6f8cf589
                • Opcode Fuzzy Hash: bdea18477d9eec8451d0077cf44711e29dba0deaa4dedae7dc8c6e40336fed63
                • Instruction Fuzzy Hash: 39612771A002489FDB08CB6CDC86BDEBBB6FF55314F148218E415E7781EB70AAC48792
                APIs
                • ___std_exception_destroy.LIBVCRUNTIME ref: 00883946
                • ___std_exception_destroy.LIBVCRUNTIME ref: 0088395F
                • ___std_exception_destroy.LIBVCRUNTIME ref: 00883A97
                • ___std_exception_destroy.LIBVCRUNTIME ref: 00883AB0
                • ___std_exception_destroy.LIBVCRUNTIME ref: 00883C16
                • ___std_exception_destroy.LIBVCRUNTIME ref: 00883C2F
                • ___std_exception_destroy.LIBVCRUNTIME ref: 00884479
                • ___std_exception_destroy.LIBVCRUNTIME ref: 00884492
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_destroy
                • String ID: value
                • API String ID: 4194217158-494360628
                • Opcode ID: 4314ba4b082901549e063d571a0f456ad84d4363c43eed471069e62a2a405dc5
                • Instruction ID: 332b9293768771780e171fda35d32598202977a08ebdedb021b44c3e547b137b
                • Opcode Fuzzy Hash: 4314ba4b082901549e063d571a0f456ad84d4363c43eed471069e62a2a405dc5
                • Instruction Fuzzy Hash: DF51B171C0125CDBDF14EBA8CC85BDEBBB5FF05304F144259E459A7282EB746A88CB62
                APIs
                • ___std_exception_copy.LIBVCRUNTIME ref: 00813C0F
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_copy
                • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                • API String ID: 2659868963-1866435925
                • Opcode ID: 2718c3d4b724650f06aef74d61a15e7df01aba7cffe4d9c1b0e8b3a0c219ab42
                • Instruction ID: 7273ae87684aab35300177e1c25b4683cae440efdeab6344e1793dbf4db60aa5
                • Opcode Fuzzy Hash: 2718c3d4b724650f06aef74d61a15e7df01aba7cffe4d9c1b0e8b3a0c219ab42
                • Instruction Fuzzy Hash: 781190B2A047096BC720DE59D805ADAB7ECFF45320F04852AF958DB641F770E9948B91
                Strings
                • unordered_map/set too long, xrefs: 00882F43
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: unordered_map/set too long
                • API String ID: 0-306623848
                • Opcode ID: bd1903898a5f94d22e640f07947c74097ef6cff93c6a8b913023e44b27dc7fa5
                • Instruction ID: bf6ed7b110bd8f9c882e6c977402f16a4251c818710ae553615cbec6c585ff18
                • Opcode Fuzzy Hash: bd1903898a5f94d22e640f07947c74097ef6cff93c6a8b913023e44b27dc7fa5
                • Instruction Fuzzy Hash: A3E1C271A002099FCB18EF6CC895AADBBB5FF49310B148369E819DB395E730ED51CB90
                APIs
                • ___std_exception_copy.LIBVCRUNTIME ref: 0081844D
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_copy
                • String ID: parse error$ror
                • API String ID: 2659868963-4201802366
                • Opcode ID: 51fd52c70b860de1f83952d6938f0ebe0c7ed9b5413fbfd585c75370cbbcc2fe
                • Instruction ID: 35117ddea4aa2f9777d9a6889943dc418dbd8fbbaffff14da5fb271f5d4cc869
                • Opcode Fuzzy Hash: 51fd52c70b860de1f83952d6938f0ebe0c7ed9b5413fbfd585c75370cbbcc2fe
                • Instruction Fuzzy Hash: 91C1D071D10649DFEB09CF68CC85BADBB76FF45304F148248E004AB692DBB4AAC5CB91
                APIs
                • ___std_exception_destroy.LIBVCRUNTIME ref: 00818051
                • ___std_exception_destroy.LIBVCRUNTIME ref: 00818060
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_destroy
                • String ID: [json.exception.
                • API String ID: 4194217158-791563284
                • Opcode ID: 76a89d96908d0ef1b5693b77faee1a366458fea5149b26f17eec5e4a63076785
                • Instruction ID: 4aef3a903d32bed70d49980ad4ea050fa7b5ac5ee95283a33893ea67623f84c6
                • Opcode Fuzzy Hash: 76a89d96908d0ef1b5693b77faee1a366458fea5149b26f17eec5e4a63076785
                • Instruction Fuzzy Hash: 9E91D2719002489FDB18CFA8C885BEEBBB5FF45314F14825DE414AB692DBB0A9C58B91
                APIs
                • ___std_exception_copy.LIBVCRUNTIME ref: 00813C0F
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_copy
                • String ID: ios_base::badbit set$ios_base::failbit set
                • API String ID: 2659868963-1240500531
                • Opcode ID: 6126689fdd61dbdc4e42dd1d549bd10be6a125203abb21a821ad7f7d626b1908
                • Instruction ID: 69ac7c492004c45f9ead1a758e89af60b300b40438425b303389c790b103e7d8
                • Opcode Fuzzy Hash: 6126689fdd61dbdc4e42dd1d549bd10be6a125203abb21a821ad7f7d626b1908
                • Instruction Fuzzy Hash: 6D41D3B1914608ABC714DF59D845BEAFBF8FF45320F14821AF958D7681E770AA80CBA1
                APIs
                • ___std_exception_destroy.LIBVCRUNTIME ref: 00884E29
                • ___std_exception_destroy.LIBVCRUNTIME ref: 00884E42
                • ___std_exception_destroy.LIBVCRUNTIME ref: 0088594D
                • ___std_exception_destroy.LIBVCRUNTIME ref: 00885966
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_destroy
                • String ID: value
                • API String ID: 4194217158-494360628
                • Opcode ID: c819c5d70a708d02422cab54a74d5eea3d320e939f842c7ff379fe79fad353fc
                • Instruction ID: 3d9e99a5d01a3a6a0218ca706c946c91942d5e1120ae48fd296527a7a9783e08
                • Opcode Fuzzy Hash: c819c5d70a708d02422cab54a74d5eea3d320e939f842c7ff379fe79fad353fc
                • Instruction Fuzzy Hash: CA51CEB1C0025CDBDB14EFA8DC89BDEBBB5FF05304F144259E455AB382DB746A888B52
                APIs
                • Concurrency::cancel_current_task.LIBCPMT ref: 008899F1
                Strings
                • type must be boolean, but is , xrefs: 00889AE2
                • type must be string, but is , xrefs: 00889A58
                Memory Dump Source
                • Source File: 00000000.00000002.4483066704.0000000000811000.00000040.00000001.01000000.00000003.sdmp, Offset: 00810000, based on PE: true
                • Associated: 00000000.00000002.4482963850.0000000000810000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4483066704.0000000000943000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484209570.0000000000947000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.000000000095A000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000AEE000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000BCA000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C05000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4484278171.0000000000C1C000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485019093.0000000000C1D000.00000080.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4485275359.0000000000DD2000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_810000_Lisect_AVT_24003_G1B_108.jbxd
                Yara matches
                Similarity
                • API ID: Concurrency::cancel_current_task
                • String ID: type must be boolean, but is $type must be string, but is
                • API String ID: 118556049-436076039
                • Opcode ID: 43b6de997854c0cce545174d240b9e11cc8c5b6bc60ed12f61ff68aaeb18c961
                • Instruction ID: f88220fd376f1d08ccee528931eabf6e1501cf9e5b2ba65dac967666c4ed8a9f
                • Opcode Fuzzy Hash: 43b6de997854c0cce545174d240b9e11cc8c5b6bc60ed12f61ff68aaeb18c961
                • Instruction Fuzzy Hash: 25312C719002489FD714EBA8D842FEEB7ADFF04310F144269F419D7686EB35AA45C753

                Execution Graph

                Execution Coverage:2%
                Dynamic/Decrypted Code Coverage:1.4%
                Signature Coverage:0%
                Total number of Nodes:291
                Total number of Limit Nodes:30
                execution_graph 23683 522dd0 23686 522d0e 23683->23686 23685 522de2 23689 522d1a std::_Locinfo::_Locinfo_ctor 23686->23689 23687 522d21 23704 52acaf RtlAllocateHeap __dosmaperr 23687->23704 23689->23687 23691 522d41 23689->23691 23690 522d26 23705 522210 RtlAllocateHeap ___std_exception_copy 23690->23705 23693 522d53 23691->23693 23694 522d46 23691->23694 23700 5340f8 23693->23700 23706 52acaf RtlAllocateHeap __dosmaperr 23694->23706 23697 522d5c 23699 522d31 23697->23699 23707 52acaf RtlAllocateHeap __dosmaperr 23697->23707 23699->23685 23701 534104 std::_Lockit::_Lockit std::_Locinfo::_Locinfo_ctor 23700->23701 23708 53419c 23701->23708 23703 53411f 23703->23697 23704->23690 23705->23699 23706->23699 23707->23699 23711 5341bf 23708->23711 23709 534205 23709->23703 23711->23709 23714 533e63 23711->23714 23712 534220 23718 534823 RtlAllocateHeap __dosmaperr 23712->23718 23717 533e70 __Getctype std::_Facet_Register 23714->23717 23715 533e9b RtlAllocateHeap 23716 533eae __dosmaperr 23715->23716 23715->23717 23716->23712 23717->23715 23717->23716 23718->23709 24097 442540 RtlAllocateHeap RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_ctor 23720 526658 23721 52666b ___std_exception_copy 23720->23721 23726 526533 23721->23726 23723 526677 23733 521f4c RtlAllocateHeap ___std_exception_copy 23723->23733 23725 526683 23727 52653f std::_Locinfo::_Locinfo_ctor 23726->23727 23728 526549 23727->23728 23731 52656c 23727->23731 23748 522193 RtlAllocateHeap ___std_exception_copy __Getctype 23728->23748 23730 526564 23730->23723 23731->23730 23734 5265ca 23731->23734 23733->23725 23735 5265d7 23734->23735 23736 5265fa 23734->23736 23773 522193 RtlAllocateHeap ___std_exception_copy __Getctype 23735->23773 23738 5265f2 23736->23738 23749 523041 23736->23749 23738->23730 23744 526626 23766 5324af 23744->23766 23748->23730 23750 52305a 23749->23750 23754 523081 23749->23754 23751 5339f2 RtlAllocateHeap 23750->23751 23750->23754 23752 523076 23751->23752 23775 532dfb 23752->23775 23755 53485d 23754->23755 23756 534874 23755->23756 23757 52661a 23755->23757 23756->23757 23843 534823 RtlAllocateHeap __dosmaperr 23756->23843 23759 5339f2 23757->23759 23760 533a13 23759->23760 23761 5339fe 23759->23761 23760->23744 23844 52acaf RtlAllocateHeap __dosmaperr 23761->23844 23763 533a03 23845 522210 RtlAllocateHeap ___std_exception_copy 23763->23845 23765 533a0e 23765->23744 23767 5324d8 23766->23767 23768 52662d 23766->23768 23769 532527 23767->23769 23771 5324ff 23767->23771 23768->23738 23774 534823 RtlAllocateHeap __dosmaperr 23768->23774 23850 522193 RtlAllocateHeap ___std_exception_copy __Getctype 23769->23850 23846 53241e 23771->23846 23773->23738 23774->23738 23777 532e07 std::_Locinfo::_Locinfo_ctor 23775->23777 23776 532e48 23796 522193 RtlAllocateHeap ___std_exception_copy __Getctype 23776->23796 23777->23776 23779 532e8e 23777->23779 23781 532e0f 23777->23781 23779->23781 23782 532f0c 23779->23782 23781->23754 23783 532f34 23782->23783 23795 532f57 23782->23795 23784 532f38 23783->23784 23786 532f93 23783->23786 23802 522193 RtlAllocateHeap ___std_exception_copy __Getctype 23784->23802 23787 532fb1 23786->23787 23803 52bbed 23786->23803 23797 532a51 23787->23797 23791 533010 23793 533079 WriteFile 23791->23793 23791->23795 23792 532fc9 23792->23795 23806 532622 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_ctor _ValidateLocalCookies 23792->23806 23793->23795 23795->23781 23796->23781 23807 53e7b4 23797->23807 23799 532a63 23800 532a91 23799->23800 23816 527780 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_ctor ___std_exception_copy 23799->23816 23800->23791 23800->23792 23802->23795 23820 52bacc 23803->23820 23805 52bc06 23805->23787 23806->23795 23808 53e7c1 23807->23808 23809 53e7ce 23807->23809 23817 52acaf RtlAllocateHeap __dosmaperr 23808->23817 23812 53e7da 23809->23812 23818 52acaf RtlAllocateHeap __dosmaperr 23809->23818 23811 53e7c6 23811->23799 23812->23799 23814 53e7fb 23819 522210 RtlAllocateHeap ___std_exception_copy 23814->23819 23816->23800 23817->23811 23818->23814 23819->23811 23825 53814e 23820->23825 23822 52bade 23823 52bafa SetFilePointerEx 23822->23823 23824 52bae6 23822->23824 23823->23824 23824->23805 23826 53815b 23825->23826 23828 538170 23825->23828 23838 52ac9c RtlAllocateHeap __dosmaperr 23826->23838 23833 538195 23828->23833 23840 52ac9c RtlAllocateHeap __dosmaperr 23828->23840 23829 538160 23839 52acaf RtlAllocateHeap __dosmaperr 23829->23839 23831 5381a0 23841 52acaf RtlAllocateHeap __dosmaperr 23831->23841 23833->23822 23835 538168 23835->23822 23836 5381a8 23842 522210 RtlAllocateHeap ___std_exception_copy 23836->23842 23838->23829 23839->23835 23840->23831 23841->23836 23842->23835 23843->23757 23844->23763 23845->23765 23847 53242a std::_Locinfo::_Locinfo_ctor 23846->23847 23849 532469 23847->23849 23851 532582 23847->23851 23849->23768 23850->23768 23852 53814e RtlAllocateHeap 23851->23852 23854 532592 23852->23854 23855 53814e RtlAllocateHeap 23854->23855 23861 532598 23854->23861 23862 5325ca 23854->23862 23857 5325c1 23855->23857 23856 53814e RtlAllocateHeap 23858 5325d6 FindCloseChangeNotification 23856->23858 23860 53814e RtlAllocateHeap 23857->23860 23858->23861 23859 5325f0 23859->23849 23860->23862 23863 5380bd RtlAllocateHeap __dosmaperr 23861->23863 23862->23856 23862->23861 23863->23859 23864 52abd8 23865 52abeb ___std_exception_copy 23864->23865 23870 52a9ba 23865->23870 23867 52ac00 23878 521f4c RtlAllocateHeap ___std_exception_copy 23867->23878 23869 52ac0d 23871 52a9f0 23870->23871 23872 52a9c8 23870->23872 23871->23867 23872->23871 23873 52a9f7 23872->23873 23874 52a9d5 23872->23874 23879 52a913 23873->23879 23883 522193 RtlAllocateHeap ___std_exception_copy __Getctype 23874->23883 23877 52aa2f 23877->23867 23878->23869 23880 52a91f std::_Locinfo::_Locinfo_ctor 23879->23880 23884 52a96e 23880->23884 23882 52a93a 23882->23877 23883->23871 23891 5360b3 23884->23891 23890 52a9b0 23890->23882 23908 536075 23891->23908 23893 52a986 23898 52aa31 23893->23898 23894 5360c4 23894->23893 23915 53489d RtlAllocateHeap RtlAllocateHeap __dosmaperr __Getctype std::_Facet_Register 23894->23915 23896 53611d 23916 534823 RtlAllocateHeap __dosmaperr 23896->23916 23901 52aa43 23898->23901 23902 52a9a4 23898->23902 23899 52aa51 23917 522193 RtlAllocateHeap ___std_exception_copy __Getctype 23899->23917 23901->23899 23901->23902 23906 52aa87 std::_Locinfo::_Locinfo_ctor 23901->23906 23907 53615e SetFilePointerEx WriteFile RtlAllocateHeap RtlAllocateHeap 23902->23907 23903 523041 4 API calls 23903->23906 23904 5339f2 RtlAllocateHeap 23904->23906 23905 532dfb 4 API calls 23905->23906 23906->23902 23906->23903 23906->23904 23906->23905 23907->23890 23909 536081 23908->23909 23910 5360ab 23909->23910 23911 5339f2 RtlAllocateHeap 23909->23911 23910->23894 23912 53609c 23911->23912 23913 53e7b4 RtlAllocateHeap 23912->23913 23914 5360a2 23913->23914 23914->23894 23915->23896 23916->23893 23917->23902 24103 448b00 RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 24104 45a100 7 API calls 3 library calls 23919 4f2083d 23920 4f2082d GetCurrentHwProfileW 23919->23920 23922 4f20869 23920->23922 24089 4bca10 RtlAllocateHeap 23932 45ec20 23933 45f0bf 23932->23933 23936 45ec5e 23932->23936 23934 45eca7 setsockopt recv 23934->23936 23936->23933 23936->23934 23937 45f0aa Sleep 23936->23937 23938 45ecff 23936->23938 23941 45f09c Sleep 23936->23941 23950 45db60 WSAStartup 23936->23950 23956 454a90 23936->23956 23959 45e060 23936->23959 23937->23933 23937->23936 23974 4a8610 23938->23974 23941->23937 23942 45ed38 recv 23943 45ed59 recv 23942->23943 23947 45ed7a 23942->23947 23943->23947 23946 4a8610 2 API calls 23946->23947 23947->23941 23947->23946 23949 45edf0 recv 23947->23949 23979 4a5d50 23947->23979 23996 45e460 6 API calls 23947->23996 23949->23947 23951 45db98 23950->23951 23954 45dc56 23950->23954 23952 45dc24 socket 23951->23952 23951->23954 23953 45dc3a connect 23952->23953 23952->23954 23953->23954 23955 45dc4c closesocket 23953->23955 23954->23936 23955->23952 23955->23954 23997 51c6dc 23956->23997 23958 454a9b __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 23958->23936 23960 4a5d50 2 API calls 23959->23960 23964 45e0aa 23960->23964 23962 45e204 23963 45e44b 23962->23963 23966 45e22e 23962->23966 24009 522220 RtlAllocateHeap ___std_exception_copy __Getctype 23963->24009 24004 4a5bd0 23964->24004 23967 4a8610 2 API calls 23966->23967 23970 45e26e std::_Locinfo::_Locinfo_ctor 23966->23970 23967->23970 23971 45e3b7 23970->23971 23973 45e393 WSASend 23970->23973 23972 45e423 23971->23972 24010 522220 RtlAllocateHeap ___std_exception_copy __Getctype 23971->24010 23972->23936 23973->23970 23973->23971 23975 4a8657 23974->23975 23976 4a8628 std::locale::_Setgloballocale 23974->23976 24012 4aba20 23975->24012 23976->23942 23978 4a866a 23978->23942 23980 4a5d7a 23979->23980 23981 4a5d8b 23980->23981 23982 4a5e32 23980->23982 23983 4a5d97 std::_Locinfo::_Locinfo_ctor 23981->23983 23985 4a5dbc 23981->23985 23988 4a5dfe 23981->23988 23989 4a5df5 23981->23989 24046 442040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 23982->24046 23983->23947 23990 51cd02 std::_Facet_Register 2 API calls 23985->23990 23986 4a5e37 24047 441fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 23986->24047 23993 51cd02 std::_Facet_Register 2 API calls 23988->23993 23994 4a5dd6 std::_Locinfo::_Locinfo_ctor 23988->23994 23989->23985 23989->23986 23991 4a5dcf 23990->23991 23991->23994 24048 522220 RtlAllocateHeap ___std_exception_copy __Getctype 23991->24048 23993->23994 23994->23947 23996->23947 24000 51ccdc 23997->24000 24001 51c6ea 24000->24001 24002 51cced GetSystemTimePreciseAsFileTime 24000->24002 24001->23958 24002->24001 24005 4a5c01 24004->24005 24006 4a5bde 24004->24006 24005->23962 24006->24005 24011 522220 RtlAllocateHeap ___std_exception_copy __Getctype 24006->24011 24013 4abb6c 24012->24013 24014 4aba45 24012->24014 24035 442040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 24013->24035 24017 4abab3 24014->24017 24018 4abaa6 24014->24018 24020 4aba5a 24014->24020 24016 4abb71 24036 441fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 24016->24036 24023 51cd02 std::_Facet_Register 2 API calls 24017->24023 24025 4aba6a std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 24017->24025 24018->24016 24018->24020 24027 51cd02 24020->24027 24023->24025 24026 4abb2a std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 24025->24026 24037 522220 RtlAllocateHeap ___std_exception_copy __Getctype 24025->24037 24026->23978 24030 51cd07 std::_Facet_Register 24027->24030 24029 51cd21 24029->24025 24030->24029 24032 441fa0 Concurrency::cancel_current_task 24030->24032 24039 52b99c 24030->24039 24031 51cd2d 24031->24031 24032->24031 24038 51e0c1 RtlAllocateHeap RtlAllocateHeap __freea ___std_exception_copy 24032->24038 24034 441fe3 24034->24025 24035->24016 24036->24025 24038->24034 24044 53489d __Getctype std::_Facet_Register 24039->24044 24040 5348db 24045 52acaf RtlAllocateHeap __dosmaperr 24040->24045 24042 5348c6 RtlAllocateHeap 24043 5348d9 24042->24043 24042->24044 24043->24030 24044->24040 24044->24042 24045->24043 24046->23986 24047->23991 24051 4f20598 GetCurrentHwProfileW 24054 526ba6 24055 526bb9 ___std_exception_copy 24054->24055 24060 5268fd 24055->24060 24057 526bce 24067 521f4c RtlAllocateHeap ___std_exception_copy 24057->24067 24059 526bdb 24062 526909 std::_Locinfo::_Locinfo_ctor 24060->24062 24061 52690f 24077 522193 RtlAllocateHeap ___std_exception_copy __Getctype 24061->24077 24062->24061 24064 526952 24062->24064 24068 526a80 24064->24068 24066 52692a 24066->24057 24067->24059 24069 526a93 24068->24069 24070 526aa6 24068->24070 24069->24066 24078 5269a7 24070->24078 24072 526b57 24072->24066 24073 526ac9 24073->24072 24074 523041 4 API calls 24073->24074 24075 526af7 24074->24075 24076 52bbed 2 API calls 24075->24076 24076->24072 24077->24066 24079 526a10 24078->24079 24080 5269b8 24078->24080 24079->24073 24080->24079 24082 52bbad SetFilePointerEx RtlAllocateHeap ___std_exception_copy 24080->24082 24082->24079 24094 454ab0 GetPEB RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 0 45ec20-45ec58 1 45f0bf-45f0d3 0->1 2 45ec5e 0->2 3 45ec64-45ec6c 2->3 4 45eca7-45ecf0 setsockopt recv 3->4 5 45ec6e-45ec94 call 45db60 3->5 4->1 10 45ecf6-45ecf9 4->10 8 45ec99-45eca1 5->8 8->4 9 45f0aa-45f0b9 Sleep 8->9 9->1 9->3 11 45f037-45f053 call 454a90 10->11 12 45ecff-45ed53 call 4a8610 recv 10->12 17 45f055 11->17 18 45f09c-45f0a4 Sleep 11->18 22 45efe4-45eff1 12->22 23 45ed59-45ed74 recv 12->23 20 45f057-45f05d 17->20 21 45f05f-45f086 call 45e060 17->21 18->9 20->18 20->21 31 45f08b-45f097 21->31 22->18 26 45eff7-45f003 22->26 23->22 24 45ed7a-45edb1 23->24 29 45ee14-45ee44 call 4a5d50 24->29 30 45edb3-45ee11 call 4a8610 recv 24->30 27 45f005-45f013 26->27 28 45f019-45f023 call 51cf83 26->28 27->28 28->18 38 45ef64-45efb3 call 45e460 29->38 39 45ee4a 29->39 30->29 31->18 38->22 46 45efb5-45efc4 38->46 40 45ee50-45ef5e 39->40 40->38 47 45efc6-45efd4 46->47 48 45efda-45efe1 call 51cf83 46->48 47->48 48->22
                APIs
                • setsockopt.WS2_32(0000033C,0000FFFF,00001006,?,00000008), ref: 0045ECC7
                • recv.WS2_32(?,00000004,00000002), ref: 0045ECE1
                • recv.WS2_32(00000000,0000000C,00000002,0000000C), ref: 0045ED4E
                • recv.WS2_32(00000000,0000000C,00000008), ref: 0045ED6F
                • recv.WS2_32(00000000,?,00000008), ref: 0045EE0C
                  • Part of subcall function 0045DB60: WSAStartup.WS2_32 ref: 0045DB8A
                  • Part of subcall function 0045DB60: socket.WS2_32(?,?,?,?,?,?,50500,?,?), ref: 0045DC2E
                  • Part of subcall function 0045DB60: connect.WS2_32(00000000,?,?,?,?,?,50500,?,?), ref: 0045DC41
                  • Part of subcall function 0045DB60: closesocket.WS2_32(00000000), ref: 0045DC4D
                • recv.WS2_32(?,00000004,00000008), ref: 0045F033
                • Sleep.KERNELBASE(00000001), ref: 0045F09E
                • Sleep.KERNELBASE(00000064), ref: 0045F0AC
                • __Mtx_unlock.LIBCPMT ref: 0045F211
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000006.00000002.4482949788.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483035016.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483266685.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4484923411.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4485278681.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: recv$Sleep$Mtx_unlockStartupclosesocketconnectsetsockoptsocket
                • String ID: 50500$t;W
                • API String ID: 2930922264-3984008218
                • Opcode ID: 31dc3274648ddebbffa37d935dfc29c21b1a93fbd36d273ad94ef3e5f32530c1
                • Instruction ID: 8fc74847e687bbc3803c5546e39a419ecb7d6f956186c4aa97bf6ee06bfcfc46
                • Opcode Fuzzy Hash: 31dc3274648ddebbffa37d935dfc29c21b1a93fbd36d273ad94ef3e5f32530c1
                • Instruction Fuzzy Hash: 51B10331D00248DFEB14DFA8DC45BADBBB1FF55310F24825AE848A72D2D7746A89DB81

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 51 45e060-45e0af call 4a5d50 54 45e0b5-45e0b8 51->54 55 45e1d4-45e20a call 4a5bd0 51->55 57 45e0c0-45e0e6 54->57 64 45e20c-45e218 55->64 65 45e238-45e26c call 447d20 55->65 58 45e0f8-45e107 57->58 59 45e0e8-45e0f3 57->59 62 45e117-45e123 58->62 63 45e109-45e112 58->63 61 45e1c7 59->61 66 45e1ca-45e1ce 61->66 67 45e125-45e12e 62->67 68 45e133-45e13f 62->68 63->61 69 45e22e-45e235 call 51cf83 64->69 70 45e21a-45e228 64->70 81 45e282-45e28a call 4a8610 65->81 82 45e26e-45e280 65->82 66->55 66->57 67->61 72 45e141-45e14a 68->72 73 45e14c-45e158 68->73 69->65 70->69 74 45e44b call 522220 70->74 72->61 77 45e165-45e171 73->77 78 45e15a-45e163 73->78 84 45e450-45e455 call 522220 74->84 85 45e173-45e17c 77->85 86 45e17e-45e18a 77->86 78->61 87 45e28f-45e2e2 call 447d20 * 2 81->87 82->87 85->61 90 45e197-45e1a3 86->90 91 45e18c-45e195 86->91 99 45e2e4-45e313 call 447d20 call 51e9e0 87->99 100 45e316-45e32c call 447d20 87->100 94 45e1a5-45e1ae 90->94 95 45e1b0-45e1b9 90->95 91->61 94->61 95->66 96 45e1bb-45e1c3 95->96 96->61 99->100 106 45e3b7 100->106 107 45e332-45e338 100->107 108 45e3bb-45e3c1 106->108 110 45e340-45e36c 107->110 112 45e3c3-45e3cf 108->112 113 45e3eb-45e403 108->113 111 45e370-45e37b 110->111 111->111 114 45e37d-45e3ab WSASend 111->114 115 45e3e1-45e3e8 call 51cf83 112->115 116 45e3d1-45e3df 112->116 117 45e435-45e44a 113->117 118 45e405-45e411 113->118 128 45e425-45e429 114->128 129 45e3ad-45e3b5 114->129 115->113 116->84 116->115 119 45e413-45e421 118->119 120 45e42b-45e432 call 51cf83 118->120 119->84 122 45e423 119->122 120->117 122->120 128->108 129->106 129->110
                APIs
                • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,005447E8,00000000,00000000,-005765B0), ref: 0045E3A6
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000006.00000002.4482949788.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483035016.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483266685.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4484923411.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4485278681.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: Send
                • String ID: 131$50500$Ws2_32.dll$\;W$t;W$taW$;W
                • API String ID: 121738739-2827972449
                • Opcode ID: b5d48317606026a99d8a12f290fe7daf00830488fda8a4234549f7fe5724509b
                • Instruction ID: 1b70fe9f5e3489535da93b1617a97d9c047d654e12bc26b1fba2f817f0af432c
                • Opcode Fuzzy Hash: b5d48317606026a99d8a12f290fe7daf00830488fda8a4234549f7fe5724509b
                • Instruction Fuzzy Hash: 4CD11231D04648DFDB18CFA9CC40BEEBBF1AF06301F684259D855AB2C2D774998ACB55

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 130 45db60-45db92 WSAStartup 131 45dc66-45dc6f 130->131 132 45db98-45dbc2 call 447d20 * 2 130->132 137 45dbc4-45dbc8 132->137 138 45dbce-45dc14 132->138 137->131 137->138 140 45dc16-45dc1c 138->140 141 45dc60 138->141 142 45dc74-45dc7e 140->142 143 45dc1e 140->143 141->131 142->141 147 45dc80-45dc88 142->147 144 45dc24-45dc38 socket 143->144 144->141 146 45dc3a-45dc4a connect 144->146 148 45dc70 146->148 149 45dc4c-45dc54 closesocket 146->149 148->142 149->144 150 45dc56-45dc5a 149->150 150->141
                APIs
                • WSAStartup.WS2_32 ref: 0045DB8A
                • socket.WS2_32(?,?,?,?,?,?,50500,?,?), ref: 0045DC2E
                • connect.WS2_32(00000000,?,?,?,?,?,50500,?,?), ref: 0045DC41
                • closesocket.WS2_32(00000000), ref: 0045DC4D
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000006.00000002.4482949788.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483035016.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483266685.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4484923411.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4485278681.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: Startupclosesocketconnectsocket
                • String ID: 50500
                • API String ID: 3098855095-2230786414
                • Opcode ID: df11b29aa6ae668c67dcefddcdb3f1200a6016ba884745d697bf8fbf293663d2
                • Instruction ID: ccddba8f70c2aca3ed09d49654a281d3456285733c40ff25ee7d2220abdf1fa6
                • Opcode Fuzzy Hash: df11b29aa6ae668c67dcefddcdb3f1200a6016ba884745d697bf8fbf293663d2
                • Instruction Fuzzy Hash: 4C31E4729043015BD7218B288C85A2FB7E4FF89328F111F1EFDA4932E1E3759848C696

                Control-flow Graph

                Memory Dump Source
                • Source File: 00000006.00000002.4491306058.0000000004F20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_4f20000_MPGPH131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 96d2c82cc76d44fee1232e3071ea1c668a6047fc6db1d38330f69e3c13b4b5b5
                • Instruction ID: 2ef5a7bf8d8e46708b0daf732000463c384241a6c8507a853dcb95f96543be43
                • Opcode Fuzzy Hash: 96d2c82cc76d44fee1232e3071ea1c668a6047fc6db1d38330f69e3c13b4b5b5
                • Instruction Fuzzy Hash: A39103E724C231BEF15291816B54AF76A6EE7D37307308426FA07D5602FA882B4B3572

                Control-flow Graph

                Memory Dump Source
                • Source File: 00000006.00000002.4491306058.0000000004F20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_4f20000_MPGPH131.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2e59c71007640563ab6a31c0c843e19ba433df2f7ccbfbf6dc1b21016afa48c1
                • Instruction ID: e7eea2674a1b80268fff970c31431574245b98b54395ac084194a6dc4d111224
                • Opcode Fuzzy Hash: 2e59c71007640563ab6a31c0c843e19ba433df2f7ccbfbf6dc1b21016afa48c1
                • Instruction Fuzzy Hash: 1981D2EB24C231BDF15291816B64AF76A6EE7D77307308426FA07D5602FA842B4B3572

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 315 4f205ff-4f20609 316 4f2060b-4f2064b 315->316 317 4f2065c 315->317 322 4f20660 316->322 318 4f20663-4f20838 call 4f206e8 call 4f2070c 317->318 319 4f2065e-4f2065f 317->319 351 4f20850-4f20859 GetCurrentHwProfileW 318->351 319->322 322->318 352 4f20869-4f20c2b call 4f20b72 call 4f20c3b 351->352 395 4f20c2b call 4f20c3b 352->395
                Memory Dump Source
                • Source File: 00000006.00000002.4491306058.0000000004F20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_4f20000_MPGPH131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: ff4ec8fb78ee8a49087665dbe85ea633b1230846ec5476df9513b337106363e7
                • Instruction ID: 8a0b34ce7837b095888559fbddb520231907bac3bceb0dd35dd8c5690ab54bc3
                • Opcode Fuzzy Hash: ff4ec8fb78ee8a49087665dbe85ea633b1230846ec5476df9513b337106363e7
                • Instruction Fuzzy Hash: 9381C3EB24C135BDF15281816B54AF76B6EE7D77307308426F607D5602FA882F8B2572

                Control-flow Graph

                Memory Dump Source
                • Source File: 00000006.00000002.4491306058.0000000004F20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_4f20000_MPGPH131.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: edc748a83f445e9aa5392707b213349d8b4f73390a910caf0005b1534cb46eed
                • Instruction ID: 984dbd8d6a2e935af0ce171bbe0fdd2f67ac8098a60a477dacf9fd1494f0d2a8
                • Opcode Fuzzy Hash: edc748a83f445e9aa5392707b213349d8b4f73390a910caf0005b1534cb46eed
                • Instruction Fuzzy Hash: 5D81E2EB24C134BDB15291816B54AF76A6EE7D77307308426FA07D5602FAC42F8B3572

                Control-flow Graph

                Memory Dump Source
                • Source File: 00000006.00000002.4491306058.0000000004F20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_4f20000_MPGPH131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 88d5183eeb4e2c45f10c80827fc7257237fa597ad1e3e885d5026ee251464479
                • Instruction ID: 4e41639c685ed400200e406f0016cbc6827bf9de084a3a519d56aecc0920b66e
                • Opcode Fuzzy Hash: 88d5183eeb4e2c45f10c80827fc7257237fa597ad1e3e885d5026ee251464479
                • Instruction Fuzzy Hash: 6F81C4EB24C134BDF15281816B54AF76B6EE7D67307308426FA07D5602FA942F4B3572

                Control-flow Graph

                Memory Dump Source
                • Source File: 00000006.00000002.4491306058.0000000004F20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_4f20000_MPGPH131.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4a2dfa586b4d9864868428c22d701ac21f1b6953bec3afae025d76595228b795
                • Instruction ID: ab3f9bff8fa3e9d051c068131907aac844fbe5cd64f356cfef47580c02d6bad1
                • Opcode Fuzzy Hash: 4a2dfa586b4d9864868428c22d701ac21f1b6953bec3afae025d76595228b795
                • Instruction Fuzzy Hash: 7F71C1EB34C134BDB15281816B64AF76B6EE7D67307308426FA07D5602FA842F8B3572

                Control-flow Graph

                Memory Dump Source
                • Source File: 00000006.00000002.4491306058.0000000004F20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_4f20000_MPGPH131.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b149934c6823dad5ead38dab381434864d65801e256c4f534debb71064c90342
                • Instruction ID: 1eb2b6476912b0be56f80598ebaf7af63b700884aad3d4d2ece4a2bb52bbd46e
                • Opcode Fuzzy Hash: b149934c6823dad5ead38dab381434864d65801e256c4f534debb71064c90342
                • Instruction Fuzzy Hash: 5571C2EB34C134BDB15281816B64AF76B6EE7D67307308466FA07D5602FA842F8B3572

                Control-flow Graph

                Memory Dump Source
                • Source File: 00000006.00000002.4491306058.0000000004F20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_4f20000_MPGPH131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 74f9255e25944ac1b42a50a481ffd65c0b568b861212673a14f1b2e8626a4bf9
                • Instruction ID: 47a1fe5263f3f95db4991bf08fbebadde43bcd0557a93490478e6e24a90f2ab7
                • Opcode Fuzzy Hash: 74f9255e25944ac1b42a50a481ffd65c0b568b861212673a14f1b2e8626a4bf9
                • Instruction Fuzzy Hash: 0371C2EB34C135BDB15281816B64AF76B6EE7D67307308426FA07D5602FA842F8B3572

                Control-flow Graph

                Memory Dump Source
                • Source File: 00000006.00000002.4491306058.0000000004F20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_4f20000_MPGPH131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: fff418b6bd47d4a53d1f3034dd3469bd6e8df3a623450e4c80d517486d3c9097
                • Instruction ID: 3ad590a7e56c3ea6f5f03d1eae94739c78a53fb4dcfa566ab6969318848ec276
                • Opcode Fuzzy Hash: fff418b6bd47d4a53d1f3034dd3469bd6e8df3a623450e4c80d517486d3c9097
                • Instruction Fuzzy Hash: 8571D3EB34C135BDB15281816B64AF76B6EE7D67307308426FA07D5602FA842F4B3572

                Control-flow Graph

                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 04F20854
                Memory Dump Source
                • Source File: 00000006.00000002.4491306058.0000000004F20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_4f20000_MPGPH131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 78bff2bc8bcd503fcf91942b92efece262b663d9896249d8f752f5ebbdaddec4
                • Instruction ID: 864bfe822b7ad8ef9e034aa2ae62b4311dad27b1b874b80670b96461769ad581
                • Opcode Fuzzy Hash: 78bff2bc8bcd503fcf91942b92efece262b663d9896249d8f752f5ebbdaddec4
                • Instruction Fuzzy Hash: 7751ADEB34C135BDB15281826B64EF7666EE7D67307308426FA07D5602FA842F8B3572

                Control-flow Graph

                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 04F20854
                Memory Dump Source
                • Source File: 00000006.00000002.4491306058.0000000004F20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_4f20000_MPGPH131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 1e8b8b6da9853691b43d046a582d9a1169d84198a50d77241e2981d30c65f531
                • Instruction ID: 91645881722f6a1dae318b476d5d3aa858655404e8ecef9dd7f16d0dfb098413
                • Opcode Fuzzy Hash: 1e8b8b6da9853691b43d046a582d9a1169d84198a50d77241e2981d30c65f531
                • Instruction Fuzzy Hash: 9351B1EB24C134BDB15281822B24EF7676EE7D67307308466FA07D5642FA842E8B3572

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 964 4f2072a-4f20838 977 4f20850-4f20859 GetCurrentHwProfileW 964->977 978 4f20869-4f20c2b call 4f20b72 call 4f20c3b 977->978 1021 4f20c2b call 4f20c3b 978->1021
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 04F20854
                Memory Dump Source
                • Source File: 00000006.00000002.4491306058.0000000004F20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_4f20000_MPGPH131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: d427579908de7d9aef2707efaa87411f2997a04c2386cc5bbfefec3d2129c4da
                • Instruction ID: d1af68fe2eb52c5b669bd87e06becf05fb9403c3a23d77b22309d38c4f70a2eb
                • Opcode Fuzzy Hash: d427579908de7d9aef2707efaa87411f2997a04c2386cc5bbfefec3d2129c4da
                • Instruction Fuzzy Hash: 3651A0EB34C135BDB15281826B64EF7666EE7D67307308426FA07D5602FA842F8B3572
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 04F20854
                Memory Dump Source
                • Source File: 00000006.00000002.4491306058.0000000004F20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_4f20000_MPGPH131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 714519b39650dae0462d75ee086556fda541e9d2082f32ae1f5990ac5c431aa1
                • Instruction ID: f4a5008b81bccb9a1608cc1ebb7467009e3a879fbe751eafaf9be2bbf067289e
                • Opcode Fuzzy Hash: 714519b39650dae0462d75ee086556fda541e9d2082f32ae1f5990ac5c431aa1
                • Instruction Fuzzy Hash: 0551AFEB34C135BDB15281822B64EF7666EE7D67307308426FA07D5602FA842F8B3572
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 04F20854
                Memory Dump Source
                • Source File: 00000006.00000002.4491306058.0000000004F20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_4f20000_MPGPH131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 9f763e63ea2b91463dd96b5a61ea79a0f12dc650aa1aed573dbc1da200dcea2c
                • Instruction ID: 57993bde8f19fbedc0bcc6629de9814a27944b25b3e8963cd175c2227900a939
                • Opcode Fuzzy Hash: 9f763e63ea2b91463dd96b5a61ea79a0f12dc650aa1aed573dbc1da200dcea2c
                • Instruction Fuzzy Hash: B651BFEB34C134BDB15281826B24EF7676EE7C67307308466FA07D5602FA842F8B2572
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 04F20854
                Memory Dump Source
                • Source File: 00000006.00000002.4491306058.0000000004F20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_4f20000_MPGPH131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 11362f2ec53fed3665223254255c4b6ddff48823f3f2283942acd67c7bd3cb37
                • Instruction ID: 76b9a41223da0f9bd909c11e5f01454aab37f19ebd7b7477f90f6e993e691a13
                • Opcode Fuzzy Hash: 11362f2ec53fed3665223254255c4b6ddff48823f3f2283942acd67c7bd3cb37
                • Instruction Fuzzy Hash: 05519EEB34C135BDB15281822B24EF7666EE7D67307308426FA07D5602FA842E8B2572
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 04F20854
                Memory Dump Source
                • Source File: 00000006.00000002.4491306058.0000000004F20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_4f20000_MPGPH131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: c2f51ec53fed7fe6a49ed9e8180eb0b2d2b243b05ecd5acfb5114c657843639e
                • Instruction ID: bff5d09da94219d9c5a6a3178b07482a49f439a682c5a0860547eac4740d9120
                • Opcode Fuzzy Hash: c2f51ec53fed7fe6a49ed9e8180eb0b2d2b243b05ecd5acfb5114c657843639e
                • Instruction Fuzzy Hash: D5518CEB24C135BDB15281822B24EF7676EE7D67307308466FA07D5602FA842E8B2572
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 04F20854
                Memory Dump Source
                • Source File: 00000006.00000002.4491306058.0000000004F20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_4f20000_MPGPH131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: f38096758ca61cff166e4f3654fa6caad0bdcc6f9fdc9c139f021d5fd97661df
                • Instruction ID: 2a64b3c2d236d1802c680f967b66d20186b5d950b0a19de268d81b27fcc69dc3
                • Opcode Fuzzy Hash: f38096758ca61cff166e4f3654fa6caad0bdcc6f9fdc9c139f021d5fd97661df
                • Instruction Fuzzy Hash: F0517DEB34C135BDB15281826B24EF7676EE7D67307308466FA07D5602FA842F8B2572
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 04F20854
                Memory Dump Source
                • Source File: 00000006.00000002.4491306058.0000000004F20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_4f20000_MPGPH131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 416f597d1c8129bed1f2bd2e178cc521b496bbdbde123b8895a6e8e61f45fe67
                • Instruction ID: 4f6b3faba9b9e37eda3645a31ecd324d05953f74450dfb1e5be5bae72084e47f
                • Opcode Fuzzy Hash: 416f597d1c8129bed1f2bd2e178cc521b496bbdbde123b8895a6e8e61f45fe67
                • Instruction Fuzzy Hash: A551B1EB34D135BDB15281822B24EF76A6EE7D67307308426FA07D5601FA846E8B3572
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 04F20854
                Memory Dump Source
                • Source File: 00000006.00000002.4491306058.0000000004F20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_4f20000_MPGPH131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: aa1383735b4767cfa3ef84c7961e454cf358453a9eef28254c6b955b310c2128
                • Instruction ID: 9bfb2721e2ad98b587685440d21bfa35cae1493a2ae604ed81c0a0b2118bfb1c
                • Opcode Fuzzy Hash: aa1383735b4767cfa3ef84c7961e454cf358453a9eef28254c6b955b310c2128
                • Instruction Fuzzy Hash: 5E51BFEB34C134BDB15281826B24EF7666EE7D67307308426FA07D5602FA842E8B2572
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 04F20854
                Memory Dump Source
                • Source File: 00000006.00000002.4491306058.0000000004F20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_4f20000_MPGPH131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: f0085a04489d2c56b64174e217f55439689d828fdabe32b7b8d5035049fa1dc2
                • Instruction ID: 7936c4cbac6ee35f604cfb630f24b0800e56e050f99c7b3ea5bda5661d04f793
                • Opcode Fuzzy Hash: f0085a04489d2c56b64174e217f55439689d828fdabe32b7b8d5035049fa1dc2
                • Instruction Fuzzy Hash: B951CFEB34C134BDB25281822B24AF7676EE7D67307308426FA07D5601FA842E8B6572
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 04F20854
                Memory Dump Source
                • Source File: 00000006.00000002.4491306058.0000000004F20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_4f20000_MPGPH131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: db62e7da7170c9c3747b7364dd7d5cd179f1786762f0e941ca7f8c9d31ade74e
                • Instruction ID: a6bcd02241e2c5613899a52d4d709e86026c10265fb3ed51a6068b505e2a2812
                • Opcode Fuzzy Hash: db62e7da7170c9c3747b7364dd7d5cd179f1786762f0e941ca7f8c9d31ade74e
                • Instruction Fuzzy Hash: 9651A0EB34C134BDB15281822B24EF76B6DE7D67307308467FA07D5601FA846E8B6572
                APIs
                • WriteFile.KERNELBASE(?,00000000,00526AF7,?,00000000,00000000,00000000,?,00000000,?,0051C023,00526AF7,00000000,0051C023,?,?), ref: 00533091
                Memory Dump Source
                • Source File: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000006.00000002.4482949788.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483035016.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483266685.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4484923411.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4485278681.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: FileWrite
                • String ID:
                • API String ID: 3934441357-0
                • Opcode ID: a02dec9d02b863b18fa4371df5f5db66c4ea953b84439089080c75427818eb5c
                • Instruction ID: 89601debc8da8e5361d2657b6661ac46eb4bb5426dabb0e58dd1c715dc9b8f35
                • Opcode Fuzzy Hash: a02dec9d02b863b18fa4371df5f5db66c4ea953b84439089080c75427818eb5c
                • Instruction Fuzzy Hash: 7161FF71C0411AAFDF15DFA8C889EEEBFB9BF49304F140559E904AB242D372DA41DBA0
                APIs
                • Concurrency::cancel_current_task.LIBCPMT ref: 004ABB71
                Memory Dump Source
                • Source File: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000006.00000002.4482949788.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483035016.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483266685.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4484923411.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4485278681.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: Concurrency::cancel_current_task
                • String ID:
                • API String ID: 118556049-0
                • Opcode ID: b19d2212db506fa46971754378483badd225f06599945ea51feb898bce11e8e1
                • Instruction ID: 5bc5d19c601ffac92f364034007bc4566d3cb9284dcaa4e27eecc02c897b43d6
                • Opcode Fuzzy Hash: b19d2212db506fa46971754378483badd225f06599945ea51feb898bce11e8e1
                • Instruction Fuzzy Hash: DE4127729001099BDB15DF68DD816AEBBA5FF96340F14026AFC04EB306D734EE5187E5
                APIs
                • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,00532469,00000000,CF830579,00571148,0000000C,00532525,0052662D,?), ref: 005325D8
                Memory Dump Source
                • Source File: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000006.00000002.4482949788.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483035016.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483266685.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4484923411.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4485278681.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: ChangeCloseFindNotification
                • String ID:
                • API String ID: 2591292051-0
                • Opcode ID: 31b36112d8d3467a8ff3422222cbfffd1626cbc95d85adf250caaba457ef09ca
                • Instruction ID: bc9873dbf6a6893779a1b811cfce8051342bb545deb1fc158519bddb594dd0d1
                • Opcode Fuzzy Hash: 31b36112d8d3467a8ff3422222cbfffd1626cbc95d85adf250caaba457ef09ca
                • Instruction Fuzzy Hash: D8114933604A2416DA3923746C5AB7E6F8A7FC3734F350219F9189F2C2EE71ED819251
                APIs
                • SetFilePointerEx.KERNELBASE(00000000,00000000,00570E00,0051C023,00000002,0051C023,00000000,?,?,?,0052BBD6,00000000,?,0051C023,00000002,00570E00), ref: 0052BB08
                Memory Dump Source
                • Source File: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000006.00000002.4482949788.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483035016.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483266685.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4484923411.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4485278681.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: FilePointer
                • String ID:
                • API String ID: 973152223-0
                • Opcode ID: 0eb465050ea75c96f5ae74b35d6312b18970d91f09cd300cce5d55f2c70354a7
                • Instruction ID: 0f397070026dd6525e38acb49aaedaf2fb079d874b410e273776befa2d981463
                • Opcode Fuzzy Hash: 0eb465050ea75c96f5ae74b35d6312b18970d91f09cd300cce5d55f2c70354a7
                • Instruction Fuzzy Hash: 6701C432610265AFDF198F59EC45CAE3F69FF86324F240208F8119B2D1EB71ED519B90
                APIs
                • ___std_exception_copy.LIBVCRUNTIME ref: 00441FDE
                Memory Dump Source
                • Source File: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000006.00000002.4482949788.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483035016.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483266685.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4484923411.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4485278681.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_copy
                • String ID:
                • API String ID: 2659868963-0
                • Opcode ID: 557d8e023e030bebac643801d6b6b953c5d046d101e21c4be8d0de1b84703fd1
                • Instruction ID: 28db6862278891d92f7f4a3bbe00283d552b999f922a93228321a0845c711948
                • Opcode Fuzzy Hash: 557d8e023e030bebac643801d6b6b953c5d046d101e21c4be8d0de1b84703fd1
                • Instruction Fuzzy Hash: E801263540020EA7DB14ABA8FC058CA7FECBE01364B508636F918AB190FB70E9D0C795
                APIs
                • RtlAllocateHeap.NTDLL(00000008,0051B16C,?,?,005337E9,00000001,00000364,?,00000006,000000FF,?,0051E0EB,?,?,?,?), ref: 00533EA5
                Memory Dump Source
                • Source File: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000006.00000002.4482949788.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483035016.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483266685.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4484923411.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4485278681.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: AllocateHeap
                • String ID:
                • API String ID: 1279760036-0
                • Opcode ID: c2efac4e1cc37871c7f0168ff8e68f4c2699d43950a4b01ad67c70ef0efe9631
                • Instruction ID: a7bdc691adbb87f0edaaa6fa314856a58346a90dd8c2e08cb7121ffd9a531989
                • Opcode Fuzzy Hash: c2efac4e1cc37871c7f0168ff8e68f4c2699d43950a4b01ad67c70ef0efe9631
                • Instruction Fuzzy Hash: C0F0E932509535669B326B715C05B6B3F4DBF82761F154511BC089A080DB74EE0873E0
                APIs
                • RtlAllocateHeap.NTDLL(00000000,?,?,?,0051E0EB,?,?,?,?,?,00442D8D,0051B16C,?,?,0051B16C), ref: 005348D0
                Memory Dump Source
                • Source File: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000006.00000002.4482949788.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483035016.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483266685.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4484923411.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4485278681.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: AllocateHeap
                • String ID:
                • API String ID: 1279760036-0
                • Opcode ID: 6b515764505151223242b3d0145b65b86860ee85b1bbecad418aa046d3baeeac
                • Instruction ID: fc8080a42db03bc1b731d5339c9fe025f025f8949d906c9f2f31192c3a957da0
                • Opcode Fuzzy Hash: 6b515764505151223242b3d0145b65b86860ee85b1bbecad418aa046d3baeeac
                • Instruction Fuzzy Hash: 2CE06D351126A25AE6212A796D05B6BFF4DFF833A0F160A31AC04A60D1DB70EC509AE1
                Memory Dump Source
                • Source File: 00000006.00000002.4491361330.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_4f30000_MPGPH131.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 371fca12bdd04bc259d8924417494845d1f72bd55054a9c79d10db3325ffa84c
                • Instruction ID: 81e39f2d5a7c54e02ef5a110eef56f877a8ec5be0ad754721cf28f0e399a7882
                • Opcode Fuzzy Hash: 371fca12bdd04bc259d8924417494845d1f72bd55054a9c79d10db3325ffa84c
                • Instruction Fuzzy Hash: 90D022A334010CDFC020B8528C8473336A8E3202037A006A2F0839B0CDDAF2A08BEB90
                Memory Dump Source
                • Source File: 00000006.00000002.4491361330.0000000004F30000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_4f30000_MPGPH131.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8d6c978aea92f6111e60f94cf3562a4bd6c5cf095efa80c47c0cc89692e08136
                • Instruction ID: c4d0c59ade625d62515f236380ab5a11d019a0bfd9c029b2cd37f559f2df85d8
                • Opcode Fuzzy Hash: 8d6c978aea92f6111e60f94cf3562a4bd6c5cf095efa80c47c0cc89692e08136
                • Instruction Fuzzy Hash: 2BB0927378C954CE0499E596A48963A6A90F7512233B005A3E4538A08EBEA6F05BF725
                APIs
                • std::_Lockit::_Lockit.LIBCPMT ref: 004AAEB3
                • std::_Lockit::_Lockit.LIBCPMT ref: 004AAED5
                • std::_Lockit::~_Lockit.LIBCPMT ref: 004AAEF5
                • std::_Lockit::~_Lockit.LIBCPMT ref: 004AAF1F
                • std::_Lockit::_Lockit.LIBCPMT ref: 004AAF8D
                • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 004AAFD9
                • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 004AAFF3
                • std::_Lockit::~_Lockit.LIBCPMT ref: 004AB088
                • std::_Facet_Register.LIBCPMT ref: 004AB095
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000006.00000002.4482949788.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483035016.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483266685.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4484923411.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4485278681.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                • String ID: bad locale name
                • API String ID: 3375549084-1405518554
                • Opcode ID: 0b683d8567a58570295f82b389718261da6ffaa80d1aec8ca33d174822eae808
                • Instruction ID: 95c165697748bb07a2090bf1e8a58c426f41e1f6c29759e125c03afb57618426
                • Opcode Fuzzy Hash: 0b683d8567a58570295f82b389718261da6ffaa80d1aec8ca33d174822eae808
                • Instruction Fuzzy Hash: F8619DB5D002459FEB20DFA4D889BDEBFB4BF65310F144059E808A7381E738E945CB96
                APIs
                • std::_Lockit::_Lockit.LIBCPMT ref: 004437E9
                • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00443835
                • __Getctype.LIBCPMT ref: 0044384E
                • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0044386A
                • std::_Lockit::~_Lockit.LIBCPMT ref: 004438FF
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000006.00000002.4482949788.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483035016.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483266685.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4484923411.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4485278681.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                • String ID: 0:D$bad locale name
                • API String ID: 1840309910-3892007210
                • Opcode ID: 515cc488061c2545b068f53c42cb9114d8bb3f8b1ddbec7160b93d3b279eef7d
                • Instruction ID: fda69150531bda16cd9ca26006792c97c8e3d5b2b99f903a4955864525bf4417
                • Opcode Fuzzy Hash: 515cc488061c2545b068f53c42cb9114d8bb3f8b1ddbec7160b93d3b279eef7d
                • Instruction Fuzzy Hash: 7C517DF1D003499BEB10DFA4D88579EFBB8BF54704F144169E804AB381E779AA48CB92
                APIs
                • _ValidateLocalCookies.LIBCMT ref: 005208B7
                • ___except_validate_context_record.LIBVCRUNTIME ref: 005208BF
                • _ValidateLocalCookies.LIBCMT ref: 00520948
                • __IsNonwritableInCurrentImage.LIBCMT ref: 00520973
                • _ValidateLocalCookies.LIBCMT ref: 005209C8
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000006.00000002.4482949788.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483035016.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483266685.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4484923411.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4485278681.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                • String ID: CQ$csm
                • API String ID: 1170836740-1629540169
                • Opcode ID: 37ee439ae3788193be2401b96ac71f6945aee16afde9a47c0e2bf3f242090fd0
                • Instruction ID: 892b8eca4c8ffbd67f8e13c428d3fcd27e890cbaaec1ed528d2dcec0e15f14aa
                • Opcode Fuzzy Hash: 37ee439ae3788193be2401b96ac71f6945aee16afde9a47c0e2bf3f242090fd0
                • Instruction Fuzzy Hash: 7441F834A012299BDF10DF68E885A9FBFB4BF46324F148055E8199B3D3D731EA45CB91
                APIs
                • std::_Lockit::_Lockit.LIBCPMT ref: 004A9543
                • std::_Lockit::_Lockit.LIBCPMT ref: 004A9566
                • std::_Lockit::~_Lockit.LIBCPMT ref: 004A9586
                • std::_Facet_Register.LIBCPMT ref: 004A95FB
                • std::_Lockit::~_Lockit.LIBCPMT ref: 004A9613
                • Concurrency::cancel_current_task.LIBCPMT ref: 004A962B
                Memory Dump Source
                • Source File: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000006.00000002.4482949788.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483035016.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483266685.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4484923411.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4485278681.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                • String ID:
                • API String ID: 2081738530-0
                • Opcode ID: a84ee0d12e363d936b25c413a612dab48eeb404fa12a6ac13a5abd8207b79779
                • Instruction ID: de8f14c0acf57d4a99a8082372a1e4b478b1c8d3972992462c2a792130925d69
                • Opcode Fuzzy Hash: a84ee0d12e363d936b25c413a612dab48eeb404fa12a6ac13a5abd8207b79779
                • Instruction Fuzzy Hash: 53412572C00215EFDB11DF54E845AAEBB74FF22724F14421AE8496B381E734AD45CBD5
                APIs
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004460F2
                • ___std_exception_destroy.LIBVCRUNTIME ref: 0044617F
                • ___std_exception_copy.LIBVCRUNTIME ref: 00446248
                Strings
                • recursive_directory_iterator::operator++, xrefs: 004461CC
                Memory Dump Source
                • Source File: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000006.00000002.4482949788.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483035016.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483266685.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4484923411.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4485278681.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_destroy$___std_exception_copy
                • String ID: recursive_directory_iterator::operator++
                • API String ID: 1206660477-953255998
                • Opcode ID: 3e18b17712177bf5265fc12b5abc2325fe6ab039e67610525fbe2c0cec0580fe
                • Instruction ID: 1d06802589ea73fce13163c7aba8697dab90b2f14e2b0a528c8456ff28b6ab32
                • Opcode Fuzzy Hash: 3e18b17712177bf5265fc12b5abc2325fe6ab039e67610525fbe2c0cec0580fe
                • Instruction Fuzzy Hash: F4E135B09006049FEB18DF68D945B9EFBF9FF45300F10461EE41697782D778AA48CBA6
                APIs
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004486DE
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004486ED
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000006.00000002.4482949788.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483035016.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483266685.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4484923411.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4485278681.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_destroy
                • String ID: at line $, column
                • API String ID: 4194217158-191570568
                • Opcode ID: f438a158de764309a5d7de61943b336f6b6a83696f5506c7cd7c4e7cc046346d
                • Instruction ID: d89484a9352427d1be0980e0a75dc34159763f03e212a92199492ec47daa3dd3
                • Opcode Fuzzy Hash: f438a158de764309a5d7de61943b336f6b6a83696f5506c7cd7c4e7cc046346d
                • Instruction Fuzzy Hash: 2D614971D002049FEB08DF68DD8579EBBB1FF85304F14421DE415A7792EB78AA84C795
                APIs
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004B3946
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004B395F
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004B3A97
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004B3AB0
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004B3C16
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004B3C2F
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004B4479
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004B4492
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000006.00000002.4482949788.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483035016.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483266685.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4484923411.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4485278681.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_destroy
                • String ID: value
                • API String ID: 4194217158-494360628
                • Opcode ID: a686215d7c86d2877dfdf79b089aa33effc83b7203da67065bf1d3b6f3987aa4
                • Instruction ID: a7f5eb52dc91f40d6653cb30fa51c6de5449ad8de2bf0a83f850b077d2021710
                • Opcode Fuzzy Hash: a686215d7c86d2877dfdf79b089aa33effc83b7203da67065bf1d3b6f3987aa4
                • Instruction Fuzzy Hash: D951D170C00258DBEF14DFA8CD89BDEBFB4BF45304F144259E445A7282D7786A89CB65
                APIs
                • ___std_exception_copy.LIBVCRUNTIME ref: 00443C0F
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000006.00000002.4482949788.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483035016.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483266685.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4484923411.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4485278681.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_copy
                • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                • API String ID: 2659868963-1866435925
                • Opcode ID: c0fab6b057d7c44d7bc8bf273ddb6360478c3ff7ba6c7dd2d19e387b90159327
                • Instruction ID: 27a81e23bd6ef86c6132d47fac69e8c69bb94f2d27179c9f57a20ad9d35a8ad5
                • Opcode Fuzzy Hash: c0fab6b057d7c44d7bc8bf273ddb6360478c3ff7ba6c7dd2d19e387b90159327
                • Instruction Fuzzy Hash: EB1120B29007046BD700DF59C806B8ABBE8FF44310F04852BF9199B282F774EA40CB95
                Strings
                • unordered_map/set too long, xrefs: 004B2F43
                Memory Dump Source
                • Source File: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000006.00000002.4482949788.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483035016.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483266685.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4484923411.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4485278681.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: unordered_map/set too long
                • API String ID: 0-306623848
                • Opcode ID: 1be0ba8213fa319106f833cef62005a030918ab8cdf47c6686063a542cfd3880
                • Instruction ID: 1863fc12b4c8c22a32571629ad9a9098f86bfc2db798c264c467b2a639d7b4de
                • Opcode Fuzzy Hash: 1be0ba8213fa319106f833cef62005a030918ab8cdf47c6686063a542cfd3880
                • Instruction Fuzzy Hash: ABE1F271A001059FCB18DF28C990AADBBB5FF49310B14836AE819DB395E774ED51CBA4
                APIs
                • ___std_exception_copy.LIBVCRUNTIME ref: 0044844D
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000006.00000002.4482949788.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483035016.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483266685.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4484923411.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4485278681.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_copy
                • String ID: parse error$ror
                • API String ID: 2659868963-4201802366
                • Opcode ID: 219ea096085af0855fa69d0c53ba53a85f8244524164dc71f6e1747b5cdedd92
                • Instruction ID: d87648fa63b1941d07e3f428191d0e7ebe501f95502ec30832eae1e074badcd8
                • Opcode Fuzzy Hash: 219ea096085af0855fa69d0c53ba53a85f8244524164dc71f6e1747b5cdedd92
                • Instruction Fuzzy Hash: BBC10571D006498FEB08CF68CD857ADBB71FF56304F14824DE4046B692EBB8AAC5CB95
                APIs
                • ___std_exception_destroy.LIBVCRUNTIME ref: 00448051
                • ___std_exception_destroy.LIBVCRUNTIME ref: 00448060
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000006.00000002.4482949788.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483035016.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483266685.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4484923411.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4485278681.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_destroy
                • String ID: [json.exception.
                • API String ID: 4194217158-791563284
                • Opcode ID: bf6f9194f127504aebf295da9203bc9fa6d9b32cbd46d1bf6ef35faabf351988
                • Instruction ID: 6ec5fd873d7e8587c50a26fd6f3fa4c328a08a76d88962279f6ba1442ab2f585
                • Opcode Fuzzy Hash: bf6f9194f127504aebf295da9203bc9fa6d9b32cbd46d1bf6ef35faabf351988
                • Instruction Fuzzy Hash: 469107319102089FEB18CFA8CD85BDEBFB1FF55304F24425EE400AB692DBB5A985C795
                APIs
                • ___std_exception_copy.LIBVCRUNTIME ref: 00443C0F
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000006.00000002.4482949788.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483035016.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483266685.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4484923411.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4485278681.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_copy
                • String ID: ios_base::badbit set$ios_base::failbit set
                • API String ID: 2659868963-1240500531
                • Opcode ID: ea6837f8c4ff6cad5dceb9142e0b39827ce9cb4da3849a50ab051b542a3c1c82
                • Instruction ID: 67b37fd40274e57d09512e34074f78903c5f66ed6417e7cd21571a913fb2aba9
                • Opcode Fuzzy Hash: ea6837f8c4ff6cad5dceb9142e0b39827ce9cb4da3849a50ab051b542a3c1c82
                • Instruction Fuzzy Hash: FE412671910204ABDB04DF58CC86BAEFBF8FF45710F14821AF91597782E774AA40CBA5
                APIs
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004B4E29
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004B4E42
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004B594D
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004B5966
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000006.00000002.4482949788.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483035016.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483266685.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4484923411.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4485278681.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_destroy
                • String ID: value
                • API String ID: 4194217158-494360628
                • Opcode ID: 8adb299e31bad10c3b415fde5024909d8bed926bb0010a19cab3ad34aca1eaf4
                • Instruction ID: 15243c0fe897c98c5a484ffeb1f9a09d76cfb7d8142b6d40522d4a3fc24e71c2
                • Opcode Fuzzy Hash: 8adb299e31bad10c3b415fde5024909d8bed926bb0010a19cab3ad34aca1eaf4
                • Instruction Fuzzy Hash: C551DFB0C00258DBEB14DFA8CC89BDEFFB4BF45304F14425AE405A7282D7786A89CB65
                APIs
                • Concurrency::cancel_current_task.LIBCPMT ref: 004B99F1
                Strings
                • type must be boolean, but is , xrefs: 004B9AE2
                • type must be string, but is , xrefs: 004B9A58
                Memory Dump Source
                • Source File: 00000006.00000002.4483035016.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000006.00000002.4482949788.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483035016.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483266685.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4483321641.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4484923411.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000006.00000002.4485278681.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: Concurrency::cancel_current_task
                • String ID: type must be boolean, but is $type must be string, but is
                • API String ID: 118556049-436076039
                • Opcode ID: 68b96d55fb9c92cb24553b03d0b2b0d497091bf1287fd7c910d5af23a8cb459a
                • Instruction ID: a2404520db50e7f3914f65a4c99942635b9c663db7f367f32c7c69bd1501c079
                • Opcode Fuzzy Hash: 68b96d55fb9c92cb24553b03d0b2b0d497091bf1287fd7c910d5af23a8cb459a
                • Instruction Fuzzy Hash: 763180B1900144AFD714EB94D842BDFBBA8FB15304F14426EF405D7791EB39AE44C799

                Execution Graph

                Execution Coverage:2.1%
                Dynamic/Decrypted Code Coverage:1.7%
                Signature Coverage:0%
                Total number of Nodes:292
                Total number of Limit Nodes:30
                execution_graph 22814 5450985 22815 5450925 GetCurrentHwProfileW 22814->22815 22817 5450942 22814->22817 22815->22817 22818 522dd0 22821 522d0e 22818->22821 22820 522de2 22824 522d1a std::locale::_Setgloballocale 22821->22824 22822 522d21 22839 52acaf RtlAllocateHeap __dosmaperr 22822->22839 22824->22822 22826 522d41 22824->22826 22825 522d26 22840 522210 RtlAllocateHeap ___std_exception_copy 22825->22840 22828 522d53 22826->22828 22829 522d46 22826->22829 22835 5340f8 22828->22835 22841 52acaf RtlAllocateHeap __dosmaperr 22829->22841 22832 522d5c 22834 522d31 22832->22834 22842 52acaf RtlAllocateHeap __dosmaperr 22832->22842 22834->22820 22836 534104 std::_Lockit::_Lockit std::locale::_Setgloballocale 22835->22836 22843 53419c 22836->22843 22838 53411f 22838->22832 22839->22825 22840->22834 22841->22834 22842->22834 22847 5341bf 22843->22847 22845 534220 22853 534823 RtlAllocateHeap __dosmaperr 22845->22853 22847->22847 22848 534205 22847->22848 22849 533e63 22847->22849 22848->22838 22852 533e70 __Getctype std::_Facet_Register 22849->22852 22850 533e9b RtlAllocateHeap 22851 533eae __dosmaperr 22850->22851 22850->22852 22851->22845 22852->22850 22852->22851 22853->22848 23210 442540 RtlAllocateHeap RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_ctor 23216 448b00 RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 23217 45a100 7 API calls 3 library calls 22971 526658 22972 52666b ___std_exception_copy 22971->22972 22977 526533 22972->22977 22974 526677 22984 521f4c RtlAllocateHeap ___std_exception_copy 22974->22984 22976 526683 22978 52653f std::locale::_Setgloballocale 22977->22978 22979 526549 22978->22979 22981 52656c 22978->22981 22999 522193 RtlAllocateHeap ___std_exception_copy __Getctype 22979->22999 22983 526564 22981->22983 22985 5265ca 22981->22985 22983->22974 22984->22976 22986 5265d7 22985->22986 22987 5265fa 22985->22987 23024 522193 RtlAllocateHeap ___std_exception_copy __Getctype 22986->23024 22989 5265f2 22987->22989 23000 523041 22987->23000 22989->22983 22995 526626 23017 5324af 22995->23017 22999->22983 23001 52305a 23000->23001 23005 523081 23000->23005 23002 5339f2 RtlAllocateHeap 23001->23002 23001->23005 23003 523076 23002->23003 23026 532dfb 23003->23026 23006 53485d 23005->23006 23007 534874 23006->23007 23009 52661a 23006->23009 23007->23009 23094 534823 RtlAllocateHeap __dosmaperr 23007->23094 23010 5339f2 23009->23010 23011 533a13 23010->23011 23012 5339fe 23010->23012 23011->22995 23095 52acaf RtlAllocateHeap __dosmaperr 23012->23095 23014 533a03 23096 522210 RtlAllocateHeap ___std_exception_copy 23014->23096 23016 533a0e 23016->22995 23018 5324d8 23017->23018 23023 52662d 23017->23023 23019 532527 23018->23019 23021 5324ff 23018->23021 23101 522193 RtlAllocateHeap ___std_exception_copy __Getctype 23019->23101 23097 53241e 23021->23097 23023->22989 23025 534823 RtlAllocateHeap __dosmaperr 23023->23025 23024->22989 23025->22989 23028 532e07 std::locale::_Setgloballocale 23026->23028 23027 532e48 23047 522193 RtlAllocateHeap ___std_exception_copy __Getctype 23027->23047 23028->23027 23030 532e8e 23028->23030 23032 532e0f 23028->23032 23030->23032 23033 532f0c 23030->23033 23032->23005 23034 532f34 23033->23034 23046 532f57 23033->23046 23035 532f38 23034->23035 23037 532f93 23034->23037 23053 522193 RtlAllocateHeap ___std_exception_copy __Getctype 23035->23053 23038 532fb1 23037->23038 23054 52bbed 23037->23054 23048 532a51 23038->23048 23042 533010 23044 533079 WriteFile 23042->23044 23042->23046 23043 532fc9 23043->23046 23057 532622 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_ctor _ValidateLocalCookies 23043->23057 23044->23046 23046->23032 23047->23032 23058 53e7b4 23048->23058 23050 532a91 23050->23042 23050->23043 23051 532a63 23051->23050 23067 527780 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_ctor ___std_exception_copy 23051->23067 23053->23046 23071 52bacc 23054->23071 23056 52bc06 23056->23038 23057->23046 23059 53e7c1 23058->23059 23061 53e7ce 23058->23061 23068 52acaf RtlAllocateHeap __dosmaperr 23059->23068 23063 53e7da 23061->23063 23069 52acaf RtlAllocateHeap __dosmaperr 23061->23069 23062 53e7c6 23062->23051 23063->23051 23065 53e7fb 23070 522210 RtlAllocateHeap ___std_exception_copy 23065->23070 23067->23050 23068->23062 23069->23065 23070->23062 23076 53814e 23071->23076 23073 52bade 23074 52bafa SetFilePointerEx 23073->23074 23075 52bae6 23073->23075 23074->23075 23075->23056 23077 538170 23076->23077 23078 53815b 23076->23078 23084 538195 23077->23084 23091 52ac9c RtlAllocateHeap __dosmaperr 23077->23091 23089 52ac9c RtlAllocateHeap __dosmaperr 23078->23089 23081 538160 23090 52acaf RtlAllocateHeap __dosmaperr 23081->23090 23082 5381a0 23092 52acaf RtlAllocateHeap __dosmaperr 23082->23092 23084->23073 23086 538168 23086->23073 23087 5381a8 23093 522210 RtlAllocateHeap ___std_exception_copy 23087->23093 23089->23081 23090->23086 23091->23082 23092->23087 23093->23086 23094->23009 23095->23014 23096->23016 23098 53242a std::locale::_Setgloballocale 23097->23098 23100 532469 23098->23100 23102 532582 23098->23102 23100->23023 23101->23023 23103 53814e RtlAllocateHeap 23102->23103 23105 532592 23103->23105 23106 53814e RtlAllocateHeap 23105->23106 23110 532598 23105->23110 23113 5325ca 23105->23113 23109 5325c1 23106->23109 23107 53814e RtlAllocateHeap 23108 5325d6 FindCloseChangeNotification 23107->23108 23108->23110 23112 53814e RtlAllocateHeap 23109->23112 23114 5380bd RtlAllocateHeap __dosmaperr 23110->23114 23111 5325f0 23111->23100 23112->23113 23113->23107 23113->23110 23114->23111 23115 52abd8 23116 52abeb ___std_exception_copy 23115->23116 23121 52a9ba 23116->23121 23118 52ac00 23129 521f4c RtlAllocateHeap ___std_exception_copy 23118->23129 23120 52ac0d 23122 52a9c8 23121->23122 23127 52a9f0 23121->23127 23123 52a9f7 23122->23123 23124 52a9d5 23122->23124 23122->23127 23130 52a913 23123->23130 23134 522193 RtlAllocateHeap ___std_exception_copy __Getctype 23124->23134 23127->23118 23128 52aa2f 23128->23118 23129->23120 23131 52a91f std::locale::_Setgloballocale 23130->23131 23135 52a96e 23131->23135 23133 52a93a 23133->23128 23134->23127 23142 5360b3 23135->23142 23141 52a9b0 23141->23133 23159 536075 23142->23159 23144 5360c4 23145 52a986 23144->23145 23166 53489d RtlAllocateHeap RtlAllocateHeap __dosmaperr __Getctype std::_Facet_Register 23144->23166 23149 52aa31 23145->23149 23147 53611d 23167 534823 RtlAllocateHeap __dosmaperr 23147->23167 23152 52aa43 23149->23152 23153 52a9a4 23149->23153 23150 52aa51 23168 522193 RtlAllocateHeap ___std_exception_copy __Getctype 23150->23168 23152->23150 23152->23153 23157 52aa87 std::_Locinfo::_Locinfo_ctor 23152->23157 23158 53615e SetFilePointerEx WriteFile RtlAllocateHeap RtlAllocateHeap 23153->23158 23154 523041 4 API calls 23154->23157 23155 5339f2 RtlAllocateHeap 23155->23157 23156 532dfb 4 API calls 23156->23157 23157->23153 23157->23154 23157->23155 23157->23156 23158->23141 23160 536081 23159->23160 23161 5360ab 23160->23161 23162 5339f2 RtlAllocateHeap 23160->23162 23161->23144 23163 53609c 23162->23163 23164 53e7b4 RtlAllocateHeap 23163->23164 23165 5360a2 23164->23165 23165->23144 23166->23147 23167->23145 23168->23153 23202 4bca10 RtlAllocateHeap 22854 45ec20 22855 45f0bf 22854->22855 22859 45ec5e 22854->22859 22856 45eca7 setsockopt recv 22856->22859 22858 45f0aa Sleep 22858->22855 22858->22859 22859->22855 22859->22856 22859->22858 22860 45ecff 22859->22860 22863 45f09c Sleep 22859->22863 22872 45db60 WSAStartup 22859->22872 22878 454a90 22859->22878 22881 45e060 22859->22881 22896 4a8610 22860->22896 22863->22858 22864 45ed38 recv 22865 45ed59 recv 22864->22865 22869 45ed7a 22864->22869 22865->22869 22868 4a8610 2 API calls 22868->22869 22869->22863 22869->22868 22871 45edf0 recv 22869->22871 22901 4a5d50 22869->22901 22918 45e460 6 API calls 22869->22918 22871->22869 22873 45db98 22872->22873 22876 45dc56 22872->22876 22874 45dc24 socket 22873->22874 22873->22876 22875 45dc3a connect 22874->22875 22874->22876 22875->22876 22877 45dc4c closesocket 22875->22877 22876->22859 22877->22874 22877->22876 22919 51c6dc 22878->22919 22880 454a9b __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 22880->22859 22882 4a5d50 2 API calls 22881->22882 22883 45e0aa 22882->22883 22926 4a5bd0 22883->22926 22885 45e204 22886 45e44b 22885->22886 22888 45e22e 22885->22888 22931 522220 RtlAllocateHeap ___std_exception_copy __Getctype 22886->22931 22889 4a8610 2 API calls 22888->22889 22892 45e26e std::_Locinfo::_Locinfo_ctor 22888->22892 22889->22892 22892->22892 22894 45e3b7 22892->22894 22895 45e393 WSASend 22892->22895 22893 45e423 22893->22859 22894->22893 22932 522220 RtlAllocateHeap ___std_exception_copy __Getctype 22894->22932 22895->22892 22895->22894 22897 4a8628 std::locale::_Setgloballocale 22896->22897 22898 4a8657 22896->22898 22897->22864 22934 4aba20 22898->22934 22900 4a866a 22900->22864 22902 4a5d7a 22901->22902 22903 4a5e32 22902->22903 22906 4a5d8b 22902->22906 22968 442040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 22903->22968 22905 4a5e37 22969 441fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 22905->22969 22907 4a5dbc 22906->22907 22909 4a5dfe 22906->22909 22910 4a5df5 22906->22910 22911 4a5d97 std::_Locinfo::_Locinfo_ctor 22906->22911 22912 51cd02 std::_Facet_Register 2 API calls 22907->22912 22915 51cd02 std::_Facet_Register 2 API calls 22909->22915 22916 4a5dd6 std::_Locinfo::_Locinfo_ctor 22909->22916 22910->22905 22910->22907 22911->22869 22913 4a5dcf 22912->22913 22913->22916 22970 522220 RtlAllocateHeap ___std_exception_copy __Getctype 22913->22970 22915->22916 22916->22869 22918->22869 22922 51ccdc 22919->22922 22923 51c6ea 22922->22923 22924 51cced GetSystemTimePreciseAsFileTime 22922->22924 22923->22880 22924->22923 22927 4a5bde 22926->22927 22928 4a5c01 22926->22928 22927->22928 22933 522220 RtlAllocateHeap ___std_exception_copy __Getctype 22927->22933 22928->22885 22935 4abb6c 22934->22935 22936 4aba45 22934->22936 22957 442040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 22935->22957 22940 4abab3 22936->22940 22941 4abaa6 22936->22941 22943 4aba5a 22936->22943 22938 4abb71 22958 441fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 22938->22958 22945 51cd02 std::_Facet_Register 2 API calls 22940->22945 22947 4aba6a std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 22940->22947 22941->22938 22941->22943 22949 51cd02 22943->22949 22945->22947 22948 4abb2a std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 22947->22948 22959 522220 RtlAllocateHeap ___std_exception_copy __Getctype 22947->22959 22948->22900 22952 51cd07 std::_Facet_Register 22949->22952 22951 51cd21 22951->22947 22952->22951 22954 441fa0 Concurrency::cancel_current_task 22952->22954 22961 52b99c 22952->22961 22953 51cd2d 22953->22953 22954->22953 22960 51e0c1 RtlAllocateHeap RtlAllocateHeap ___std_exception_destroy ___std_exception_copy 22954->22960 22956 441fe3 22956->22947 22957->22938 22958->22947 22960->22956 22963 53489d __Getctype std::_Facet_Register 22961->22963 22962 5348db 22967 52acaf RtlAllocateHeap __dosmaperr 22962->22967 22963->22962 22964 5348c6 RtlAllocateHeap 22963->22964 22964->22963 22966 5348d9 22964->22966 22966->22952 22967->22966 22968->22905 22969->22913 23170 526ba6 23171 526bb9 ___std_exception_copy 23170->23171 23176 5268fd 23171->23176 23173 526bce 23183 521f4c RtlAllocateHeap ___std_exception_copy 23173->23183 23175 526bdb 23178 526909 std::locale::_Setgloballocale 23176->23178 23177 52690f 23193 522193 RtlAllocateHeap ___std_exception_copy __Getctype 23177->23193 23178->23177 23180 526952 23178->23180 23184 526a80 23180->23184 23182 52692a 23182->23173 23183->23175 23185 526a93 23184->23185 23186 526aa6 23184->23186 23185->23182 23194 5269a7 23186->23194 23188 526ac9 23189 526b57 23188->23189 23190 523041 4 API calls 23188->23190 23189->23182 23191 526af7 23190->23191 23192 52bbed 2 API calls 23191->23192 23192->23189 23193->23182 23195 526a10 23194->23195 23196 5269b8 23194->23196 23195->23188 23196->23195 23198 52bbad SetFilePointerEx RtlAllocateHeap ___std_exception_copy 23196->23198 23198->23195 23199 54508f0 GetCurrentHwProfileW 23207 454ab0 GetPEB RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 23225 54506f0 GetCurrentHwProfileW

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 0 45ec20-45ec58 1 45f0bf-45f0d3 0->1 2 45ec5e 0->2 3 45ec64-45ec6c 2->3 4 45eca7-45ecf0 setsockopt recv 3->4 5 45ec6e-45ec94 call 45db60 3->5 4->1 10 45ecf6-45ecf9 4->10 7 45ec99-45eca1 5->7 7->4 9 45f0aa-45f0b9 Sleep 7->9 9->1 9->3 11 45f037-45f053 call 454a90 10->11 12 45ecff-45ed53 call 4a8610 recv 10->12 17 45f055 11->17 18 45f09c-45f0a4 Sleep 11->18 22 45efe4-45eff1 12->22 23 45ed59-45ed74 recv 12->23 20 45f057-45f05d 17->20 21 45f05f-45f086 call 45e060 17->21 18->9 20->18 20->21 31 45f08b-45f097 21->31 22->18 24 45eff7-45f003 22->24 23->22 25 45ed7a-45edb1 23->25 27 45f005-45f013 24->27 28 45f019-45f023 call 51cf83 24->28 29 45ee14-45ee44 call 4a5d50 25->29 30 45edb3-45ee11 call 4a8610 recv 25->30 27->28 28->18 38 45ef64-45efb3 call 45e460 29->38 39 45ee4a 29->39 30->29 31->18 38->22 46 45efb5-45efc4 38->46 40 45ee50-45ef5e 39->40 40->38 47 45efc6-45efd4 46->47 48 45efda-45efe1 call 51cf83 46->48 47->48 48->22
                APIs
                • setsockopt.WS2_32(00000330,0000FFFF,00001006,?,00000008), ref: 0045ECC7
                • recv.WS2_32(?,00000004,00000002), ref: 0045ECE1
                • recv.WS2_32(00000000,0000000C,00000002,0000000C), ref: 0045ED4E
                • recv.WS2_32(00000000,0000000C,00000008), ref: 0045ED6F
                • recv.WS2_32(00000000,?,00000008), ref: 0045EE0C
                  • Part of subcall function 0045DB60: WSAStartup.WS2_32 ref: 0045DB8B
                  • Part of subcall function 0045DB60: socket.WS2_32(?,?,?,?,?,?,50500,?,?), ref: 0045DC2E
                  • Part of subcall function 0045DB60: connect.WS2_32(00000000,?,?,?,?,?,50500,?,?), ref: 0045DC42
                  • Part of subcall function 0045DB60: closesocket.WS2_32(00000000), ref: 0045DC4D
                • recv.WS2_32(?,00000004,00000008), ref: 0045F033
                • Sleep.KERNELBASE(00000001), ref: 0045F09E
                • Sleep.KERNELBASE(00000064), ref: 0045F0AC
                • __Mtx_unlock.LIBCPMT ref: 0045F211
                Strings
                Memory Dump Source
                • Source File: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000007.00000002.4482993398.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4483096105.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484218525.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485091844.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485398486.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: recv$Sleep$Mtx_unlockStartupclosesocketconnectsetsockoptsocket
                • String ID: 50500$t;W
                • API String ID: 2930922264-3984008218
                • Opcode ID: 427da8cd55a5f1240dd8bb43ff905e75735173ab1db38bbf30c36bd63f0ad06f
                • Instruction ID: 3d5da47a67ea7fd6f4feecf2a3496ffa48af0a0cfff1e98a645f1a378fe65856
                • Opcode Fuzzy Hash: 427da8cd55a5f1240dd8bb43ff905e75735173ab1db38bbf30c36bd63f0ad06f
                • Instruction Fuzzy Hash: 18B1F331D00248DFEB24DFA8DC45BADBBB1FF55310F24821AE848A72D2D7746A89DB41

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 51 45e060-45e0af call 4a5d50 54 45e0b5-45e0b8 51->54 55 45e1d4-45e20a call 4a5bd0 51->55 57 45e0c0-45e0e6 54->57 61 45e20c-45e218 55->61 62 45e238-45e26c call 447d20 55->62 59 45e0f8-45e107 57->59 60 45e0e8-45e0f3 57->60 64 45e117-45e123 59->64 65 45e109-45e112 59->65 63 45e1c7 60->63 68 45e22e-45e235 call 51cf83 61->68 69 45e21a-45e228 61->69 81 45e282-45e28a call 4a8610 62->81 82 45e26e-45e280 62->82 71 45e1ca-45e1ce 63->71 66 45e125-45e12e 64->66 67 45e133-45e13f 64->67 65->63 66->63 72 45e141-45e14a 67->72 73 45e14c-45e158 67->73 68->62 69->68 74 45e44b call 522220 69->74 71->55 71->57 72->63 77 45e165-45e171 73->77 78 45e15a-45e163 73->78 83 45e450-45e455 call 522220 74->83 84 45e173-45e17c 77->84 85 45e17e-45e18a 77->85 78->63 86 45e28f-45e2e2 call 447d20 * 2 81->86 82->86 84->63 89 45e197-45e1a3 85->89 90 45e18c-45e195 85->90 99 45e2e4-45e313 call 447d20 call 51e9e0 86->99 100 45e316-45e32c call 447d20 86->100 93 45e1a5-45e1ae 89->93 94 45e1b0-45e1b9 89->94 90->63 93->63 94->71 97 45e1bb-45e1c3 94->97 97->63 99->100 106 45e3b7 100->106 107 45e332-45e338 100->107 108 45e3bb-45e3c1 106->108 110 45e340-45e36c 107->110 111 45e3c3-45e3cf 108->111 112 45e3eb-45e403 108->112 113 45e370-45e37b 110->113 114 45e3e1-45e3e8 call 51cf83 111->114 115 45e3d1-45e3df 111->115 116 45e435-45e44a 112->116 117 45e405-45e411 112->117 113->113 118 45e37d-45e3ab WSASend 113->118 114->112 115->83 115->114 120 45e413-45e421 117->120 121 45e42b-45e432 call 51cf83 117->121 128 45e425-45e429 118->128 129 45e3ad-45e3b5 118->129 120->83 124 45e423 120->124 121->116 124->121 128->108 129->106 129->110
                APIs
                • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,005447E8,00000000,00000000,-005765B0), ref: 0045E3A6
                Strings
                Memory Dump Source
                • Source File: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000007.00000002.4482993398.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4483096105.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484218525.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485091844.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485398486.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: Send
                • String ID: 131$50500$Ws2_32.dll$\;W$t;W$taW$;W
                • API String ID: 121738739-2827972449
                • Opcode ID: 7dca83bfbfcdca64b3f43f4cc8bb21066ab8cdfbf4449cb22754fcf25717ce22
                • Instruction ID: f41ea0fc75fba29c30876f1cfa7f082419e29d15f78d9e39430ef04ec94e9f7f
                • Opcode Fuzzy Hash: 7dca83bfbfcdca64b3f43f4cc8bb21066ab8cdfbf4449cb22754fcf25717ce22
                • Instruction Fuzzy Hash: 56D12231D04648DFDB18CFA9CC44BEEBBF1AF02301F684259D855AB2C2D774998ACB55

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 130 45db60-45db92 WSAStartup 131 45dc66-45dc6f 130->131 132 45db98-45dbc2 call 447d20 * 2 130->132 137 45dbc4-45dbc8 132->137 138 45dbce-45dc14 132->138 137->131 137->138 140 45dc16-45dc1c 138->140 141 45dc60-45dc65 138->141 142 45dc74-45dc7e 140->142 143 45dc1e 140->143 141->131 142->141 148 45dc80-45dc88 142->148 144 45dc24-45dc38 socket 143->144 144->141 147 45dc3a-45dc4a connect 144->147 149 45dc70 147->149 150 45dc4c-45dc54 closesocket 147->150 149->142 150->144 151 45dc56-45dc5a 150->151 151->141
                APIs
                • WSAStartup.WS2_32 ref: 0045DB8B
                • socket.WS2_32(?,?,?,?,?,?,50500,?,?), ref: 0045DC2E
                • connect.WS2_32(00000000,?,?,?,?,?,50500,?,?), ref: 0045DC42
                • closesocket.WS2_32(00000000), ref: 0045DC4D
                Strings
                Memory Dump Source
                • Source File: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000007.00000002.4482993398.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4483096105.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484218525.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485091844.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485398486.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: Startupclosesocketconnectsocket
                • String ID: 50500
                • API String ID: 3098855095-2230786414
                • Opcode ID: d70a2d82d60dbef535e78f831859fae6c799879c68116cad20b5a9ff4f829ff2
                • Instruction ID: a1627e983cb4812fa3b111e5c6d5071ef93178c20839b72b19b4c30df4e0e10c
                • Opcode Fuzzy Hash: d70a2d82d60dbef535e78f831859fae6c799879c68116cad20b5a9ff4f829ff2
                • Instruction Fuzzy Hash: 3531E4729043015BD7218B288C85A2FB7E5FF89328F011F1EFDA4932E1E3749848C696

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 152 5450969-545096b 153 5450977-545097a 152->153 154 545096d 152->154 157 545097c-54509a6 call 54509a0 153->157 155 5450907-545092c 154->155 156 545096f-5450973 154->156 161 545092d-5450934 GetCurrentHwProfileW 155->161 156->153 164 54509b8-54509c6 call 54509ce 157->164 163 5450942-5450964 161->163 163->157 169 54509b1 164->169 170 54509c8-5450be9 164->170 169->164 194 5450bea-5450c27 170->194 197 5450c29-5450c9a 194->197
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 0545092F
                Memory Dump Source
                • Source File: 00000007.00000002.4490653117.0000000005450000.00000040.00001000.00020000.00000000.sdmp, Offset: 05450000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_5450000_MPGPH131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 3ae837fd2bd95e9000dbe1d3e7f60304bf25383184602c93abbcb2d2bf511180
                • Instruction ID: f3337290d7777eb232d63f4d110f4d93f40e5fb7155f906acac19c2a911f7790
                • Opcode Fuzzy Hash: 3ae837fd2bd95e9000dbe1d3e7f60304bf25383184602c93abbcb2d2bf511180
                • Instruction Fuzzy Hash: F15199EF248120BDB256C1922B6CAFAAB6FE6D7730730852BFC0BD5507E6940E4E1031

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 204 54508db-545091c 207 545092d-5450934 GetCurrentHwProfileW 204->207 208 5450942-54509a6 call 54509a0 207->208 215 54509b8-54509c6 call 54509ce 208->215 218 54509b1 215->218 219 54509c8-5450be9 215->219 218->215 243 5450bea-5450c27 219->243 246 5450c29-5450c9a 243->246
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 0545092F
                Memory Dump Source
                • Source File: 00000007.00000002.4490653117.0000000005450000.00000040.00001000.00020000.00000000.sdmp, Offset: 05450000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_5450000_MPGPH131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: efa094d1ef4198521da4f586f0a99f4012e4203f0367064cc806104a57facaf3
                • Instruction ID: 9756603794b235ee7a6aa07e54b139b57a9084c4b55c7c7fbbbd200ec82db267
                • Opcode Fuzzy Hash: efa094d1ef4198521da4f586f0a99f4012e4203f0367064cc806104a57facaf3
                • Instruction Fuzzy Hash: 4E5126EF249121BDB156C5922B68AFA6B6FE6D7B307308427FC0BD5607E6940E4E5031

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 253 5450905-545092c 254 545092d-5450934 GetCurrentHwProfileW 253->254 255 5450942-54509a6 call 54509a0 254->255 262 54509b8-54509c6 call 54509ce 255->262 265 54509b1 262->265 266 54509c8-5450be9 262->266 265->262 290 5450bea-5450c27 266->290 293 5450c29-5450c9a 290->293
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 0545092F
                Memory Dump Source
                • Source File: 00000007.00000002.4490653117.0000000005450000.00000040.00001000.00020000.00000000.sdmp, Offset: 05450000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_5450000_MPGPH131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: df6365cab9bbcde5584199053119436e7177d62596b085b2c737c3e3ced14e76
                • Instruction ID: ae2d0cea13e9591d0f69fa024c37ec1e2102f9fb80121ef6b346c42e56f30b1f
                • Opcode Fuzzy Hash: df6365cab9bbcde5584199053119436e7177d62596b085b2c737c3e3ced14e76
                • Instruction Fuzzy Hash: 7A515AEF249120BDB256C1922B68AFAAB6FE6D77307308527FC0BD5547E6D40E4E5031

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 300 54508f0-545091c 303 545092d-5450934 GetCurrentHwProfileW 300->303 304 5450942-54509a6 call 54509a0 303->304 311 54509b8-54509c6 call 54509ce 304->311 314 54509b1 311->314 315 54509c8-5450be9 311->315 314->311 339 5450bea-5450c27 315->339 342 5450c29-5450c9a 339->342
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 0545092F
                Memory Dump Source
                • Source File: 00000007.00000002.4490653117.0000000005450000.00000040.00001000.00020000.00000000.sdmp, Offset: 05450000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_5450000_MPGPH131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: ebc9171e321a225395ea056cdd5ee952327a92ac476d0b3915443249a4803c98
                • Instruction ID: 69a48fd4519daef5a3f9ff658c2df868dcc5d662482c67fa49fbe5c68421a449
                • Opcode Fuzzy Hash: ebc9171e321a225395ea056cdd5ee952327a92ac476d0b3915443249a4803c98
                • Instruction Fuzzy Hash: 375157EF248120BDB156C5922B6CAFAAB6FE6D6B307308527FC0BD5507E6940F4E1031

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 349 5450985-5450986 350 5450925-5450934 GetCurrentHwProfileW 349->350 351 5450988 349->351 355 5450942-545097f 350->355 353 545098a-54509a6 call 54509a0 351->353 358 54509b8-54509c6 call 54509ce 353->358 355->353 363 54509b1 358->363 364 54509c8-5450be9 358->364 363->358 388 5450bea-5450c27 364->388 391 5450c29-5450c9a 388->391
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 0545092F
                Memory Dump Source
                • Source File: 00000007.00000002.4490653117.0000000005450000.00000040.00001000.00020000.00000000.sdmp, Offset: 05450000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_5450000_MPGPH131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 52b121d73a4bbd5e90f8fdba3719f986a4cfb3e63912822aa03a9b33aa5a304f
                • Instruction ID: 05181fe24ab00efadfbbac47dc6820c9e7eddb435d225845f6774a036c97f603
                • Opcode Fuzzy Hash: 52b121d73a4bbd5e90f8fdba3719f986a4cfb3e63912822aa03a9b33aa5a304f
                • Instruction Fuzzy Hash: 925138EF249120BDB156C1922B68AFAAB6FE6D6B307308527FC0BD5507E6D40E8E5031

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 398 532f0c-532f2e 399 533121 398->399 400 532f34-532f36 398->400 403 533123-533127 399->403 401 532f62-532f85 400->401 402 532f38-532f57 call 522193 400->402 405 532f87-532f89 401->405 406 532f8b-532f91 401->406 409 532f5a-532f5d 402->409 405->406 408 532f93-532fa4 405->408 406->402 406->408 410 532fb7-532fc7 call 532a51 408->410 411 532fa6-532fb4 call 52bbed 408->411 409->403 416 533010-533022 410->416 417 532fc9-532fcf 410->417 411->410 420 533024-53302a 416->420 421 533079-533099 WriteFile 416->421 418 532fd1-532fd4 417->418 419 532ff8-53300e call 532622 417->419 422 532fd6-532fd9 418->422 423 532fdf-532fee call 5329e9 418->423 439 532ff1-532ff3 419->439 427 533065-533077 call 532ace 420->427 428 53302c-53302f 420->428 425 5330a4 421->425 426 53309b-5330a1 421->426 422->423 429 5330b9-5330bc 422->429 423->439 433 5330a7-5330b2 425->433 426->425 448 53304c-53304f 427->448 434 533051-533063 call 532c92 428->434 435 533031-533034 428->435 444 5330bf-5330c1 429->444 441 5330b4-5330b7 433->441 442 53311c-53311f 433->442 434->448 443 53303a-533047 call 532ba9 435->443 435->444 439->433 441->429 442->403 443->448 445 5330c3-5330c8 444->445 446 5330ef-5330fb 444->446 450 5330e1-5330ea call 52ac78 445->450 451 5330ca-5330dc 445->451 452 533105-533117 446->452 453 5330fd-533103 446->453 448->439 450->409 451->409 452->409 453->399 453->452
                APIs
                • WriteFile.KERNELBASE(?,00000000,00526AF7,?,00000000,00000000,00000000,?,00000000,?,0051C023,00526AF7,00000000,0051C023,?,?), ref: 00533091
                Memory Dump Source
                • Source File: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000007.00000002.4482993398.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4483096105.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484218525.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485091844.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485398486.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: FileWrite
                • String ID:
                • API String ID: 3934441357-0
                • Opcode ID: a17dbfebab1aa79b15e0a181da90016fbe88d0d119c908d61b74fd0df51c02d2
                • Instruction ID: 4d94682702d7f6424607c5d46547817ed9dd9d4ce1935fa7840bb0380c6b2fa7
                • Opcode Fuzzy Hash: a17dbfebab1aa79b15e0a181da90016fbe88d0d119c908d61b74fd0df51c02d2
                • Instruction Fuzzy Hash: 1261F071D0411AAFDF15DFA8C889EEEBFB9BF49304F140159E904AB242D372CA01DBA0

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 456 4aba20-4aba3f 457 4abb6c call 442040 456->457 458 4aba45-4aba58 456->458 463 4abb71 call 441fa0 457->463 459 4aba5a 458->459 460 4aba83-4aba8b 458->460 462 4aba5c-4aba61 459->462 464 4aba8d-4aba92 460->464 465 4aba94-4abaa4 460->465 466 4aba64-4aba65 call 51cd02 462->466 471 4abb76-4abb7b call 522220 463->471 464->462 468 4abab3-4abab5 465->468 469 4abaa6-4abaab 465->469 476 4aba6a-4aba6f 466->476 473 4abac7 468->473 474 4abab7-4abac5 call 51cd02 468->474 469->463 472 4abab1 469->472 472->466 475 4abac9-4abaec 473->475 474->475 479 4abaee-4abb18 call 51e9e0 call 51ef60 475->479 480 4abb43-4abb69 call 51e9e0 call 51ef60 475->480 476->471 481 4aba75-4aba81 476->481 492 4abb1a-4abb28 479->492 493 4abb2c-4abb40 call 51cf83 479->493 481->475 492->471 494 4abb2a 492->494 494->493
                APIs
                • Concurrency::cancel_current_task.LIBCPMT ref: 004ABB71
                Memory Dump Source
                • Source File: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000007.00000002.4482993398.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4483096105.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484218525.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485091844.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485398486.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: Concurrency::cancel_current_task
                • String ID:
                • API String ID: 118556049-0
                • Opcode ID: b19d2212db506fa46971754378483badd225f06599945ea51feb898bce11e8e1
                • Instruction ID: 5bc5d19c601ffac92f364034007bc4566d3cb9284dcaa4e27eecc02c897b43d6
                • Opcode Fuzzy Hash: b19d2212db506fa46971754378483badd225f06599945ea51feb898bce11e8e1
                • Instruction Fuzzy Hash: DE4127729001099BDB15DF68DD816AEBBA5FF96340F14026AFC04EB306D734EE5187E5

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 497 532582-532596 call 53814e 500 532598-53259a 497->500 501 53259c-5325a4 497->501 502 5325ea-53260a call 5380bd 500->502 503 5325a6-5325ad 501->503 504 5325af-5325b2 501->504 513 53261c 502->513 514 53260c-53261a call 52ac78 502->514 503->504 506 5325ba-5325ce call 53814e * 2 503->506 507 5325d0-5325e0 call 53814e FindCloseChangeNotification 504->507 508 5325b4-5325b8 504->508 506->500 506->507 507->500 516 5325e2-5325e8 507->516 508->506 508->507 518 53261e-532621 513->518 514->518 516->502
                APIs
                • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,00532469,00000000,CF830579,00571148,0000000C,00532525,0052662D,?), ref: 005325D8
                Memory Dump Source
                • Source File: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000007.00000002.4482993398.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4483096105.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484218525.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485091844.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485398486.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: ChangeCloseFindNotification
                • String ID:
                • API String ID: 2591292051-0
                • Opcode ID: 4c64a32bacd993700b503bc5980d5870caed8b70aabeedeba3845a3f3c5a7468
                • Instruction ID: 1bfb0fd55f68e81be262918f88ec186ee23119f9928a2a7a71567fc3c6252f7b
                • Opcode Fuzzy Hash: 4c64a32bacd993700b503bc5980d5870caed8b70aabeedeba3845a3f3c5a7468
                • Instruction Fuzzy Hash: 6F112633604A2016CA3922746C5EB7E6F59BFC3734F250259F9189F2C2EEB1DD819151

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 523 52bacc-52bae4 call 53814e 526 52bae6-52baed 523->526 527 52bafa-52bb10 SetFilePointerEx 523->527 528 52baf4-52baf8 526->528 529 52bb12-52bb23 call 52ac78 527->529 530 52bb25-52bb2f 527->530 532 52bb4b-52bb4e 528->532 529->528 530->528 531 52bb31-52bb46 530->531 531->532
                APIs
                • SetFilePointerEx.KERNELBASE(00000000,00000000,00570E00,0051C023,00000002,0051C023,00000000,?,?,?,0052BBD6,00000000,?,0051C023,00000002,00570E00), ref: 0052BB08
                Memory Dump Source
                • Source File: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000007.00000002.4482993398.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4483096105.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484218525.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485091844.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485398486.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: FilePointer
                • String ID:
                • API String ID: 973152223-0
                • Opcode ID: d7f7c9b44027ffcc00f6a46de1d064b9ca6320506a793986b2a8efa1b1ab6876
                • Instruction ID: 4d0e54ccc56df29ab1c8f5357c5fdcf3e75f5335ce596facc0224a7fde4c50f0
                • Opcode Fuzzy Hash: d7f7c9b44027ffcc00f6a46de1d064b9ca6320506a793986b2a8efa1b1ab6876
                • Instruction Fuzzy Hash: 12010432600265AFDF098F59DC49CAE3F29FF82320B240208F8119B2D1EB71DD419790

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 536 51cd02-51cd05 537 51cd14-51cd17 call 52b99c 536->537 539 51cd1c-51cd1f 537->539 540 51cd21-51cd22 539->540 541 51cd07-51cd12 call 52f248 539->541 541->537 544 51cd23-51cd27 541->544 545 441fa0-441ff0 call 441f80 call 51e96b call 51e0c1 544->545 546 51cd2d 544->546 546->546
                APIs
                • ___std_exception_copy.LIBVCRUNTIME ref: 00441FDE
                Memory Dump Source
                • Source File: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000007.00000002.4482993398.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4483096105.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484218525.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485091844.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485398486.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_copy
                • String ID:
                • API String ID: 2659868963-0
                • Opcode ID: 557d8e023e030bebac643801d6b6b953c5d046d101e21c4be8d0de1b84703fd1
                • Instruction ID: 28db6862278891d92f7f4a3bbe00283d552b999f922a93228321a0845c711948
                • Opcode Fuzzy Hash: 557d8e023e030bebac643801d6b6b953c5d046d101e21c4be8d0de1b84703fd1
                • Instruction Fuzzy Hash: E801263540020EA7DB14ABA8FC058CA7FECBE01364B508636F918AB190FB70E9D0C795

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 553 533e63-533e6e 554 533e70-533e7a 553->554 555 533e7c-533e82 553->555 554->555 556 533eb0-533ebb call 52acaf 554->556 557 533e84-533e85 555->557 558 533e9b-533eac RtlAllocateHeap 555->558 562 533ebd-533ebf 556->562 557->558 559 533e87-533e8e call 531a03 558->559 560 533eae 558->560 559->556 566 533e90-533e99 call 52f248 559->566 560->562 566->556 566->558
                APIs
                • RtlAllocateHeap.NTDLL(00000008,0051B16C,?,?,005337E9,00000001,00000364,?,00000006,000000FF,?,0051E0EB,?,?,?,?), ref: 00533EA4
                Memory Dump Source
                • Source File: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000007.00000002.4482993398.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4483096105.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484218525.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485091844.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485398486.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: AllocateHeap
                • String ID:
                • API String ID: 1279760036-0
                • Opcode ID: 2efc9586d8a1a65172764931545a71947003adcbab50ea08d2d103c3660b552a
                • Instruction ID: f54b4df57372b0e412d1db6fb285495d2c403ca8d1438a71dca8373f68097e49
                • Opcode Fuzzy Hash: 2efc9586d8a1a65172764931545a71947003adcbab50ea08d2d103c3660b552a
                • Instruction Fuzzy Hash: 66F0E932509535669B326B719C05B5B3F4DBF81761F154521BC04AA080DB74EE0873E0

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 569 53489d-5348a9 570 5348db-5348e6 call 52acaf 569->570 571 5348ab-5348ad 569->571 579 5348e8-5348ea 570->579 572 5348c6-5348d7 RtlAllocateHeap 571->572 573 5348af-5348b0 571->573 575 5348b2-5348b9 call 531a03 572->575 576 5348d9 572->576 573->572 575->570 581 5348bb-5348c4 call 52f248 575->581 576->579 581->570 581->572
                APIs
                • RtlAllocateHeap.NTDLL(00000000,?,?,?,0051E0EB,?,?,?,?,?,00442D8D,0051B16C,?,?,0051B16C), ref: 005348D0
                Memory Dump Source
                • Source File: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000007.00000002.4482993398.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4483096105.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484218525.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485091844.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485398486.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: AllocateHeap
                • String ID:
                • API String ID: 1279760036-0
                • Opcode ID: 6b515764505151223242b3d0145b65b86860ee85b1bbecad418aa046d3baeeac
                • Instruction ID: fc8080a42db03bc1b731d5339c9fe025f025f8949d906c9f2f31192c3a957da0
                • Opcode Fuzzy Hash: 6b515764505151223242b3d0145b65b86860ee85b1bbecad418aa046d3baeeac
                • Instruction Fuzzy Hash: 2CE06D351126A25AE6212A796D05B6BFF4DFF833A0F160A31AC04A60D1DB70EC509AE1
                Strings
                Memory Dump Source
                • Source File: 00000007.00000002.4490704244.0000000005460000.00000040.00001000.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_5460000_MPGPH131.jbxd
                Similarity
                • API ID:
                • String ID: wMQ>
                • API String ID: 0-3442419732
                • Opcode ID: d7e3bacbab36b4a76d51b20ed660664d2b8d1d9d29e1c309ffb1cbb14f01e8e6
                • Instruction ID: 731bf2110a6fe4d6d3c03a18ccb76f6fd22db114d29b339ca225d4a3f0c1610d
                • Opcode Fuzzy Hash: d7e3bacbab36b4a76d51b20ed660664d2b8d1d9d29e1c309ffb1cbb14f01e8e6
                • Instruction Fuzzy Hash: 872101EB14C150BD6603D5A16B9CBF66F2BE5D32303318427F44BC4502F29A4E9B92B3
                Strings
                Memory Dump Source
                • Source File: 00000007.00000002.4490704244.0000000005460000.00000040.00001000.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_5460000_MPGPH131.jbxd
                Similarity
                • API ID:
                • String ID: wMQ>
                • API String ID: 0-3442419732
                • Opcode ID: 79e7d845377201b3c250f7d5ba9954e6eef4b9522674c9c1af088638ea35d1c5
                • Instruction ID: 5780ff702c4f1434d80d6855033244f550db50b55164e3283bad82bf11ac44be
                • Opcode Fuzzy Hash: 79e7d845377201b3c250f7d5ba9954e6eef4b9522674c9c1af088638ea35d1c5
                • Instruction Fuzzy Hash: DC1149EB14C124BD7152D5923B6CBFA6A6FE1D67303318427F80BD5606E29A0E9B6073
                Strings
                Memory Dump Source
                • Source File: 00000007.00000002.4490704244.0000000005460000.00000040.00001000.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_5460000_MPGPH131.jbxd
                Similarity
                • API ID:
                • String ID: wMQ>
                • API String ID: 0-3442419732
                • Opcode ID: 14a2c84f0ee7ad9eb45695087ddc5c6831f655e0a5b2349b20336a49d881e261
                • Instruction ID: 39227e306807420c8f33bc443495e36960c33d2aed1812865d550f2c473c0b25
                • Opcode Fuzzy Hash: 14a2c84f0ee7ad9eb45695087ddc5c6831f655e0a5b2349b20336a49d881e261
                • Instruction Fuzzy Hash: 49119DEB14C124BD6152D5522B6CBFA6B6BE1D62303308427F80FD6602E2DA0F9B9173
                Strings
                Memory Dump Source
                • Source File: 00000007.00000002.4490704244.0000000005460000.00000040.00001000.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_5460000_MPGPH131.jbxd
                Similarity
                • API ID:
                • String ID: wMQ>
                • API String ID: 0-3442419732
                • Opcode ID: e7f2106a536cdadfc0b875edbedfb660917dd783fa6f0f40b78160fe0b0d4fdd
                • Instruction ID: dc2933b657b8d70b54d7cd1b0f266c8cba558f1c97844b86706bae288df8ac34
                • Opcode Fuzzy Hash: e7f2106a536cdadfc0b875edbedfb660917dd783fa6f0f40b78160fe0b0d4fdd
                • Instruction Fuzzy Hash: D211BCEB18C114BD6142D1916B5CBF66A2FE1D22303318427B84B95602F2D64E9BA1B3
                Strings
                Memory Dump Source
                • Source File: 00000007.00000002.4490704244.0000000005460000.00000040.00001000.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_5460000_MPGPH131.jbxd
                Similarity
                • API ID:
                • String ID: wMQ>
                • API String ID: 0-3442419732
                • Opcode ID: 61665e4b144e6e51f24f7321c4aeb76598e4ab431359ac8caf00aea66dba8910
                • Instruction ID: 51ff2179769ee2a055ac2caa834fa8b9d90930c93ef1e411062523042b3dbe47
                • Opcode Fuzzy Hash: 61665e4b144e6e51f24f7321c4aeb76598e4ab431359ac8caf00aea66dba8910
                • Instruction Fuzzy Hash: D011ADEB18C124BD6142E1912B5CBF66B6FE1D23303308427F84BD5602E2D60F9BA173
                Strings
                Memory Dump Source
                • Source File: 00000007.00000002.4490704244.0000000005460000.00000040.00001000.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_5460000_MPGPH131.jbxd
                Similarity
                • API ID:
                • String ID: wMQ>
                • API String ID: 0-3442419732
                • Opcode ID: 81661d802e7d0862a5a0f4bfbf8d5befb51a60b7dcc87055361eb389838fea3d
                • Instruction ID: 8924896262e515742409e3ffd9249bf183b0e7018dc29355af1dcb46897b3572
                • Opcode Fuzzy Hash: 81661d802e7d0862a5a0f4bfbf8d5befb51a60b7dcc87055361eb389838fea3d
                • Instruction Fuzzy Hash: AB018CEB18C124BD6142D5912B5CBF67A6FE1D23303318437F84BD5602E2EA0E9BA133
                Strings
                Memory Dump Source
                • Source File: 00000007.00000002.4490704244.0000000005460000.00000040.00001000.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_5460000_MPGPH131.jbxd
                Similarity
                • API ID:
                • String ID: wMQ>
                • API String ID: 0-3442419732
                • Opcode ID: 666d88cea79ab91a3cea39e10bc419dd1ffcffc7fd849a76ba30cfb1b39a11b9
                • Instruction ID: 8e2c51a6ffaca3382cdab60b37e7e6f6e913b0f5c1704309e263f774680118ec
                • Opcode Fuzzy Hash: 666d88cea79ab91a3cea39e10bc419dd1ffcffc7fd849a76ba30cfb1b39a11b9
                • Instruction Fuzzy Hash: CB01F2A704C260ADA243D5612B9C3F67F6BA6972307314563F88FC5602E3A60A979223
                Strings
                Memory Dump Source
                • Source File: 00000007.00000002.4490704244.0000000005460000.00000040.00001000.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_5460000_MPGPH131.jbxd
                Similarity
                • API ID:
                • String ID: wMQ>
                • API String ID: 0-3442419732
                • Opcode ID: c7aa18b6dc4383e4260863fb672b6b728970474d34d19512a9a12aab6fa71091
                • Instruction ID: 4d90b3b6a5346afd798e9166b377afc1014c0a9d0169b9d0f5d4c47a020a8d47
                • Opcode Fuzzy Hash: c7aa18b6dc4383e4260863fb672b6b728970474d34d19512a9a12aab6fa71091
                • Instruction Fuzzy Hash: A2F0F4B718C120EE6243E5652B9D3F66A67A5932303714037F44B86602E6A60E96A123
                Strings
                Memory Dump Source
                • Source File: 00000007.00000002.4490704244.0000000005460000.00000040.00001000.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_5460000_MPGPH131.jbxd
                Similarity
                • API ID:
                • String ID: wMQ>
                • API String ID: 0-3442419732
                • Opcode ID: 53e5372769e6481ae35a8ccb7728566b7c52d2573b54e61324eaedcff741b3c2
                • Instruction ID: 27ba5ff34857001c7475168d8cafce6c6414a4b75765ff4b6db49f2540bc6b1e
                • Opcode Fuzzy Hash: 53e5372769e6481ae35a8ccb7728566b7c52d2573b54e61324eaedcff741b3c2
                • Instruction Fuzzy Hash: 490176A690C3547DD613E525558D7F27F27AB43232B290097D0CF89653F18746578193
                Strings
                Memory Dump Source
                • Source File: 00000007.00000002.4490704244.0000000005460000.00000040.00001000.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_5460000_MPGPH131.jbxd
                Similarity
                • API ID:
                • String ID: wMQ>
                • API String ID: 0-3442419732
                • Opcode ID: fa17500b1d1b616353e80842c3d253b0116e8a0943b212d9f8af9cfc925e0715
                • Instruction ID: ab8607ddc7f952dee45c666a143438c4f7a4ca0a5f64e756eb7cd61d370b91bf
                • Opcode Fuzzy Hash: fa17500b1d1b616353e80842c3d253b0116e8a0943b212d9f8af9cfc925e0715
                • Instruction Fuzzy Hash: D2E092EB19C124EE6553E1A6279C3F56A5BA1A31303710123F08FD6B02969B0F6B6023
                APIs
                • std::_Lockit::_Lockit.LIBCPMT ref: 004AAEB3
                • std::_Lockit::_Lockit.LIBCPMT ref: 004AAED5
                • std::_Lockit::~_Lockit.LIBCPMT ref: 004AAEF5
                • std::_Lockit::~_Lockit.LIBCPMT ref: 004AAF1F
                • std::_Lockit::_Lockit.LIBCPMT ref: 004AAF8D
                • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 004AAFD9
                • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 004AAFF3
                • std::_Lockit::~_Lockit.LIBCPMT ref: 004AB088
                • std::_Facet_Register.LIBCPMT ref: 004AB095
                Strings
                Memory Dump Source
                • Source File: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000007.00000002.4482993398.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4483096105.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484218525.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485091844.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485398486.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                • String ID: bad locale name
                • API String ID: 3375549084-1405518554
                • Opcode ID: 0b683d8567a58570295f82b389718261da6ffaa80d1aec8ca33d174822eae808
                • Instruction ID: 95c165697748bb07a2090bf1e8a58c426f41e1f6c29759e125c03afb57618426
                • Opcode Fuzzy Hash: 0b683d8567a58570295f82b389718261da6ffaa80d1aec8ca33d174822eae808
                • Instruction Fuzzy Hash: F8619DB5D002459FEB20DFA4D889BDEBFB4BF65310F144059E808A7381E738E945CB96
                APIs
                • std::_Lockit::_Lockit.LIBCPMT ref: 004437E9
                • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00443835
                • __Getctype.LIBCPMT ref: 0044384E
                • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0044386A
                • std::_Lockit::~_Lockit.LIBCPMT ref: 004438FF
                Strings
                Memory Dump Source
                • Source File: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000007.00000002.4482993398.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4483096105.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484218525.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485091844.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485398486.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                • String ID: 0:D$bad locale name
                • API String ID: 1840309910-3892007210
                • Opcode ID: 515cc488061c2545b068f53c42cb9114d8bb3f8b1ddbec7160b93d3b279eef7d
                • Instruction ID: fda69150531bda16cd9ca26006792c97c8e3d5b2b99f903a4955864525bf4417
                • Opcode Fuzzy Hash: 515cc488061c2545b068f53c42cb9114d8bb3f8b1ddbec7160b93d3b279eef7d
                • Instruction Fuzzy Hash: 7C517DF1D003499BEB10DFA4D88579EFBB8BF54704F144169E804AB381E779AA48CB92
                APIs
                • _ValidateLocalCookies.LIBCMT ref: 005208B7
                • ___except_validate_context_record.LIBVCRUNTIME ref: 005208BF
                • _ValidateLocalCookies.LIBCMT ref: 00520948
                • __IsNonwritableInCurrentImage.LIBCMT ref: 00520973
                • _ValidateLocalCookies.LIBCMT ref: 005209C8
                Strings
                Memory Dump Source
                • Source File: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000007.00000002.4482993398.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4483096105.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484218525.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485091844.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485398486.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                • String ID: CQ$csm
                • API String ID: 1170836740-1629540169
                • Opcode ID: 37ee439ae3788193be2401b96ac71f6945aee16afde9a47c0e2bf3f242090fd0
                • Instruction ID: 892b8eca4c8ffbd67f8e13c428d3fcd27e890cbaaec1ed528d2dcec0e15f14aa
                • Opcode Fuzzy Hash: 37ee439ae3788193be2401b96ac71f6945aee16afde9a47c0e2bf3f242090fd0
                • Instruction Fuzzy Hash: 7441F834A012299BDF10DF68E885A9FBFB4BF46324F148055E8199B3D3D731EA45CB91
                APIs
                • std::_Lockit::_Lockit.LIBCPMT ref: 004A9543
                • std::_Lockit::_Lockit.LIBCPMT ref: 004A9566
                • std::_Lockit::~_Lockit.LIBCPMT ref: 004A9586
                • std::_Facet_Register.LIBCPMT ref: 004A95FB
                • std::_Lockit::~_Lockit.LIBCPMT ref: 004A9613
                • Concurrency::cancel_current_task.LIBCPMT ref: 004A962B
                Memory Dump Source
                • Source File: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000007.00000002.4482993398.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4483096105.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484218525.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485091844.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485398486.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                • String ID:
                • API String ID: 2081738530-0
                • Opcode ID: a84ee0d12e363d936b25c413a612dab48eeb404fa12a6ac13a5abd8207b79779
                • Instruction ID: de8f14c0acf57d4a99a8082372a1e4b478b1c8d3972992462c2a792130925d69
                • Opcode Fuzzy Hash: a84ee0d12e363d936b25c413a612dab48eeb404fa12a6ac13a5abd8207b79779
                • Instruction Fuzzy Hash: 53412572C00215EFDB11DF54E845AAEBB74FF22724F14421AE8496B381E734AD45CBD5
                APIs
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004460F2
                • ___std_exception_destroy.LIBVCRUNTIME ref: 0044617F
                • ___std_exception_copy.LIBVCRUNTIME ref: 00446248
                Strings
                • recursive_directory_iterator::operator++, xrefs: 004461CC
                Memory Dump Source
                • Source File: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000007.00000002.4482993398.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4483096105.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484218525.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485091844.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485398486.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_destroy$___std_exception_copy
                • String ID: recursive_directory_iterator::operator++
                • API String ID: 1206660477-953255998
                • Opcode ID: 3e18b17712177bf5265fc12b5abc2325fe6ab039e67610525fbe2c0cec0580fe
                • Instruction ID: 1d06802589ea73fce13163c7aba8697dab90b2f14e2b0a528c8456ff28b6ab32
                • Opcode Fuzzy Hash: 3e18b17712177bf5265fc12b5abc2325fe6ab039e67610525fbe2c0cec0580fe
                • Instruction Fuzzy Hash: F4E135B09006049FEB18DF68D945B9EFBF9FF45300F10461EE41697782D778AA48CBA6
                APIs
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004486DE
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004486ED
                Strings
                Memory Dump Source
                • Source File: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000007.00000002.4482993398.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4483096105.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484218525.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485091844.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485398486.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_destroy
                • String ID: at line $, column
                • API String ID: 4194217158-191570568
                • Opcode ID: f438a158de764309a5d7de61943b336f6b6a83696f5506c7cd7c4e7cc046346d
                • Instruction ID: d89484a9352427d1be0980e0a75dc34159763f03e212a92199492ec47daa3dd3
                • Opcode Fuzzy Hash: f438a158de764309a5d7de61943b336f6b6a83696f5506c7cd7c4e7cc046346d
                • Instruction Fuzzy Hash: 2D614971D002049FEB08DF68DD8579EBBB1FF85304F14421DE415A7792EB78AA84C795
                APIs
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004B3946
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004B395F
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004B3A97
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004B3AB0
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004B3C16
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004B3C2F
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004B4479
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004B4492
                Strings
                Memory Dump Source
                • Source File: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000007.00000002.4482993398.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4483096105.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484218525.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485091844.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485398486.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_destroy
                • String ID: value
                • API String ID: 4194217158-494360628
                • Opcode ID: a686215d7c86d2877dfdf79b089aa33effc83b7203da67065bf1d3b6f3987aa4
                • Instruction ID: a7f5eb52dc91f40d6653cb30fa51c6de5449ad8de2bf0a83f850b077d2021710
                • Opcode Fuzzy Hash: a686215d7c86d2877dfdf79b089aa33effc83b7203da67065bf1d3b6f3987aa4
                • Instruction Fuzzy Hash: D951D170C00258DBEF14DFA8CD89BDEBFB4BF45304F144259E445A7282D7786A89CB65
                APIs
                • ___std_exception_copy.LIBVCRUNTIME ref: 00443C0F
                Strings
                Memory Dump Source
                • Source File: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000007.00000002.4482993398.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4483096105.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484218525.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485091844.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485398486.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_copy
                • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                • API String ID: 2659868963-1866435925
                • Opcode ID: c0fab6b057d7c44d7bc8bf273ddb6360478c3ff7ba6c7dd2d19e387b90159327
                • Instruction ID: 27a81e23bd6ef86c6132d47fac69e8c69bb94f2d27179c9f57a20ad9d35a8ad5
                • Opcode Fuzzy Hash: c0fab6b057d7c44d7bc8bf273ddb6360478c3ff7ba6c7dd2d19e387b90159327
                • Instruction Fuzzy Hash: EB1120B29007046BD700DF59C806B8ABBE8FF44310F04852BF9199B282F774EA40CB95
                Strings
                • unordered_map/set too long, xrefs: 004B2F43
                Memory Dump Source
                • Source File: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000007.00000002.4482993398.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4483096105.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484218525.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485091844.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485398486.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: unordered_map/set too long
                • API String ID: 0-306623848
                • Opcode ID: 1be0ba8213fa319106f833cef62005a030918ab8cdf47c6686063a542cfd3880
                • Instruction ID: 1863fc12b4c8c22a32571629ad9a9098f86bfc2db798c264c467b2a639d7b4de
                • Opcode Fuzzy Hash: 1be0ba8213fa319106f833cef62005a030918ab8cdf47c6686063a542cfd3880
                • Instruction Fuzzy Hash: ABE1F271A001059FCB18DF28C990AADBBB5FF49310B14836AE819DB395E774ED51CBA4
                APIs
                • ___std_exception_copy.LIBVCRUNTIME ref: 0044844D
                Strings
                Memory Dump Source
                • Source File: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000007.00000002.4482993398.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4483096105.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484218525.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485091844.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485398486.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_copy
                • String ID: parse error$ror
                • API String ID: 2659868963-4201802366
                • Opcode ID: 219ea096085af0855fa69d0c53ba53a85f8244524164dc71f6e1747b5cdedd92
                • Instruction ID: d87648fa63b1941d07e3f428191d0e7ebe501f95502ec30832eae1e074badcd8
                • Opcode Fuzzy Hash: 219ea096085af0855fa69d0c53ba53a85f8244524164dc71f6e1747b5cdedd92
                • Instruction Fuzzy Hash: BBC10571D006498FEB08CF68CD857ADBB71FF56304F14824DE4046B692EBB8AAC5CB95
                APIs
                • ___std_exception_destroy.LIBVCRUNTIME ref: 00448051
                • ___std_exception_destroy.LIBVCRUNTIME ref: 00448060
                Strings
                Memory Dump Source
                • Source File: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000007.00000002.4482993398.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4483096105.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484218525.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485091844.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485398486.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_destroy
                • String ID: [json.exception.
                • API String ID: 4194217158-791563284
                • Opcode ID: bf6f9194f127504aebf295da9203bc9fa6d9b32cbd46d1bf6ef35faabf351988
                • Instruction ID: 6ec5fd873d7e8587c50a26fd6f3fa4c328a08a76d88962279f6ba1442ab2f585
                • Opcode Fuzzy Hash: bf6f9194f127504aebf295da9203bc9fa6d9b32cbd46d1bf6ef35faabf351988
                • Instruction Fuzzy Hash: 469107319102089FEB18CFA8CD85BDEBFB1FF55304F24425EE400AB692DBB5A985C795
                APIs
                • ___std_exception_copy.LIBVCRUNTIME ref: 00443C0F
                Strings
                Memory Dump Source
                • Source File: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000007.00000002.4482993398.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4483096105.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484218525.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485091844.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485398486.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_copy
                • String ID: ios_base::badbit set$ios_base::failbit set
                • API String ID: 2659868963-1240500531
                • Opcode ID: ea6837f8c4ff6cad5dceb9142e0b39827ce9cb4da3849a50ab051b542a3c1c82
                • Instruction ID: 67b37fd40274e57d09512e34074f78903c5f66ed6417e7cd21571a913fb2aba9
                • Opcode Fuzzy Hash: ea6837f8c4ff6cad5dceb9142e0b39827ce9cb4da3849a50ab051b542a3c1c82
                • Instruction Fuzzy Hash: FE412671910204ABDB04DF58CC86BAEFBF8FF45710F14821AF91597782E774AA40CBA5
                APIs
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004B4E29
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004B4E42
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004B594D
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004B5966
                Strings
                Memory Dump Source
                • Source File: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000007.00000002.4482993398.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4483096105.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484218525.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485091844.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485398486.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_destroy
                • String ID: value
                • API String ID: 4194217158-494360628
                • Opcode ID: 8adb299e31bad10c3b415fde5024909d8bed926bb0010a19cab3ad34aca1eaf4
                • Instruction ID: 15243c0fe897c98c5a484ffeb1f9a09d76cfb7d8142b6d40522d4a3fc24e71c2
                • Opcode Fuzzy Hash: 8adb299e31bad10c3b415fde5024909d8bed926bb0010a19cab3ad34aca1eaf4
                • Instruction Fuzzy Hash: C551DFB0C00258DBEB14DFA8CC89BDEFFB4BF45304F14425AE405A7282D7786A89CB65
                APIs
                • Concurrency::cancel_current_task.LIBCPMT ref: 004B99F1
                Strings
                • type must be string, but is , xrefs: 004B9A58
                • type must be boolean, but is , xrefs: 004B9AE2
                Memory Dump Source
                • Source File: 00000007.00000002.4483096105.0000000000441000.00000040.00000001.01000000.00000005.sdmp, Offset: 00440000, based on PE: true
                • Associated: 00000007.00000002.4482993398.0000000000440000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4483096105.0000000000573000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484218525.0000000000577000.00000004.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000058A000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000071E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.00000000007FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.0000000000835000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000083E000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4484284014.000000000084C000.00000040.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485091844.000000000084D000.00000080.00000001.01000000.00000005.sdmpDownload File
                • Associated: 00000007.00000002.4485398486.0000000000A02000.00000040.00000001.01000000.00000005.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_7_2_440000_MPGPH131.jbxd
                Yara matches
                Similarity
                • API ID: Concurrency::cancel_current_task
                • String ID: type must be boolean, but is $type must be string, but is
                • API String ID: 118556049-436076039
                • Opcode ID: 68b96d55fb9c92cb24553b03d0b2b0d497091bf1287fd7c910d5af23a8cb459a
                • Instruction ID: a2404520db50e7f3914f65a4c99942635b9c663db7f367f32c7c69bd1501c079
                • Opcode Fuzzy Hash: 68b96d55fb9c92cb24553b03d0b2b0d497091bf1287fd7c910d5af23a8cb459a
                • Instruction Fuzzy Hash: 763180B1900144AFD714EB94D842BDFBBA8FB15304F14426EF405D7791EB39AE44C799

                Execution Graph

                Execution Coverage:1.8%
                Dynamic/Decrypted Code Coverage:3.9%
                Signature Coverage:0%
                Total number of Nodes:258
                Total number of Limit Nodes:25
                execution_graph 23943 512dd0 23946 512d0e 23943->23946 23945 512de2 23949 512d1a std::_Locinfo::_Locinfo_dtor 23946->23949 23947 512d21 23964 51acaf RtlAllocateHeap __dosmaperr 23947->23964 23949->23947 23951 512d41 23949->23951 23950 512d26 23965 512210 RtlAllocateHeap ___std_exception_copy 23950->23965 23953 512d53 23951->23953 23954 512d46 23951->23954 23960 5240f8 23953->23960 23966 51acaf RtlAllocateHeap __dosmaperr 23954->23966 23957 512d5c 23959 512d31 23957->23959 23967 51acaf RtlAllocateHeap __dosmaperr 23957->23967 23959->23945 23961 524104 std::_Lockit::_Lockit std::_Locinfo::_Locinfo_dtor 23960->23961 23968 52419c 23961->23968 23963 52411f 23963->23957 23964->23950 23965->23959 23966->23959 23967->23959 23970 5241bf 23968->23970 23973 524205 23970->23973 23974 523e63 23970->23974 23971 524220 23978 524823 RtlAllocateHeap __dosmaperr 23971->23978 23973->23963 23977 523e70 __Getctype std::_Facet_Register 23974->23977 23975 523e9b RtlAllocateHeap 23976 523eae __dosmaperr 23975->23976 23975->23977 23976->23971 23977->23975 23977->23976 23978->23973 24305 432540 RtlAllocateHeap RtlAllocateHeap RtlAllocateHeap std::locale::_Locimp::_Locimp 23982 516658 23983 51666b ___std_exception_copy 23982->23983 23988 516533 23983->23988 23985 516677 23995 511f4c RtlAllocateHeap ___std_exception_copy 23985->23995 23987 516683 23989 51653f std::_Locinfo::_Locinfo_dtor 23988->23989 23990 516549 23989->23990 23993 51656c 23989->23993 24010 512193 RtlAllocateHeap ___std_exception_copy __Getctype 23990->24010 23992 516564 23992->23985 23993->23992 23996 5165ca 23993->23996 23995->23987 23997 5165d7 23996->23997 23998 5165fa 23996->23998 24035 512193 RtlAllocateHeap ___std_exception_copy __Getctype 23997->24035 24009 5165f2 23998->24009 24011 513041 23998->24011 24005 516626 24028 5224af 24005->24028 24009->23992 24010->23992 24012 51305a 24011->24012 24016 513081 24011->24016 24013 5239f2 RtlAllocateHeap 24012->24013 24012->24016 24014 513076 24013->24014 24037 522dfb 24014->24037 24017 52485d 24016->24017 24018 524874 24017->24018 24019 51661a 24017->24019 24018->24019 24105 524823 RtlAllocateHeap __dosmaperr 24018->24105 24021 5239f2 24019->24021 24022 523a13 24021->24022 24023 5239fe 24021->24023 24022->24005 24106 51acaf RtlAllocateHeap __dosmaperr 24023->24106 24025 523a03 24107 512210 RtlAllocateHeap ___std_exception_copy 24025->24107 24027 523a0e 24027->24005 24029 5224d8 24028->24029 24034 51662d 24028->24034 24030 522527 24029->24030 24032 5224ff 24029->24032 24112 512193 RtlAllocateHeap ___std_exception_copy __Getctype 24030->24112 24108 52241e 24032->24108 24034->24009 24036 524823 RtlAllocateHeap __dosmaperr 24034->24036 24035->24009 24036->24009 24038 522e07 std::_Locinfo::_Locinfo_dtor 24037->24038 24039 522e48 24038->24039 24041 522e8e 24038->24041 24043 522e0f 24038->24043 24058 512193 RtlAllocateHeap ___std_exception_copy __Getctype 24039->24058 24041->24043 24044 522f0c 24041->24044 24043->24016 24045 522f34 24044->24045 24057 522f57 24044->24057 24046 522f38 24045->24046 24048 522f93 24045->24048 24064 512193 RtlAllocateHeap ___std_exception_copy __Getctype 24046->24064 24049 522fb1 24048->24049 24065 51bbed 24048->24065 24059 522a51 24049->24059 24053 523010 24055 523079 WriteFile 24053->24055 24053->24057 24054 522fc9 24054->24057 24068 522622 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_dtor _ValidateLocalCookies std::locale::_Locimp::_Locimp 24054->24068 24055->24057 24057->24043 24058->24043 24069 52e7b4 24059->24069 24061 522a91 24061->24053 24061->24054 24062 522a63 24062->24061 24078 517780 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_dtor ___std_exception_copy 24062->24078 24064->24057 24082 51bacc 24065->24082 24067 51bc06 24067->24049 24068->24057 24070 52e7c1 24069->24070 24072 52e7ce 24069->24072 24079 51acaf RtlAllocateHeap __dosmaperr 24070->24079 24074 52e7da 24072->24074 24080 51acaf RtlAllocateHeap __dosmaperr 24072->24080 24073 52e7c6 24073->24062 24074->24062 24076 52e7fb 24081 512210 RtlAllocateHeap ___std_exception_copy 24076->24081 24078->24061 24079->24073 24080->24076 24081->24073 24087 52814e 24082->24087 24084 51bade 24085 51bafa SetFilePointerEx 24084->24085 24086 51bae6 24084->24086 24085->24086 24086->24067 24088 528170 24087->24088 24089 52815b 24087->24089 24093 528195 24088->24093 24102 51ac9c RtlAllocateHeap __dosmaperr 24088->24102 24100 51ac9c RtlAllocateHeap __dosmaperr 24089->24100 24092 528160 24101 51acaf RtlAllocateHeap __dosmaperr 24092->24101 24093->24084 24094 5281a0 24103 51acaf RtlAllocateHeap __dosmaperr 24094->24103 24096 528168 24096->24084 24098 5281a8 24104 512210 RtlAllocateHeap ___std_exception_copy 24098->24104 24100->24092 24101->24096 24102->24094 24103->24098 24104->24096 24105->24019 24106->24025 24107->24027 24109 52242a std::_Locinfo::_Locinfo_dtor 24108->24109 24111 522469 24109->24111 24113 522582 24109->24113 24111->24034 24112->24034 24114 52814e RtlAllocateHeap 24113->24114 24115 522592 24114->24115 24116 522598 24115->24116 24117 5225ca 24115->24117 24119 52814e RtlAllocateHeap 24115->24119 24125 5280bd RtlAllocateHeap __dosmaperr 24116->24125 24117->24116 24120 52814e RtlAllocateHeap 24117->24120 24121 5225c1 24119->24121 24122 5225d6 FindCloseChangeNotification 24120->24122 24123 52814e RtlAllocateHeap 24121->24123 24122->24116 24123->24117 24124 5225f0 24124->24111 24125->24124 24317 51abd8 SetFilePointerEx WriteFile RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 24249 50d0aa8 GetCurrentHwProfileW 24286 50d0a35 GetCurrentHwProfileW GetCurrentHwProfileW 24311 438b00 RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 24312 44a100 7 API calls 3 library calls 24128 50d07da GetCurrentHwProfileW GetCurrentHwProfileW GetCurrentHwProfileW GetCurrentHwProfileW GetCurrentHwProfileW 24297 4aca10 RtlAllocateHeap 24131 44ec20 24132 44f0bf 24131->24132 24138 44ec5e 24131->24138 24133 44eca7 setsockopt recv 24133->24138 24135 44f0aa Sleep 24135->24132 24135->24138 24136 44ecff 24173 498610 24136->24173 24138->24132 24138->24133 24138->24135 24138->24136 24140 44f09c Sleep 24138->24140 24149 44db60 WSAStartup 24138->24149 24155 444a90 24138->24155 24158 44e060 24138->24158 24140->24135 24141 44ed38 recv 24142 44ed59 recv 24141->24142 24146 44ed7a 24141->24146 24142->24146 24145 498610 2 API calls 24145->24146 24146->24140 24146->24145 24148 44edf1 recv 24146->24148 24178 495d50 24146->24178 24195 44e460 6 API calls 24146->24195 24148->24146 24150 44db98 24149->24150 24151 44dc56 24149->24151 24150->24151 24152 44dc24 socket 24150->24152 24151->24138 24152->24151 24153 44dc3a connect 24152->24153 24153->24151 24154 44dc4c closesocket 24153->24154 24154->24151 24154->24152 24196 50c6dc 24155->24196 24157 444a9b __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 24157->24138 24159 495d50 2 API calls 24158->24159 24160 44e0aa 24159->24160 24203 495bd0 24160->24203 24162 44e204 24163 44e44b 24162->24163 24164 44e22e 24162->24164 24208 512220 RtlAllocateHeap ___std_exception_copy __Getctype 24163->24208 24166 498610 2 API calls 24164->24166 24171 44e26e std::locale::_Locimp::_Locimp 24164->24171 24166->24171 24169 44e423 24169->24138 24170 44e3b7 24170->24169 24209 512220 RtlAllocateHeap ___std_exception_copy __Getctype 24170->24209 24171->24170 24172 44e393 WSASend 24171->24172 24172->24170 24172->24171 24174 498657 24173->24174 24176 498628 std::locale::_Setgloballocale 24173->24176 24211 49ba20 24174->24211 24176->24141 24177 49866a 24177->24141 24179 495d7a 24178->24179 24180 495d8b 24179->24180 24181 495e32 24179->24181 24183 495d97 std::locale::_Locimp::_Locimp 24180->24183 24184 495dbc 24180->24184 24187 495dfe 24180->24187 24188 495df5 24180->24188 24245 432040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 24181->24245 24183->24146 24189 50cd02 std::_Facet_Register 2 API calls 24184->24189 24185 495e37 24246 431fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 24185->24246 24192 50cd02 std::_Facet_Register 2 API calls 24187->24192 24193 495dd6 std::locale::_Locimp::_Locimp 24187->24193 24188->24184 24188->24185 24190 495dcf 24189->24190 24190->24193 24247 512220 RtlAllocateHeap ___std_exception_copy __Getctype 24190->24247 24192->24193 24193->24146 24195->24146 24199 50ccdc 24196->24199 24200 50c6ea 24199->24200 24201 50cced GetSystemTimePreciseAsFileTime 24199->24201 24200->24157 24201->24200 24204 495c01 24203->24204 24205 495bde 24203->24205 24204->24162 24205->24204 24210 512220 RtlAllocateHeap ___std_exception_copy __Getctype 24205->24210 24212 49bb6c 24211->24212 24213 49ba45 24211->24213 24234 432040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 24212->24234 24217 49bab3 24213->24217 24218 49baa6 24213->24218 24220 49ba5a 24213->24220 24215 49bb71 24235 431fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 24215->24235 24222 50cd02 std::_Facet_Register 2 API calls 24217->24222 24224 49ba6a std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 24217->24224 24218->24215 24218->24220 24226 50cd02 24220->24226 24222->24224 24225 49bb2a std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 24224->24225 24236 512220 RtlAllocateHeap ___std_exception_copy __Getctype 24224->24236 24225->24177 24229 50cd07 std::_Facet_Register 24226->24229 24228 50cd21 24228->24224 24229->24228 24231 431fa0 Concurrency::cancel_current_task 24229->24231 24238 51b99c 24229->24238 24230 50cd2d 24230->24230 24231->24230 24237 50e0c1 RtlAllocateHeap RtlAllocateHeap ___std_exception_destroy ___std_exception_copy 24231->24237 24233 431fe3 24233->24224 24234->24215 24235->24224 24237->24233 24243 52489d __Getctype std::_Facet_Register 24238->24243 24239 5248db 24244 51acaf RtlAllocateHeap __dosmaperr 24239->24244 24241 5248c6 RtlAllocateHeap 24242 5248d9 24241->24242 24241->24243 24242->24229 24243->24239 24243->24241 24244->24242 24245->24185 24246->24190 24248 50d0868 GetCurrentHwProfileW GetCurrentHwProfileW GetCurrentHwProfileW GetCurrentHwProfileW 24251 50d0965 GetCurrentHwProfileW GetCurrentHwProfileW GetCurrentHwProfileW 24302 444ab0 GetPEB RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 24257 516ba6 24258 516bb9 ___std_exception_copy 24257->24258 24263 5168fd 24258->24263 24260 516bce 24270 511f4c RtlAllocateHeap ___std_exception_copy 24260->24270 24262 516bdb 24265 516909 std::_Locinfo::_Locinfo_dtor 24263->24265 24264 51690f 24280 512193 RtlAllocateHeap ___std_exception_copy __Getctype 24264->24280 24265->24264 24267 516952 24265->24267 24271 516a80 24267->24271 24269 51692a 24269->24260 24270->24262 24272 516a93 24271->24272 24273 516aa6 24271->24273 24272->24269 24281 5169a7 24273->24281 24275 516b57 24275->24269 24276 516ac9 24276->24275 24277 513041 4 API calls 24276->24277 24278 516af7 24277->24278 24279 51bbed 2 API calls 24278->24279 24279->24275 24280->24269 24282 516a10 24281->24282 24283 5169b8 24281->24283 24282->24276 24283->24282 24285 51bbad SetFilePointerEx RtlAllocateHeap ___std_exception_copy 24283->24285 24285->24282 24289 50d0af7 24290 50d0ab8 24289->24290 24293 50d0aea 24289->24293 24291 50d0a52 24290->24291 24292 50d0ac2 GetCurrentHwProfileW 24290->24292 24292->24293

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 0 44ec20-44ec58 1 44ec5e 0->1 2 44f0bf-44f0d3 0->2 3 44ec64-44ec6c 1->3 4 44eca7-44ecf0 setsockopt recv 3->4 5 44ec6e-44ec94 call 44db60 3->5 4->2 10 44ecf6-44ecf9 4->10 7 44ec99-44eca1 5->7 7->4 9 44f0aa-44f0b9 Sleep 7->9 9->2 9->3 11 44f037-44f053 call 444a90 10->11 12 44ecff-44ed53 call 498610 recv 10->12 17 44f055 11->17 18 44f09c-44f0a4 Sleep 11->18 22 44efe4-44eff1 12->22 23 44ed59-44ed74 recv 12->23 20 44f057-44f05d 17->20 21 44f05f-44f086 call 44e060 17->21 18->9 20->18 20->21 31 44f08b-44f097 21->31 22->18 24 44eff7-44f003 22->24 23->22 25 44ed7a-44edb1 23->25 27 44f005-44f013 24->27 28 44f019-44f023 call 50cf83 24->28 29 44ee14-44ee44 call 495d50 25->29 30 44edb3-44ee11 call 498610 recv 25->30 27->28 28->18 38 44ef64-44efb3 call 44e460 29->38 39 44ee4a 29->39 30->29 31->18 38->22 46 44efb5-44efc4 38->46 40 44ee50-44ef5e 39->40 40->38 47 44efc6-44efd4 46->47 48 44efda-44efe1 call 50cf83 46->48 47->48 48->22
                APIs
                • setsockopt.WS2_32(00000348,0000FFFF,00001006,?,00000008), ref: 0044ECC7
                • recv.WS2_32(?,00000004,00000002), ref: 0044ECE1
                • recv.WS2_32(00000000,0000000C,00000002,0000000C), ref: 0044ED4E
                • recv.WS2_32(00000000,0000000C,00000008), ref: 0044ED6F
                • recv.WS2_32(00000000,?,00000008), ref: 0044EE0C
                  • Part of subcall function 0044DB60: WSAStartup.WS2_32 ref: 0044DB8B
                  • Part of subcall function 0044DB60: socket.WS2_32(?,?,?,?,?,?,50500,?,?), ref: 0044DC2E
                  • Part of subcall function 0044DB60: connect.WS2_32(00000000,?,?,?,?,?,50500,?,?), ref: 0044DC41
                  • Part of subcall function 0044DB60: closesocket.WS2_32(00000000), ref: 0044DC4D
                • recv.WS2_32(?,00000004,00000008), ref: 0044F033
                • Sleep.KERNELBASE(00000001), ref: 0044F09E
                • Sleep.KERNELBASE(00000064), ref: 0044F0AC
                • __Mtx_unlock.LIBCPMT ref: 0044F211
                Strings
                Memory Dump Source
                • Source File: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 00000008.00000002.4482945368.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483059852.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483306323.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484916889.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4485187926.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: recv$Sleep$Mtx_unlockStartupclosesocketconnectsetsockoptsocket
                • String ID: 50500$t;V
                • API String ID: 2930922264-2591036556
                • Opcode ID: d393921af02ab6cee96da01b195a456d164395c7410e4db754ecc35979b7a9e6
                • Instruction ID: 297b87c2e486343adb1abb9dd4429bbbd080a6d4c5acb10f03cea99bcf16b96c
                • Opcode Fuzzy Hash: d393921af02ab6cee96da01b195a456d164395c7410e4db754ecc35979b7a9e6
                • Instruction Fuzzy Hash: A6B1D231D00249DFEB10DFA8CC45BADBBB5FF55300F24826AE445A72D2DBB46989CB41

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 51 44e060-44e0af call 495d50 54 44e1d4-44e20a call 495bd0 51->54 55 44e0b5-44e0b8 51->55 64 44e20c-44e218 54->64 65 44e238-44e26c call 437d20 54->65 57 44e0c0-44e0e6 55->57 59 44e0f8-44e107 57->59 60 44e0e8-44e0f3 57->60 62 44e117-44e123 59->62 63 44e109-44e112 59->63 61 44e1c7 60->61 66 44e1ca-44e1ce 61->66 67 44e125-44e12e 62->67 68 44e133-44e13f 62->68 63->61 69 44e22e-44e235 call 50cf83 64->69 70 44e21a-44e228 64->70 81 44e282-44e28a call 498610 65->81 82 44e26e-44e280 65->82 66->54 66->57 67->61 72 44e141-44e14a 68->72 73 44e14c-44e158 68->73 69->65 70->69 74 44e44b call 512220 70->74 72->61 77 44e165-44e171 73->77 78 44e15a-44e163 73->78 83 44e450-44e455 call 512220 74->83 84 44e173-44e17c 77->84 85 44e17e-44e18a 77->85 78->61 86 44e28f-44e2e2 call 437d20 * 2 81->86 82->86 84->61 90 44e197-44e1a3 85->90 91 44e18c-44e195 85->91 99 44e2e4-44e313 call 437d20 call 50e9e0 86->99 100 44e316-44e32c call 437d20 86->100 94 44e1a5-44e1ae 90->94 95 44e1b0-44e1b9 90->95 91->61 94->61 95->66 97 44e1bb-44e1c3 95->97 97->61 99->100 106 44e3b7 100->106 107 44e332-44e338 100->107 108 44e3bb-44e3c1 106->108 110 44e340-44e36c 107->110 111 44e3c3-44e3cf 108->111 112 44e3eb-44e403 108->112 113 44e370-44e37b 110->113 115 44e3e1-44e3e8 call 50cf83 111->115 116 44e3d1-44e3df 111->116 117 44e435-44e44a 112->117 118 44e405-44e411 112->118 113->113 114 44e37d-44e3ab WSASend 113->114 128 44e425-44e429 114->128 129 44e3ad-44e3b5 114->129 115->112 116->83 116->115 120 44e413-44e421 118->120 121 44e42b-44e432 call 50cf83 118->121 120->83 122 44e423 120->122 121->117 122->121 128->108 129->106 129->110
                APIs
                • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,005347E8,00000000,00000000,-005665B0), ref: 0044E3A6
                Strings
                Memory Dump Source
                • Source File: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 00000008.00000002.4482945368.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483059852.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483306323.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484916889.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4485187926.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: Send
                • String ID: 131$50500$Ws2_32.dll$\;V$t;V$taV$;V
                • API String ID: 121738739-25841771
                • Opcode ID: 3c65a8e673d1c4f0b9fc3a3ef7749b269ef8c55b978382efba52775058244613
                • Instruction ID: 32657578ee02ea9d3f2551ca0590bde6334cf648b0b3c771aa5defef7c166fc1
                • Opcode Fuzzy Hash: 3c65a8e673d1c4f0b9fc3a3ef7749b269ef8c55b978382efba52775058244613
                • Instruction Fuzzy Hash: 31D10230D04248DFEB14CFA9CC54BADBBF1BF46300F684259D851AB2D2D7749886CB95

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 130 44db60-44db92 WSAStartup 131 44dc66-44dc6f 130->131 132 44db98-44dbc2 call 437d20 * 2 130->132 137 44dbc4-44dbc8 132->137 138 44dbce-44dc14 132->138 137->131 137->138 140 44dc16-44dc1c 138->140 141 44dc60 138->141 142 44dc74-44dc7e 140->142 143 44dc1e 140->143 141->131 142->141 147 44dc80-44dc88 142->147 144 44dc24-44dc38 socket 143->144 144->141 146 44dc3a-44dc4a connect 144->146 148 44dc70 146->148 149 44dc4c-44dc54 closesocket 146->149 148->142 149->144 150 44dc56-44dc5f 149->150 150->141
                APIs
                • WSAStartup.WS2_32 ref: 0044DB8B
                • socket.WS2_32(?,?,?,?,?,?,50500,?,?), ref: 0044DC2E
                • connect.WS2_32(00000000,?,?,?,?,?,50500,?,?), ref: 0044DC41
                • closesocket.WS2_32(00000000), ref: 0044DC4D
                Strings
                Memory Dump Source
                • Source File: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 00000008.00000002.4482945368.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483059852.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483306323.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484916889.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4485187926.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: Startupclosesocketconnectsocket
                • String ID: 50500
                • API String ID: 3098855095-2230786414
                • Opcode ID: 950b60f069457f15a8b5708e4618f7f3df929606f3238b13426cecd98f9bcb87
                • Instruction ID: 5cdb830fbec59ba73a89d39f1dcff458493d06c7a412a48cf8ff9b9b15b4fa51
                • Opcode Fuzzy Hash: 950b60f069457f15a8b5708e4618f7f3df929606f3238b13426cecd98f9bcb87
                • Instruction Fuzzy Hash: 3B31C4719043055BD7219B289C85A2FB7E4FF89734F111F1EF9A4A32E0E3759904C696

                Control-flow Graph

                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b065c47a9e44c7fdf4c79b694eae47e95a3ddc35bbfb3144e1c0c08a28ee666c
                • Instruction ID: ff611a9e4d524257a5a8d7a838039a4be701c7915bd9bee0adaf31405743ac5e
                • Opcode Fuzzy Hash: b065c47a9e44c7fdf4c79b694eae47e95a3ddc35bbfb3144e1c0c08a28ee666c
                • Instruction Fuzzy Hash: 4361A0EB24D3117DB242C1953B78AFEEB6EE6D6730B30846AF40BD6542F2984E4A5131

                Control-flow Graph

                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 009e0e18a8e72eb2c9220638d16b20e0ef0fb728090bb7dae74a460fd5c6396c
                • Instruction ID: 276ccd8b73402d6fea9a3410f0dadea3cb96b6d4271a11bf76094daee472a6b1
                • Opcode Fuzzy Hash: 009e0e18a8e72eb2c9220638d16b20e0ef0fb728090bb7dae74a460fd5c6396c
                • Instruction Fuzzy Hash: 7A51C1EB24D3117DB142C1957B78AFEEB6EE6D7730B30846AF44BD6502F2984E4A5031

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 266 50d0811-50d0817 267 50d0819-50d0821 266->267 268 50d0890 266->268 269 50d0828-50d0842 call 50d0834 267->269 270 50d0823-50d0827 267->270 271 50d0894-50d0a9d call 50d095c call 50d0a78 call 50d0a9f 268->271 277 50d07dc-50d080b 269->277 278 50d0844-50d0886 269->278 270->269 306 50d0a9f-50d0aa3 271->306 307 50d0aa4-50d0aac 271->307 277->270 278->271 308 50d0aae-50d0ac1 306->308 307->308 310 50d0ac2-50d0ad4 GetCurrentHwProfileW 308->310 311 50d0aea-50d0be9 call 50d0bfa 310->311 323 50d0beb-50d0c02 311->323 324 50d0b83-50d0b89 311->324
                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 948d4b01545bdb271fb23e88fccc468db19d33f21ce969e2ae565fa741149d49
                • Instruction ID: 815cccb72bad1288b6cd981fb54d782c8fbe1afdf0fdd0f816cc477c89192c15
                • Opcode Fuzzy Hash: 948d4b01545bdb271fb23e88fccc468db19d33f21ce969e2ae565fa741149d49
                • Instruction Fuzzy Hash: 1451E2EB20D3117DB242C1953B7CAFEEB6EE6D6730B30846AF40BC6542F2994E4A5171

                Control-flow Graph

                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 9fc15c96d8dea845e962c343bf0622c44fc7baa32e4e74a7ea2926a5f164e5fd
                • Instruction ID: d0dd427f2fa4a714da88f1e37d5c9ae27f7292aae44a5fb4fbe4d2ace73ea7e8
                • Opcode Fuzzy Hash: 9fc15c96d8dea845e962c343bf0622c44fc7baa32e4e74a7ea2926a5f164e5fd
                • Instruction Fuzzy Hash: 38519EEB24D311BDB142C1857B78AFEEB6EE6D6730B30846AF40BD6542F2984E895071

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 376 50d088e-50d088f 377 50d084f-50d0886 376->377 378 50d0891-50d0893 376->378 379 50d0894-50d0a9d call 50d095c call 50d0a78 call 50d0a9f 377->379 378->379 408 50d0a9f-50d0aa3 379->408 409 50d0aa4-50d0aac 379->409 410 50d0aae-50d0ac1 408->410 409->410 412 50d0ac2-50d0ad4 GetCurrentHwProfileW 410->412 413 50d0aea-50d0be9 call 50d0bfa 412->413 425 50d0beb-50d0c02 413->425 426 50d0b83-50d0b89 413->426
                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7a9e17cad45048818508cea1536feaebd8df47d25cfa9afc79f7947eade54b26
                • Instruction ID: 3731241b36feca466428f8d336c7d87338df533196ead8e0d5691d141874f884
                • Opcode Fuzzy Hash: 7a9e17cad45048818508cea1536feaebd8df47d25cfa9afc79f7947eade54b26
                • Instruction Fuzzy Hash: D051B2EB24D3117DB102C1857B78AFFEB6EE6D6730B30846AF40BD5502F2984E8A5071

                Control-flow Graph

                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 5dd51a3f2eb3f872ff0ecf41e0bdf06e49c3ab5bb501e7c5d5e17366599ded98
                • Instruction ID: fb2bea144eb4df2d33e7fd4605e3565b89fc3705da9e9d6c8c0d609dce60be1f
                • Opcode Fuzzy Hash: 5dd51a3f2eb3f872ff0ecf41e0bdf06e49c3ab5bb501e7c5d5e17366599ded98
                • Instruction Fuzzy Hash: 1F51B0EB24D311BDB102C1857B78AFEEB6EE6D6730B30846AF40BD6542F2984E895171

                Control-flow Graph

                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 3dc3c3a10d0ae66e2bb287de775d8d7f9816f1998045eb6ccd81486c522a3029
                • Instruction ID: a5784368dfcf9806ae30204f3bbb9c69638af03ec38d6399655d618e34264ea9
                • Opcode Fuzzy Hash: 3dc3c3a10d0ae66e2bb287de775d8d7f9816f1998045eb6ccd81486c522a3029
                • Instruction Fuzzy Hash: 0141C0EB24D311BDB202C1953B78AFEEA6FE6D6730F30846AF40BD6502F6984A495071

                Control-flow Graph

                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 13009bacccc5111a20f9a66d44193b180019fafe093e5d70fb8c9db67e999517
                • Instruction ID: 719d9d3c67425d371b950182236468bea6e5dfa500a562f45eaab5b99469a465
                • Opcode Fuzzy Hash: 13009bacccc5111a20f9a66d44193b180019fafe093e5d70fb8c9db67e999517
                • Instruction Fuzzy Hash: A541F6EB24D3117EF202C1953B78AFEEA6FE6D7730B30806AF40BD6542F6994A495131

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 565 50d0974-50d0986 566 50d0925-50d0947 565->566 567 50d0987-50d0a9d call 50d0a78 call 50d0a9f 565->567 568 50d094d-50d096e 566->568 569 50d0948 call 50d095c 566->569 586 50d0a9f-50d0aa3 567->586 587 50d0aa4-50d0aac 567->587 568->567 569->568 588 50d0aae-50d0ac1 586->588 587->588 590 50d0ac2-50d0ad4 GetCurrentHwProfileW 588->590 591 50d0aea-50d0be9 call 50d0bfa 590->591 603 50d0beb-50d0c02 591->603 604 50d0b83-50d0b89 591->604
                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 72627452fced1c1a42ee6b6bc7299be4099342904b8455f34ba5375a61f5ce1e
                • Instruction ID: 5071f700c4fe54427d7f7ebf9c5788d1b4743c84426fc9eb58120d0f35bed1fd
                • Opcode Fuzzy Hash: 72627452fced1c1a42ee6b6bc7299be4099342904b8455f34ba5375a61f5ce1e
                • Instruction Fuzzy Hash: 1241F3EB24C3017DF202C1957A78AFEEB6EE6D6730F308466F40BD6542F2984A4A1031

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 605 50d0921-50d0947 606 50d094d-50d0a9d call 50d0a78 call 50d0a9f 605->606 607 50d0948 call 50d095c 605->607 625 50d0a9f-50d0aa3 606->625 626 50d0aa4-50d0aac 606->626 607->606 627 50d0aae-50d0ac1 625->627 626->627 629 50d0ac2-50d0ad4 GetCurrentHwProfileW 627->629 630 50d0aea-50d0be9 call 50d0bfa 629->630 642 50d0beb-50d0c02 630->642 643 50d0b83-50d0b89 630->643
                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: c9047fb74f886fd40628a52803312b1891407caad072503a2880334793c75474
                • Instruction ID: 2add28cb5bf5f4c8e9d8102575fd9a3604f0eb6445763d85e411873b0667d913
                • Opcode Fuzzy Hash: c9047fb74f886fd40628a52803312b1891407caad072503a2880334793c75474
                • Instruction Fuzzy Hash: 9A41F2EB24D3117DB202C1957A78AFEEB6EE6D6730F308466F40BD6542F2984A495131

                Control-flow Graph

                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 25cd0a6755d12b55fc9c08d3a1324e038b0e55b880105ce73ef027ba83a15e90
                • Instruction ID: 1bd3c8d9db70d1a718a6da1ab036d5a6611418ae2fd7fba5a46fa117b0455d4d
                • Opcode Fuzzy Hash: 25cd0a6755d12b55fc9c08d3a1324e038b0e55b880105ce73ef027ba83a15e90
                • Instruction Fuzzy Hash: 6D41E1EB24D3117DB202C1853B7CAFEEA6EE6D7730F30846AB40BD6502F6D84A895031
                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 3674360d25b8ebc982adcb3881aa0a5ef1ecca36f2b9a908573e6b109874e6be
                • Instruction ID: 14e9a40f959ed72017a837eed388c0255a46c5810d01d2d619eb1f96413a0bba
                • Opcode Fuzzy Hash: 3674360d25b8ebc982adcb3881aa0a5ef1ecca36f2b9a908573e6b109874e6be
                • Instruction Fuzzy Hash: C841EFEB24D3117DB202C1957B7CAFEEA6EE6D7730F30846AB40BD6502F6D84A895031

                Control-flow Graph

                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 50f0425ef2573198d8ce34e5dc33e0333faf9e27656ea186f7105b21907905b1
                • Instruction ID: 4f59411be0b744ae663e17cf34a52b8ce72abd00158dde25cfefbf7bb05337c9
                • Opcode Fuzzy Hash: 50f0425ef2573198d8ce34e5dc33e0333faf9e27656ea186f7105b21907905b1
                • Instruction Fuzzy Hash: 9341DFEB24D3117DB102C1853B7CAFEEA6EE6D7730F30846AB40BD6502F6D84A895031
                APIs
                • WriteFile.KERNELBASE(?,00000000,00516AF7,?,00000000,00000000,00000000,?,00000000,?,0050C023,00516AF7,00000000,0050C023,?,?), ref: 00523091
                Memory Dump Source
                • Source File: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 00000008.00000002.4482945368.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483059852.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483306323.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484916889.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4485187926.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: FileWrite
                • String ID:
                • API String ID: 3934441357-0
                • Opcode ID: 1e9188cc5c60968d23d47b5d09cb5a85b74e22c68fa8f1cae901f94ae7a6d7eb
                • Instruction ID: 95a2e221f5ef6ecbaf0cf5769133f1c508d5378db8a1ee5e03a003a0da87318e
                • Opcode Fuzzy Hash: 1e9188cc5c60968d23d47b5d09cb5a85b74e22c68fa8f1cae901f94ae7a6d7eb
                • Instruction Fuzzy Hash: 6A61F475D0412ABFDF11CFA8E889AEEBFB9BF0A304F140145E900A7281D375CA11DBA0
                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 50225482400fc6d857f6239e52c31018fa34f0fdb851541bb2c2a4af325dbf4c
                • Instruction ID: 0e49f063ad2c14df369aebb8c7459cb1bd48790bc22300773fff08231246c2a3
                • Opcode Fuzzy Hash: 50225482400fc6d857f6239e52c31018fa34f0fdb851541bb2c2a4af325dbf4c
                • Instruction Fuzzy Hash: 1B318BEB24D3157DB142D1853B78AFEEA6FE6D6730F308466B40BD6542F6D84A8A1031
                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 82d65a095fa7413bbb2efe03d6ab9428e61eb2a31036d7a288b535f9bbfc2d1e
                • Instruction ID: baecbf61a15803ceaa49ec95d137e7822ae65af11e72a6b2297edac0a03a24a2
                • Opcode Fuzzy Hash: 82d65a095fa7413bbb2efe03d6ab9428e61eb2a31036d7a288b535f9bbfc2d1e
                • Instruction Fuzzy Hash: 35318AEB24D3116DB242D1853B78AFEEA6EE6D7730F308466B40BD6542F6994A8A1031
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 050D0AC5
                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 448b1648097bafcbffa2212c766e2c5842729291d120f7972c13190fbedea682
                • Instruction ID: 607b7cc7c19612e2d69f8538dc0ad41f043aaabbde92a86d8dd05b0231062816
                • Opcode Fuzzy Hash: 448b1648097bafcbffa2212c766e2c5842729291d120f7972c13190fbedea682
                • Instruction Fuzzy Hash: 5331A9AB24D3116DB102C1953B78AFEEA6EE6D6730F30846AF40BD6542F6994A8A5031
                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 7b8bd9c6233181938c23f79d15e5a70d4da4845e53e078f885d75a5129e5661c
                • Instruction ID: 4ec65e6ed71b8c89cc821110602845016f592a7fb16b34d2212e8eae61d4ed6a
                • Opcode Fuzzy Hash: 7b8bd9c6233181938c23f79d15e5a70d4da4845e53e078f885d75a5129e5661c
                • Instruction Fuzzy Hash: 7A3103EB24D3117DA101D0953B7CAFEAB6FE6E2730F308466F40BD6442F6D84A890030
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 050D0AC5
                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 77b56d3ba5b72a1259d71c865195e842badcd6ac21676f1c671c64ce9ccd2150
                • Instruction ID: 5308c67dba2e20de9a68b4175c82bba89a1d9a35cb223043e607036edaf3998e
                • Opcode Fuzzy Hash: 77b56d3ba5b72a1259d71c865195e842badcd6ac21676f1c671c64ce9ccd2150
                • Instruction Fuzzy Hash: 773128EB20D3116DE202D1A53A7C9FEBB6EE9D3730B3484B6F40BC6542F6844A4A5131
                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: d26ccff6a55f2bbe8b1e41526ed821b8cc46810b43632bca2467667585f5eff9
                • Instruction ID: 8784307d69440fafe836f6f99a5ca32287bd5aeb193142547d1a28931252a9c0
                • Opcode Fuzzy Hash: d26ccff6a55f2bbe8b1e41526ed821b8cc46810b43632bca2467667585f5eff9
                • Instruction Fuzzy Hash: 9121B1EB24D3117DB142D1953B7CAFEAA6FE5E3730B308466F40BD6542F6C94A4A1071
                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: f0558ece69286dec871bb14cefcd7506339f76bec89081eed112190cefce8b52
                • Instruction ID: 6a325236729764d8ada90aafb2e64e3f2cdb935d91459389884bff91b56f4647
                • Opcode Fuzzy Hash: f0558ece69286dec871bb14cefcd7506339f76bec89081eed112190cefce8b52
                • Instruction Fuzzy Hash: 8A21B4EB24C3117DB142D1953B78AFEAB6FE6D3B30B308466F40BD6542F6D54A491071
                APIs
                • Concurrency::cancel_current_task.LIBCPMT ref: 0049BB71
                Memory Dump Source
                • Source File: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 00000008.00000002.4482945368.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483059852.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483306323.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484916889.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4485187926.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: Concurrency::cancel_current_task
                • String ID:
                • API String ID: 118556049-0
                • Opcode ID: b19d2212db506fa46971754378483badd225f06599945ea51feb898bce11e8e1
                • Instruction ID: 38e6669dc504038121b06ab4bb6f7e6ac73a319efce4e92aa354c026f24c6135
                • Opcode Fuzzy Hash: b19d2212db506fa46971754378483badd225f06599945ea51feb898bce11e8e1
                • Instruction Fuzzy Hash: 9341EF729001099BCF15DF68EA816AEBFA5EF85350F24067AF804EB345D734EE118BE5
                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 766fce06e08b454b0b462ee2350c006fca1fd2875248255f4042990b7c50c085
                • Instruction ID: 77a28ecb99bf2ac93b0464678b28f6a85e723fa23b5228dc66eb092871017e09
                • Opcode Fuzzy Hash: 766fce06e08b454b0b462ee2350c006fca1fd2875248255f4042990b7c50c085
                • Instruction Fuzzy Hash: 5D2105EF24D3113DA102D1943A7C9FEAB6FEAD3B30B308466F407C6542F6D44A8A4171
                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 68e406ea25fb65979513da9e68a47cdd9c251ebe559016c8ba6f12a7ce902dd9
                • Instruction ID: 01b603efa064418d46f4ad0b489f2c820817de149139f42358d3e4f5851b15ce
                • Opcode Fuzzy Hash: 68e406ea25fb65979513da9e68a47cdd9c251ebe559016c8ba6f12a7ce902dd9
                • Instruction Fuzzy Hash: 8121DEEB24C3113DA112C1953B78AFEAB6FE9D3730B30846AF40BC6542F6C84A8A1131
                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 12c110a9b1be7161cb2b62784ccb11ee0f00711cac6b4fe4a2e644b2e51d35c2
                • Instruction ID: 011101d9e2a2c5807f3ff9cd3a6ee8c3c1ac9f45b31704356c053b28582ac0bc
                • Opcode Fuzzy Hash: 12c110a9b1be7161cb2b62784ccb11ee0f00711cac6b4fe4a2e644b2e51d35c2
                • Instruction Fuzzy Hash: BC21CFEB24D3117DA112D1953B7CAFEAA6FEAD3730B308466F40BC6542F6D84E8A1071
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 050D0AC5
                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 8a7912dac3ad7bef5e238aa74616fd21fac611fd17b34c92b5a0e7368ecca2cd
                • Instruction ID: 5352671bbf5a12fec1b8a42f35a046705cc73be7d6f6f78d85caa6799dd8b41e
                • Opcode Fuzzy Hash: 8a7912dac3ad7bef5e238aa74616fd21fac611fd17b34c92b5a0e7368ecca2cd
                • Instruction Fuzzy Hash: 4321F3EB64C3123DA512D1943B789FEAB6FEAD3B70B3084A6F407C6502F6C48A460170
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 050D0AC5
                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: fbaaa6fc1c4a1601f5773833524989a6bf4bd3edb1fa348520f804c28437a7b2
                • Instruction ID: 264db568f55d92a889bd8b023c1e3537e898ebb180b2de23065b4ef0ca6660f8
                • Opcode Fuzzy Hash: fbaaa6fc1c4a1601f5773833524989a6bf4bd3edb1fa348520f804c28437a7b2
                • Instruction Fuzzy Hash: 7C11F0EF24C3117DB512D1957A38AFEAA6FEAC3B30B308476F407C2502F6D48A461130
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 050D0AC5
                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 6a4beab17206f935bd8a602bced2b25722a3fcd94fdfd5a2e4a7e53b08e9c369
                • Instruction ID: 8a769ee2046cfe8a81920f80d488a62f24db446a54474c5931388323b41646a4
                • Opcode Fuzzy Hash: 6a4beab17206f935bd8a602bced2b25722a3fcd94fdfd5a2e4a7e53b08e9c369
                • Instruction Fuzzy Hash: 0A21CFFF24C3116DA112D5957B68AFEAA6FEAD2730B30846AF447C6A42F6D48A491031
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 050D0AC5
                Memory Dump Source
                • Source File: 00000008.00000002.4490363577.00000000050D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50d0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 5503a612ac03a826bc3db4a15c26ccac0f037448f58bebd4b6cfe1952bcd7b2a
                • Instruction ID: a12c463b8f817acd513ca1bb1d06a87d69d12cf59e04dfdebb5c6b6cbecc16b4
                • Opcode Fuzzy Hash: 5503a612ac03a826bc3db4a15c26ccac0f037448f58bebd4b6cfe1952bcd7b2a
                • Instruction Fuzzy Hash: 7611B1EF24C3117CB112D1953B78AFEAA6FE6D3B30B308466F407C6502F6D44A4A1171
                APIs
                • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,00522469,00000000,CF830579,00561148,0000000C,00522525,0051662D,?), ref: 005225D8
                Memory Dump Source
                • Source File: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 00000008.00000002.4482945368.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483059852.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483306323.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484916889.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4485187926.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: ChangeCloseFindNotification
                • String ID:
                • API String ID: 2591292051-0
                • Opcode ID: 7065f637503a8d4ca45942863ecb588bc683bef4fbde48e403e01f42ffbc4b93
                • Instruction ID: fda775816cf9dd6fa493c8f0480b35bdffc27146abc29f4099cbddf23ab613b7
                • Opcode Fuzzy Hash: 7065f637503a8d4ca45942863ecb588bc683bef4fbde48e403e01f42ffbc4b93
                • Instruction Fuzzy Hash: 5F11043770623426D62522B47C9ABBE6F897FD3734F254209F9089F2C2EE659C819291
                APIs
                • SetFilePointerEx.KERNELBASE(00000000,00000000,00560E00,0050C023,00000002,0050C023,00000000,?,?,?,0051BBD6,00000000,?,0050C023,00000002,00560E00), ref: 0051BB08
                Memory Dump Source
                • Source File: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 00000008.00000002.4482945368.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483059852.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483306323.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484916889.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4485187926.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: FilePointer
                • String ID:
                • API String ID: 973152223-0
                • Opcode ID: 8614b097bf1192742ed399538048555045c87b92c1f59b7513f75a615109ab37
                • Instruction ID: 0a1c98d1bef34d502cee1fa2f0e95b958cb2c31a2818f8694da7a6d0ba4ae88f
                • Opcode Fuzzy Hash: 8614b097bf1192742ed399538048555045c87b92c1f59b7513f75a615109ab37
                • Instruction Fuzzy Hash: B6010032604155AFEF1A9F59DC49CEE3F29FF91320F240208F8119B2D0EAB1ED819B90
                APIs
                • ___std_exception_copy.LIBVCRUNTIME ref: 00431FDE
                Memory Dump Source
                • Source File: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 00000008.00000002.4482945368.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483059852.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483306323.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484916889.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4485187926.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_copy
                • String ID:
                • API String ID: 2659868963-0
                • Opcode ID: 5cd4db2ff6868d8fa905581d9cad760b6f661d469c2f88477529f3b2c12f6310
                • Instruction ID: 65685f2945995c6cb1b21799916f1236761673d58994d2f8d6b174951a5d4f96
                • Opcode Fuzzy Hash: 5cd4db2ff6868d8fa905581d9cad760b6f661d469c2f88477529f3b2c12f6310
                • Instruction Fuzzy Hash: DF012B3640030E67CB14AB98EC0548D7FACFF01360B608636F514A7191FB70E9908791
                APIs
                • RtlAllocateHeap.NTDLL(00000008,0050B16C,?,?,005237E9,00000001,00000364,?,00000006,000000FF,?,0050E0EB,?,?,?,?), ref: 00523EA4
                Memory Dump Source
                • Source File: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 00000008.00000002.4482945368.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483059852.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483306323.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484916889.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4485187926.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: AllocateHeap
                • String ID:
                • API String ID: 1279760036-0
                • Opcode ID: e537fc6146272ccd34c46ab6b15da49e318e175c397306250111ffa69ba5cff7
                • Instruction ID: ebacab196d84f5fd9d44a18a9126b7caf5fd171c3d1475977f6011dda8370292
                • Opcode Fuzzy Hash: e537fc6146272ccd34c46ab6b15da49e318e175c397306250111ffa69ba5cff7
                • Instruction Fuzzy Hash: A2F0E93254553566AF326B71AC06B5B3F4EBF83760B174112FC04960D0DB74EE0C82E0
                APIs
                • RtlAllocateHeap.NTDLL(00000000,?,?,?,0050E0EB,?,?,?,?,?,00432D8D,0050B16C,?,?,0050B16C), ref: 005248CF
                Memory Dump Source
                • Source File: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 00000008.00000002.4482945368.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483059852.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483306323.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484916889.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4485187926.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: AllocateHeap
                • String ID:
                • API String ID: 1279760036-0
                • Opcode ID: 8106bfc15f6d3ae70d12e9973eabba0018c5ae2347538128d22daed4ce2a7184
                • Instruction ID: dd70dbde15ab33a7b7721d5b817aac0426981fb7db433fc9e9cada34ce6d1c89
                • Opcode Fuzzy Hash: 8106bfc15f6d3ae70d12e9973eabba0018c5ae2347538128d22daed4ce2a7184
                • Instruction Fuzzy Hash: ACE0E5321625B256E6212235AC0579B3E4CBF837A0F160231AC00A60D0DB60CC008AE1
                Memory Dump Source
                • Source File: 00000008.00000002.4490422980.00000000050E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50e0000_RageMP131.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 23832bbf7720281a8987c950354b9d6d8082834284beb2751d192b4f27cb997f
                • Instruction ID: df0466c96143039c9ad060c397f1afc3dd448849ff80ad1cf0fc839edb3a5be4
                • Opcode Fuzzy Hash: 23832bbf7720281a8987c950354b9d6d8082834284beb2751d192b4f27cb997f
                • Instruction Fuzzy Hash: BC2126FB20D1517EA212C1A07A7C9FE3BEAE5D673033488ABF482C6106D1955A4F5231
                Memory Dump Source
                • Source File: 00000008.00000002.4490422980.00000000050E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50e0000_RageMP131.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8755c49814ddf8ff4f37015553dda5a8c6177a06c0029ade7e89f1945ce7ae21
                • Instruction ID: 01b9b5f827b1746b616f62c948e058a0fb0ff15b3bddf09049e24f7b6e6c51c0
                • Opcode Fuzzy Hash: 8755c49814ddf8ff4f37015553dda5a8c6177a06c0029ade7e89f1945ce7ae21
                • Instruction Fuzzy Hash: 56F03CBB24D2216EB252C5A23B289FF63ADE5D1730731C83FF802C1406D2981A4E5131
                Memory Dump Source
                • Source File: 00000008.00000002.4490422980.00000000050E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50e0000_RageMP131.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5c70e4f88e10ae827c97d658f799e9fb867eef8e163542460865ceb9f37bdfa0
                • Instruction ID: 64ebfe622f9c380663dd481075b5ca4ffd05b1071511903c8d8448c9ca45761f
                • Opcode Fuzzy Hash: 5c70e4f88e10ae827c97d658f799e9fb867eef8e163542460865ceb9f37bdfa0
                • Instruction Fuzzy Hash: 51F0D4FB24D122BD7102D0923F38AFF53AEE0D6B31371C82BF846C1406E6995A4E6035
                Memory Dump Source
                • Source File: 00000008.00000002.4490422980.00000000050E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_50e0000_RageMP131.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3d489591888708741edb868b4aaea8733dbb5cb3c33e05d2e10348847eef2597
                • Instruction ID: 38da5205d0186968a9861f801508ba7d28bd4ab8ab1fae2e867bc3da2fa5974c
                • Opcode Fuzzy Hash: 3d489591888708741edb868b4aaea8733dbb5cb3c33e05d2e10348847eef2597
                • Instruction Fuzzy Hash: 30F0DAFB64D1627DB242D5923F38AFE67ADE5D6B31331C82BF842C5406E2844A4E6531
                APIs
                • std::_Lockit::_Lockit.LIBCPMT ref: 0049AEB3
                • std::_Lockit::_Lockit.LIBCPMT ref: 0049AED5
                • std::_Lockit::~_Lockit.LIBCPMT ref: 0049AEF5
                • std::_Lockit::~_Lockit.LIBCPMT ref: 0049AF1F
                • std::_Lockit::_Lockit.LIBCPMT ref: 0049AF8D
                • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0049AFD9
                • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0049AFF3
                • std::_Lockit::~_Lockit.LIBCPMT ref: 0049B088
                • std::_Facet_Register.LIBCPMT ref: 0049B095
                Strings
                Memory Dump Source
                • Source File: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 00000008.00000002.4482945368.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483059852.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483306323.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484916889.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4485187926.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                • String ID: bad locale name
                • API String ID: 3375549084-1405518554
                • Opcode ID: 68216ce3bc69d52a7a802c54116f71c3b90133f8ea19c604a611106445964900
                • Instruction ID: 28ca33799d53fc0c0cfaa529572509b1fd599d11d558bee70b65712794e4df74
                • Opcode Fuzzy Hash: 68216ce3bc69d52a7a802c54116f71c3b90133f8ea19c604a611106445964900
                • Instruction Fuzzy Hash: A0617FB5D002459BEF20DFA8D889B9EBFB4BF54310F144069E815A7381EB74ED09CB96
                APIs
                • std::_Lockit::_Lockit.LIBCPMT ref: 004337E9
                • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00433835
                • __Getctype.LIBCPMT ref: 0043384E
                • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0043386A
                • std::_Lockit::~_Lockit.LIBCPMT ref: 004338FF
                Strings
                Memory Dump Source
                • Source File: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 00000008.00000002.4482945368.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483059852.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483306323.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484916889.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4485187926.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                • String ID: 0:C$bad locale name
                • API String ID: 1840309910-3345558881
                • Opcode ID: 6c8b277a969f683e398eedf38784c3077d70f9096ad59c91777d6b1bab1261a6
                • Instruction ID: bf5337a2d8456d9a7b3cc25296a201f84bee19edd370540545fe3331f5bb3e90
                • Opcode Fuzzy Hash: 6c8b277a969f683e398eedf38784c3077d70f9096ad59c91777d6b1bab1261a6
                • Instruction Fuzzy Hash: 52518FF1D00249DBEF10DFA4D88579EFBB8BF54300F144169E814AB381E775AA48CB92
                APIs
                • _ValidateLocalCookies.LIBCMT ref: 005108B7
                • ___except_validate_context_record.LIBVCRUNTIME ref: 005108BF
                • _ValidateLocalCookies.LIBCMT ref: 00510948
                • __IsNonwritableInCurrentImage.LIBCMT ref: 00510973
                • _ValidateLocalCookies.LIBCMT ref: 005109C8
                Strings
                Memory Dump Source
                • Source File: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 00000008.00000002.4482945368.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483059852.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483306323.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484916889.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4485187926.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                • String ID: CP$csm
                • API String ID: 1170836740-2911555543
                • Opcode ID: 2705f186eab5b10d366c780f1dc8077e49ef89d8806133cf58490e09d346e53e
                • Instruction ID: 5c209c8ff88538713b39aacd4b9f32d119ff755c893dfca957c088ff6b007773
                • Opcode Fuzzy Hash: 2705f186eab5b10d366c780f1dc8077e49ef89d8806133cf58490e09d346e53e
                • Instruction Fuzzy Hash: 4141A134A00209ABEF10DF68C894ADEBFB5BF44324F148155E9189B392DB71AEC5CB91
                APIs
                • std::_Lockit::_Lockit.LIBCPMT ref: 00499543
                • std::_Lockit::_Lockit.LIBCPMT ref: 00499566
                • std::_Lockit::~_Lockit.LIBCPMT ref: 00499586
                • std::_Facet_Register.LIBCPMT ref: 004995FB
                • std::_Lockit::~_Lockit.LIBCPMT ref: 00499613
                • Concurrency::cancel_current_task.LIBCPMT ref: 0049962B
                Memory Dump Source
                • Source File: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 00000008.00000002.4482945368.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483059852.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483306323.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484916889.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4485187926.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                • String ID:
                • API String ID: 2081738530-0
                • Opcode ID: 935f1abd8dedf7632ba54043f91c00489b421e94b32fbae5dd907fbefc749e05
                • Instruction ID: 3614a086826523f349a425d331120b5fff2c5775198d55a6beab163c66469ade
                • Opcode Fuzzy Hash: 935f1abd8dedf7632ba54043f91c00489b421e94b32fbae5dd907fbefc749e05
                • Instruction Fuzzy Hash: F941DE72900219AFCF11DF58D884AAEBB74FF55320F14422EE845AB391EB74AE04CBD5
                APIs
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004360F2
                • ___std_exception_destroy.LIBVCRUNTIME ref: 0043617F
                • ___std_exception_copy.LIBVCRUNTIME ref: 00436248
                Strings
                • recursive_directory_iterator::operator++, xrefs: 004361CC
                Memory Dump Source
                • Source File: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 00000008.00000002.4482945368.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483059852.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483306323.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484916889.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4485187926.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_destroy$___std_exception_copy
                • String ID: recursive_directory_iterator::operator++
                • API String ID: 1206660477-953255998
                • Opcode ID: e0fb7ccc28a3226894f5b38585f2f4ffc35b0bfff182273120be10f43cf45e8f
                • Instruction ID: 6619192cb6cb13d441e5431a3ac211069c79c714c18eecd698d3b9a810dc0cd4
                • Opcode Fuzzy Hash: e0fb7ccc28a3226894f5b38585f2f4ffc35b0bfff182273120be10f43cf45e8f
                • Instruction Fuzzy Hash: 35E158B09006059FCB18DF68C945B9EFBF9FF49300F10862EE41697781D778AA44CBA5
                APIs
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004386DE
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004386ED
                Strings
                Memory Dump Source
                • Source File: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 00000008.00000002.4482945368.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483059852.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483306323.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484916889.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4485187926.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_destroy
                • String ID: at line $, column
                • API String ID: 4194217158-191570568
                • Opcode ID: e471e0a998357f3fa48addbdf422c73e34727f502e91d6f64e561929a658028f
                • Instruction ID: 5f3e4a12ec437e830faa44f1ae52748ae1eae63bb8a8ea15f8bc078d1696ab0e
                • Opcode Fuzzy Hash: e471e0a998357f3fa48addbdf422c73e34727f502e91d6f64e561929a658028f
                • Instruction Fuzzy Hash: 016125719002059BDB08CB68DD86B9EFBB1FF89304F14461EF415A77C2EB78AA848795
                APIs
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004A3946
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004A395F
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004A3A97
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004A3AB0
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004A3C16
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004A3C2F
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004A4479
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004A4492
                Strings
                Memory Dump Source
                • Source File: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 00000008.00000002.4482945368.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483059852.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483306323.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484916889.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4485187926.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_destroy
                • String ID: value
                • API String ID: 4194217158-494360628
                • Opcode ID: 1b08dc98951d7f5790a1b094ad2d89e696f0962f9333d1608fd539f844dc7a00
                • Instruction ID: 4a1a45faa4979aa4ad64683741266724e854df4c82cb3c25f6892f2cc6feaecc
                • Opcode Fuzzy Hash: 1b08dc98951d7f5790a1b094ad2d89e696f0962f9333d1608fd539f844dc7a00
                • Instruction Fuzzy Hash: 6151D170C00248DBDF14DFA8CD89BDEBFB4BF56304F144259E455A7282D7786A88CB66
                APIs
                • ___std_exception_copy.LIBVCRUNTIME ref: 00433C0F
                Strings
                Memory Dump Source
                • Source File: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 00000008.00000002.4482945368.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483059852.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483306323.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484916889.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4485187926.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_copy
                • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                • API String ID: 2659868963-1866435925
                • Opcode ID: b2d16b061b1de4e27a50339c30edc60289d9cd77f9fd77f360aa8cd00ae6e4bf
                • Instruction ID: d5909f071a6136875d10a3bbdf0e90f7cb5058d39c392dd0cc78b15cce36ca70
                • Opcode Fuzzy Hash: b2d16b061b1de4e27a50339c30edc60289d9cd77f9fd77f360aa8cd00ae6e4bf
                • Instruction Fuzzy Hash: 031105B29007086BC710DF59C806B9ABBD8BF49311F14892BFD58D7282F774E904CB95
                Strings
                • unordered_map/set too long, xrefs: 004A2F43
                Memory Dump Source
                • Source File: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 00000008.00000002.4482945368.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483059852.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483306323.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484916889.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4485187926.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: unordered_map/set too long
                • API String ID: 0-306623848
                • Opcode ID: e47e15e7c7996866a8cef593b9a7aeb48dc17a61a2b3e6669089d2f9ba366923
                • Instruction ID: f8355d4db2d7a077ebac295686ef1b0a19316a718a0eae606bf4ee3106e8a93a
                • Opcode Fuzzy Hash: e47e15e7c7996866a8cef593b9a7aeb48dc17a61a2b3e6669089d2f9ba366923
                • Instruction Fuzzy Hash: DDE1E371A002059FCB18DF6CC984A6EBBA1FF5A310F14836AE819DB391D774ED51CB94
                APIs
                • ___std_exception_copy.LIBVCRUNTIME ref: 0043844D
                Strings
                Memory Dump Source
                • Source File: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 00000008.00000002.4482945368.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483059852.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483306323.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484916889.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4485187926.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_copy
                • String ID: parse error$ror
                • API String ID: 2659868963-4201802366
                • Opcode ID: 0c2e619ea4ddbccf96e7439623da134e8ff527a64572386fe0adaca83156cd92
                • Instruction ID: 71245dc7c5200ccb9d5feb04f8a034911a6c2dbb69dca603ce88a810a63d919f
                • Opcode Fuzzy Hash: 0c2e619ea4ddbccf96e7439623da134e8ff527a64572386fe0adaca83156cd92
                • Instruction Fuzzy Hash: 92C1F4709007498FDB08CF68CD85BADFB71BF59304F24835DE4046B692EB78AA84CB95
                APIs
                • ___std_exception_destroy.LIBVCRUNTIME ref: 00438051
                • ___std_exception_destroy.LIBVCRUNTIME ref: 00438060
                Strings
                Memory Dump Source
                • Source File: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 00000008.00000002.4482945368.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483059852.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483306323.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484916889.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4485187926.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_destroy
                • String ID: [json.exception.
                • API String ID: 4194217158-791563284
                • Opcode ID: ee293bf76807d2b4d2f121b8cf06325922f7af48a69cc143c8171278a94b6e82
                • Instruction ID: d1ce62d5abae90e2634bcb20a61b6de41888fd83abe4ff02112b5e1b14686f9a
                • Opcode Fuzzy Hash: ee293bf76807d2b4d2f121b8cf06325922f7af48a69cc143c8171278a94b6e82
                • Instruction Fuzzy Hash: F691D4719002089FDB18CF68CD85B9EFBB1FF49314F14425EE450AB692D7B4AA848795
                APIs
                • ___std_exception_copy.LIBVCRUNTIME ref: 00433C0F
                Strings
                Memory Dump Source
                • Source File: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 00000008.00000002.4482945368.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483059852.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483306323.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484916889.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4485187926.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_copy
                • String ID: ios_base::badbit set$ios_base::failbit set
                • API String ID: 2659868963-1240500531
                • Opcode ID: 2a2068ffb0e0252bae891f637030c685ac8a0f0ef2becaf0656a31c46beada43
                • Instruction ID: 110e67317c22a718e353e223aea29a9baf5df9e7412186fe8e6698b0f87d9281
                • Opcode Fuzzy Hash: 2a2068ffb0e0252bae891f637030c685ac8a0f0ef2becaf0656a31c46beada43
                • Instruction Fuzzy Hash: 28411671900608ABC704DF59CC46BAEFBF8FF49310F14861AF954A7782E774AA40CBA5
                APIs
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004A4E29
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004A4E42
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004A594D
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004A5966
                Strings
                Memory Dump Source
                • Source File: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 00000008.00000002.4482945368.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483059852.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483306323.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484916889.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4485187926.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_destroy
                • String ID: value
                • API String ID: 4194217158-494360628
                • Opcode ID: 7ce98c8171c851daeb649d2f84924367efab9f5f6d6f42e2a85f2ec329bb6b81
                • Instruction ID: 2f4644a41b30b767ef63ebfe309279af3947d703a2f95cb1e6974d810ca8874d
                • Opcode Fuzzy Hash: 7ce98c8171c851daeb649d2f84924367efab9f5f6d6f42e2a85f2ec329bb6b81
                • Instruction Fuzzy Hash: 8E51B1B0C00248DBDF14DFA4CD89BDEBFB4BF56304F144259E455AB282D7786A88CB56
                APIs
                • Concurrency::cancel_current_task.LIBCPMT ref: 004A99F1
                Strings
                • type must be boolean, but is , xrefs: 004A9AE2
                • type must be string, but is , xrefs: 004A9A58
                Memory Dump Source
                • Source File: 00000008.00000002.4483059852.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 00000008.00000002.4482945368.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483059852.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4483306323.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484155637.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4484916889.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 00000008.00000002.4485187926.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_8_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: Concurrency::cancel_current_task
                • String ID: type must be boolean, but is $type must be string, but is
                • API String ID: 118556049-436076039
                • Opcode ID: 6c13dc530ba47eb6493e7812f2132e442f57bfe705df5b27be99a19aa3ac5094
                • Instruction ID: 8e076b49b9d2b40663101391539bb86dd6918c970e6fd0157adda575f1753b03
                • Opcode Fuzzy Hash: 6c13dc530ba47eb6493e7812f2132e442f57bfe705df5b27be99a19aa3ac5094
                • Instruction Fuzzy Hash: 463129B5904248AFCB04EB94D842B9FBBA8EB15304F14466EF415D7791EB38AE04C75A

                Execution Graph

                Execution Coverage:1.8%
                Dynamic/Decrypted Code Coverage:1.6%
                Signature Coverage:0%
                Total number of Nodes:252
                Total number of Limit Nodes:24
                execution_graph 23535 512dd0 23538 512d0e 23535->23538 23537 512de2 23541 512d1a std::locale::_Setgloballocale 23538->23541 23539 512d21 23556 51acaf RtlAllocateHeap __dosmaperr 23539->23556 23541->23539 23543 512d41 23541->23543 23542 512d26 23557 512210 RtlAllocateHeap ___std_exception_copy 23542->23557 23545 512d53 23543->23545 23546 512d46 23543->23546 23552 5240f8 23545->23552 23558 51acaf RtlAllocateHeap __dosmaperr 23546->23558 23549 512d5c 23551 512d31 23549->23551 23559 51acaf RtlAllocateHeap __dosmaperr 23549->23559 23551->23537 23553 524104 std::_Lockit::_Lockit std::locale::_Setgloballocale 23552->23553 23560 52419c 23553->23560 23555 52411f 23555->23549 23556->23542 23557->23551 23558->23551 23559->23551 23565 5241bf 23560->23565 23562 524220 23570 524823 RtlAllocateHeap __dosmaperr 23562->23570 23564 524205 23564->23555 23565->23564 23566 523e63 23565->23566 23567 523e70 __dosmaperr std::_Facet_Register 23566->23567 23568 523eae __dosmaperr 23567->23568 23569 523e9b RtlAllocateHeap 23567->23569 23568->23562 23569->23567 23569->23568 23570->23564 23892 432540 RtlAllocateHeap RtlAllocateHeap RtlAllocateHeap std::locale::_Locimp::_Locimp 23573 516658 23574 51666b ___std_exception_copy 23573->23574 23579 516533 23574->23579 23576 516677 23586 511f4c RtlAllocateHeap ___std_exception_copy 23576->23586 23578 516683 23580 51653f std::locale::_Setgloballocale 23579->23580 23581 516549 23580->23581 23584 51656c 23580->23584 23601 512193 RtlAllocateHeap ___std_exception_copy __Getctype 23581->23601 23583 516564 23583->23576 23584->23583 23587 5165ca 23584->23587 23586->23578 23588 5165d7 23587->23588 23589 5165fa 23587->23589 23626 512193 RtlAllocateHeap ___std_exception_copy __Getctype 23588->23626 23599 5165f2 23589->23599 23602 513041 23589->23602 23596 516626 23619 5224af 23596->23619 23599->23583 23601->23583 23603 51305a 23602->23603 23607 513081 23602->23607 23604 5239f2 RtlAllocateHeap 23603->23604 23603->23607 23605 513076 23604->23605 23628 522dfb 23605->23628 23608 52485d 23607->23608 23609 524874 23608->23609 23610 51661a 23608->23610 23609->23610 23696 524823 RtlAllocateHeap __dosmaperr 23609->23696 23612 5239f2 23610->23612 23613 523a13 23612->23613 23614 5239fe 23612->23614 23613->23596 23697 51acaf RtlAllocateHeap __dosmaperr 23614->23697 23616 523a03 23698 512210 RtlAllocateHeap ___std_exception_copy 23616->23698 23618 523a0e 23618->23596 23621 5224d8 23619->23621 23623 51662d 23619->23623 23620 522527 23703 512193 RtlAllocateHeap ___std_exception_copy __Getctype 23620->23703 23621->23620 23624 5224ff 23621->23624 23623->23599 23627 524823 RtlAllocateHeap __dosmaperr 23623->23627 23699 52241e 23624->23699 23626->23599 23627->23599 23629 522e07 std::locale::_Setgloballocale 23628->23629 23630 522e48 23629->23630 23632 522e8e 23629->23632 23634 522e0f 23629->23634 23649 512193 RtlAllocateHeap ___std_exception_copy __Getctype 23630->23649 23632->23634 23635 522f0c 23632->23635 23634->23607 23636 522f34 23635->23636 23639 522f57 23635->23639 23637 522f38 23636->23637 23640 522f93 23636->23640 23655 512193 RtlAllocateHeap ___std_exception_copy __Getctype 23637->23655 23639->23634 23641 522fb1 23640->23641 23656 51bbed 23640->23656 23650 522a51 23641->23650 23645 523010 23645->23639 23647 523079 WriteFile 23645->23647 23646 522fc9 23646->23639 23659 522622 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_dtor _ValidateLocalCookies std::locale::_Locimp::_Locimp 23646->23659 23647->23639 23649->23634 23660 52e7b4 23650->23660 23652 522a63 23653 522a91 23652->23653 23669 517780 RtlAllocateHeap RtlAllocateHeap std::_Locinfo::_Locinfo_dtor ___std_exception_copy 23652->23669 23653->23645 23653->23646 23655->23639 23673 51bacc 23656->23673 23658 51bc06 23658->23641 23659->23639 23661 52e7c1 23660->23661 23662 52e7ce 23660->23662 23670 51acaf RtlAllocateHeap __dosmaperr 23661->23670 23664 52e7da 23662->23664 23671 51acaf RtlAllocateHeap __dosmaperr 23662->23671 23664->23652 23666 52e7fb 23672 512210 RtlAllocateHeap ___std_exception_copy 23666->23672 23667 52e7c6 23667->23652 23669->23653 23670->23667 23671->23666 23672->23667 23678 52814e 23673->23678 23675 51bade 23676 51bafa SetFilePointerEx 23675->23676 23677 51bae6 23675->23677 23676->23677 23677->23658 23679 528170 23678->23679 23680 52815b 23678->23680 23685 528195 23679->23685 23693 51ac9c RtlAllocateHeap __dosmaperr 23679->23693 23691 51ac9c RtlAllocateHeap __dosmaperr 23680->23691 23682 528160 23692 51acaf RtlAllocateHeap __dosmaperr 23682->23692 23685->23675 23686 5281a0 23694 51acaf RtlAllocateHeap __dosmaperr 23686->23694 23687 528168 23687->23675 23689 5281a8 23695 512210 RtlAllocateHeap ___std_exception_copy 23689->23695 23691->23682 23692->23687 23693->23686 23694->23689 23695->23687 23696->23610 23697->23616 23698->23618 23700 52242a std::locale::_Setgloballocale 23699->23700 23702 522469 23700->23702 23704 522582 23700->23704 23702->23623 23703->23623 23705 52814e RtlAllocateHeap 23704->23705 23707 522592 23705->23707 23709 52814e RtlAllocateHeap 23707->23709 23714 522598 23707->23714 23715 5225ca 23707->23715 23708 5225f0 23708->23702 23711 5225c1 23709->23711 23710 52814e RtlAllocateHeap 23712 5225d6 FindCloseChangeNotification 23710->23712 23713 52814e RtlAllocateHeap 23711->23713 23712->23714 23713->23715 23716 5280bd RtlAllocateHeap __dosmaperr 23714->23716 23715->23710 23715->23714 23716->23708 23904 51abd8 SetFilePointerEx WriteFile RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 23724 4fb0765 23725 4fb076f GetCurrentHwProfileW 23724->23725 23727 4fb0796 23725->23727 23898 438b00 RtlAllocateHeap RtlAllocateHeap ___std_exception_copy 23899 44a100 7 API calls 3 library calls 23884 4aca10 RtlAllocateHeap 23720 4fb0520 GetCurrentHwProfileW 23729 44ec20 23730 44f0bf 23729->23730 23736 44ec5e 23729->23736 23731 44eca7 setsockopt recv 23731->23736 23733 44f0aa Sleep 23733->23730 23733->23736 23734 44ecff 23771 498610 23734->23771 23736->23730 23736->23731 23736->23733 23736->23734 23738 44f09c Sleep 23736->23738 23747 44db60 WSAStartup 23736->23747 23753 444a90 23736->23753 23756 44e060 23736->23756 23738->23733 23739 44ed38 recv 23740 44ed59 recv 23739->23740 23744 44ed7a 23739->23744 23740->23744 23742 498610 2 API calls 23742->23744 23744->23738 23744->23742 23746 44edf1 recv 23744->23746 23776 495d50 23744->23776 23793 44e460 6 API calls 23744->23793 23746->23744 23748 44db98 23747->23748 23749 44dc56 23747->23749 23748->23749 23750 44dc24 socket 23748->23750 23749->23736 23750->23749 23751 44dc3a connect 23750->23751 23751->23749 23752 44dc4c closesocket 23751->23752 23752->23749 23752->23750 23794 50c6dc 23753->23794 23755 444a9b __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 23755->23736 23757 495d50 2 API calls 23756->23757 23759 44e0aa 23757->23759 23801 495bd0 23759->23801 23760 44e204 23761 44e44b 23760->23761 23763 44e22e 23760->23763 23806 512220 RtlAllocateHeap ___std_exception_copy __Getctype 23761->23806 23764 498610 2 API calls 23763->23764 23767 44e26e std::locale::_Locimp::_Locimp 23763->23767 23764->23767 23767->23767 23769 44e3b7 23767->23769 23770 44e393 WSASend 23767->23770 23768 44e423 23768->23736 23769->23768 23807 512220 RtlAllocateHeap ___std_exception_copy __Getctype 23769->23807 23770->23767 23770->23769 23772 498657 23771->23772 23775 498628 std::locale::_Setgloballocale 23771->23775 23809 49ba20 23772->23809 23774 49866a 23774->23739 23775->23739 23777 495d7a 23776->23777 23778 495e32 23777->23778 23779 495d8b 23777->23779 23843 432040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 23778->23843 23780 495d97 std::locale::_Locimp::_Locimp 23779->23780 23783 495dbc 23779->23783 23785 495dfe 23779->23785 23786 495df5 23779->23786 23780->23744 23782 495e37 23844 431fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 23782->23844 23787 50cd02 std::_Facet_Register 2 API calls 23783->23787 23790 50cd02 std::_Facet_Register 2 API calls 23785->23790 23791 495dd6 std::locale::_Locimp::_Locimp 23785->23791 23786->23782 23786->23783 23788 495dcf 23787->23788 23788->23791 23845 512220 RtlAllocateHeap ___std_exception_copy __Getctype 23788->23845 23790->23791 23791->23744 23793->23744 23797 50ccdc 23794->23797 23798 50c6ea 23797->23798 23799 50cced GetSystemTimePreciseAsFileTime 23797->23799 23798->23755 23799->23798 23802 495c01 23801->23802 23803 495bde 23801->23803 23802->23760 23803->23802 23808 512220 RtlAllocateHeap ___std_exception_copy __Getctype 23803->23808 23810 49bb6c 23809->23810 23811 49ba45 23809->23811 23832 432040 RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 23810->23832 23815 49bab3 23811->23815 23816 49baa6 23811->23816 23818 49ba5a 23811->23818 23813 49bb71 23833 431fa0 RtlAllocateHeap RtlAllocateHeap Concurrency::cancel_current_task ___std_exception_copy 23813->23833 23820 50cd02 std::_Facet_Register 2 API calls 23815->23820 23822 49ba6a std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 23815->23822 23816->23813 23816->23818 23824 50cd02 23818->23824 23820->23822 23823 49bb2a std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 23822->23823 23834 512220 RtlAllocateHeap ___std_exception_copy __Getctype 23822->23834 23823->23774 23827 50cd07 std::_Facet_Register 23824->23827 23826 50cd21 23826->23822 23827->23826 23829 431fa0 Concurrency::cancel_current_task 23827->23829 23836 51b99c 23827->23836 23828 50cd2d 23828->23828 23829->23828 23835 50e0c1 RtlAllocateHeap RtlAllocateHeap ___std_exception_destroy ___std_exception_copy 23829->23835 23831 431fe3 23831->23822 23832->23813 23833->23822 23835->23831 23841 52489d __dosmaperr std::_Facet_Register 23836->23841 23837 5248db 23842 51acaf RtlAllocateHeap __dosmaperr 23837->23842 23839 5248c6 RtlAllocateHeap 23840 5248d9 23839->23840 23839->23841 23840->23827 23841->23837 23841->23839 23842->23840 23843->23782 23844->23788 23889 444ab0 GetPEB RtlAllocateHeap RtlAllocateHeap std::locale::_Setgloballocale 23851 516ba6 23852 516bb9 ___std_exception_copy 23851->23852 23857 5168fd 23852->23857 23854 516bce 23864 511f4c RtlAllocateHeap ___std_exception_copy 23854->23864 23856 516bdb 23859 516909 std::locale::_Setgloballocale 23857->23859 23858 51690f 23874 512193 RtlAllocateHeap ___std_exception_copy __Getctype 23858->23874 23859->23858 23861 516952 23859->23861 23865 516a80 23861->23865 23863 51692a 23863->23854 23864->23856 23866 516a93 23865->23866 23867 516aa6 23865->23867 23866->23863 23875 5169a7 23867->23875 23869 513041 4 API calls 23871 516af7 23869->23871 23870 516ac9 23870->23869 23873 516b57 23870->23873 23872 51bbed 2 API calls 23871->23872 23872->23873 23873->23863 23874->23863 23876 5169b8 23875->23876 23878 516a10 23875->23878 23876->23878 23879 51bbad SetFilePointerEx RtlAllocateHeap ___std_exception_copy 23876->23879 23878->23870 23879->23878

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 0 44ec20-44ec58 1 44ec5e 0->1 2 44f0bf-44f0d3 0->2 3 44ec64-44ec6c 1->3 4 44eca7-44ecf0 setsockopt recv 3->4 5 44ec6e-44ec94 call 44db60 3->5 4->2 9 44ecf6-44ecf9 4->9 7 44ec99-44eca1 5->7 7->4 10 44f0aa-44f0b9 Sleep 7->10 11 44f037-44f053 call 444a90 9->11 12 44ecff-44ed53 call 498610 recv 9->12 10->2 10->3 17 44f055 11->17 18 44f09c-44f0a4 Sleep 11->18 22 44efe4-44eff1 12->22 23 44ed59-44ed74 recv 12->23 20 44f057-44f05d 17->20 21 44f05f-44f086 call 44e060 17->21 18->10 20->18 20->21 29 44f08b-44f097 21->29 22->18 26 44eff7-44f003 22->26 23->22 24 44ed7a-44edb1 23->24 27 44ee14-44ee44 call 495d50 24->27 28 44edb3-44ee11 call 498610 recv 24->28 30 44f005-44f013 26->30 31 44f019-44f023 call 50cf83 26->31 38 44ef64-44efb3 call 44e460 27->38 39 44ee4a 27->39 28->27 29->18 30->31 31->18 38->22 46 44efb5-44efc4 38->46 40 44ee50-44ef5e 39->40 40->38 47 44efc6-44efd4 46->47 48 44efda-44efe1 call 50cf83 46->48 47->48 48->22
                APIs
                • setsockopt.WS2_32(00000330,0000FFFF,00001006,?,00000008), ref: 0044ECC7
                • recv.WS2_32(?,00000004,00000002), ref: 0044ECE1
                • recv.WS2_32(00000000,0000000C,00000002,0000000C), ref: 0044ED4E
                • recv.WS2_32(00000000,0000000C,00000008), ref: 0044ED6F
                • recv.WS2_32(00000000,?,00000008), ref: 0044EE0C
                  • Part of subcall function 0044DB60: WSAStartup.WS2_32 ref: 0044DB8B
                  • Part of subcall function 0044DB60: socket.WS2_32(?,?,?,?,?,?,50500,?,?), ref: 0044DC2E
                  • Part of subcall function 0044DB60: connect.WS2_32(00000000,?,?,?,?,?,50500,?,?), ref: 0044DC42
                  • Part of subcall function 0044DB60: closesocket.WS2_32(00000000), ref: 0044DC4D
                • recv.WS2_32(?,00000004,00000008), ref: 0044F033
                • Sleep.KERNELBASE(00000001), ref: 0044F09E
                • Sleep.KERNELBASE(00000064), ref: 0044F0AC
                • __Mtx_unlock.LIBCPMT ref: 0044F211
                Strings
                Memory Dump Source
                • Source File: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 0000000A.00000002.4483011351.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4483064804.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484192182.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485039364.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485393293.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: recv$Sleep$Mtx_unlockStartupclosesocketconnectsetsockoptsocket
                • String ID: 50500$t;V
                • API String ID: 2930922264-2591036556
                • Opcode ID: 667a1e5883ec06f96178a587891ee3bddde4708c93009973490402d2396603d4
                • Instruction ID: b5200ff60a7e53f4cbb5093def1f6bddf053c639913f6b16a5fba28359bde650
                • Opcode Fuzzy Hash: 667a1e5883ec06f96178a587891ee3bddde4708c93009973490402d2396603d4
                • Instruction Fuzzy Hash: 19B1E331D00249DFEB10DFA8CC45BADBBB5FF55300F24826AE445A72D2DBB4A989CB40

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 51 44e060-44e0af call 495d50 54 44e1d4-44e20a call 495bd0 51->54 55 44e0b5-44e0b8 51->55 64 44e20c-44e218 54->64 65 44e238-44e26c call 437d20 54->65 56 44e0c0-44e0e6 55->56 58 44e0f8-44e107 56->58 59 44e0e8-44e0f3 56->59 62 44e117-44e123 58->62 63 44e109-44e112 58->63 61 44e1c7 59->61 66 44e1ca-44e1ce 61->66 67 44e125-44e12e 62->67 68 44e133-44e13f 62->68 63->61 69 44e22e-44e235 call 50cf83 64->69 70 44e21a-44e228 64->70 81 44e282-44e28a call 498610 65->81 82 44e26e-44e280 65->82 66->54 66->56 67->61 72 44e141-44e14a 68->72 73 44e14c-44e158 68->73 69->65 70->69 74 44e44b call 512220 70->74 72->61 77 44e165-44e171 73->77 78 44e15a-44e163 73->78 85 44e450-44e455 call 512220 74->85 86 44e173-44e17c 77->86 87 44e17e-44e18a 77->87 78->61 83 44e28f-44e2e2 call 437d20 * 2 81->83 82->83 99 44e2e4-44e313 call 437d20 call 50e9e0 83->99 100 44e316-44e32c call 437d20 83->100 86->61 90 44e197-44e1a3 87->90 91 44e18c-44e195 87->91 94 44e1a5-44e1ae 90->94 95 44e1b0-44e1b9 90->95 91->61 94->61 95->66 96 44e1bb-44e1c3 95->96 96->61 99->100 106 44e3b7 100->106 107 44e332-44e338 100->107 109 44e3bb-44e3c1 106->109 108 44e340-44e36c 107->108 111 44e370-44e37b 108->111 112 44e3c3-44e3cf 109->112 113 44e3eb-44e403 109->113 111->111 116 44e37d-44e3ab WSASend 111->116 117 44e3e1-44e3e8 call 50cf83 112->117 118 44e3d1-44e3df 112->118 114 44e435-44e44a 113->114 115 44e405-44e411 113->115 119 44e413-44e421 115->119 120 44e42b-44e432 call 50cf83 115->120 128 44e425-44e429 116->128 129 44e3ad-44e3b5 116->129 117->113 118->85 118->117 119->85 122 44e423 119->122 120->114 122->120 128->109 129->106 129->108
                APIs
                • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,005347E8,00000000,00000000,-005665B0), ref: 0044E3A6
                Strings
                Memory Dump Source
                • Source File: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 0000000A.00000002.4483011351.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4483064804.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484192182.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485039364.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485393293.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: Send
                • String ID: 131$50500$Ws2_32.dll$\;V$t;V$taV$;V
                • API String ID: 121738739-25841771
                • Opcode ID: 1cd50972f020ac79639d39de6e00c09112299ff3bfd7ffa1b9df19f98d1f9ce8
                • Instruction ID: 21c355422bbe8dd93713406b710f591f5cc3d7d209d604bd7e1288f9021784dc
                • Opcode Fuzzy Hash: 1cd50972f020ac79639d39de6e00c09112299ff3bfd7ffa1b9df19f98d1f9ce8
                • Instruction Fuzzy Hash: 64D1F270D04248DFEB14CFA9CC54BADBBF1BF46300F684259D851AB2D2D7749886CB95

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 130 44db60-44db92 WSAStartup 131 44dc66-44dc6f 130->131 132 44db98-44dbc2 call 437d20 * 2 130->132 137 44dbc4-44dbc8 132->137 138 44dbce-44dc14 132->138 137->131 137->138 140 44dc16-44dc1c 138->140 141 44dc60 138->141 142 44dc74-44dc7e 140->142 143 44dc1e 140->143 141->131 142->141 147 44dc80-44dc88 142->147 144 44dc24-44dc38 socket 143->144 144->141 146 44dc3a-44dc4a connect 144->146 148 44dc70 146->148 149 44dc4c-44dc54 closesocket 146->149 148->142 149->144 150 44dc56-44dc5a 149->150 150->141
                APIs
                • WSAStartup.WS2_32 ref: 0044DB8B
                • socket.WS2_32(?,?,?,?,?,?,50500,?,?), ref: 0044DC2E
                • connect.WS2_32(00000000,?,?,?,?,?,50500,?,?), ref: 0044DC42
                • closesocket.WS2_32(00000000), ref: 0044DC4D
                Strings
                Memory Dump Source
                • Source File: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 0000000A.00000002.4483011351.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4483064804.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484192182.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485039364.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485393293.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: Startupclosesocketconnectsocket
                • String ID: 50500
                • API String ID: 3098855095-2230786414
                • Opcode ID: dbeec301e71e32957d78d8adde9d37e5eabb7e4aea38ebc83d16e4dd2b77ab23
                • Instruction ID: 6b3e054db11a27b071f29559600a3eb63b8bf08c904c318e876bc1a8d44248c6
                • Opcode Fuzzy Hash: dbeec301e71e32957d78d8adde9d37e5eabb7e4aea38ebc83d16e4dd2b77ab23
                • Instruction Fuzzy Hash: 0131E4729043055BD7208B288CC5A2FB7E4FF89724F011F1EF9A4932E0E3749904C696

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 151 522582-522596 call 52814e 154 522598-52259a 151->154 155 52259c-5225a4 151->155 156 5225ea-52260a call 5280bd 154->156 157 5225a6-5225ad 155->157 158 5225af-5225b2 155->158 166 52261c 156->166 167 52260c-52261a call 51ac78 156->167 157->158 160 5225ba-5225ce call 52814e * 2 157->160 161 5225d0-5225e0 call 52814e FindCloseChangeNotification 158->161 162 5225b4-5225b8 158->162 160->154 160->161 161->154 173 5225e2-5225e8 161->173 162->160 162->161 171 52261e-522621 166->171 167->171 173->156
                APIs
                • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,00522469,00000000,CF830579,00561148,0000000C,00522525,0051662D,?), ref: 005225D8
                Strings
                Memory Dump Source
                • Source File: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 0000000A.00000002.4483011351.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4483064804.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484192182.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485039364.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485393293.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: ChangeCloseFindNotification
                • String ID: 8m
                • API String ID: 2591292051-3926704479
                • Opcode ID: 597e0dffa7053bbd928069064f4a64ad021e59c1b30ad38d5b23f85556e10e0c
                • Instruction ID: 2b474e812d35d8ca256cc214475358f3ffec11d3c7dd95edd7cae4ecfb8b3d19
                • Opcode Fuzzy Hash: 597e0dffa7053bbd928069064f4a64ad021e59c1b30ad38d5b23f85556e10e0c
                • Instruction Fuzzy Hash: B811083770513026D62522B47C5977E6F497FD3734F254209F9049F2C2EE65AC819191

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 177 4fb0561-4fb0562 178 4fb0522-4fb0559 177->178 179 4fb0564-4fb0566 177->179 180 4fb0567-4fb057b 178->180 179->180 183 4fb05a8-4fb05b4 180->183 184 4fb057d-4fb0588 180->184 186 4fb0595-4fb059a 183->186 189 4fb05b6-4fb05b8 183->189 185 4fb059b-4fb05a1 184->185 184->186 187 4fb05ba-4fb0771 185->187 186->185 208 4fb077c-4fb078c GetCurrentHwProfileW 187->208 189->187 209 4fb0796-4fb088a call 4fb088b 208->209
                Memory Dump Source
                • Source File: 0000000A.00000002.4490702914.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_4fb0000_RageMP131.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c8d2dabe5a949a6eafa86da2242ea19ee4a687b2b0e9fab2bc242b73c762232d
                • Instruction ID: d8d7d250ec1bbe3c9a95a87ec4580b49bf63a5face6c8019e23d487ff08c938d
                • Opcode Fuzzy Hash: c8d2dabe5a949a6eafa86da2242ea19ee4a687b2b0e9fab2bc242b73c762232d
                • Instruction Fuzzy Hash: 6241DFE730C111BDB10194976B90AFB676EE7E77307308426F887E6901FA846A8B64B1

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 222 522f0c-522f2e 223 523121 222->223 224 522f34-522f36 222->224 227 523123-523127 223->227 225 522f62-522f85 224->225 226 522f38-522f57 call 512193 224->226 229 522f87-522f89 225->229 230 522f8b-522f91 225->230 233 522f5a-522f5d 226->233 229->230 232 522f93-522fa4 229->232 230->226 230->232 234 522fa6-522fb4 call 51bbed 232->234 235 522fb7-522fc7 call 522a51 232->235 233->227 234->235 240 523010-523022 235->240 241 522fc9-522fcf 235->241 244 523024-52302a 240->244 245 523079-523099 WriteFile 240->245 242 522fd1-522fd4 241->242 243 522ff8-52300e call 522622 241->243 248 522fd6-522fd9 242->248 249 522fdf-522fee call 5229e9 242->249 267 522ff1-522ff3 243->267 246 523065-523077 call 522ace 244->246 247 52302c-52302f 244->247 251 5230a4 245->251 252 52309b-5230a1 245->252 273 52304c-52304f 246->273 254 523051-523063 call 522c92 247->254 255 523031-523034 247->255 248->249 256 5230b9-5230bc 248->256 249->267 253 5230a7-5230b2 251->253 252->251 260 5230b4-5230b7 253->260 261 52311c-52311f 253->261 254->273 262 52303a-523047 call 522ba9 255->262 263 5230bf-5230c1 255->263 256->263 260->256 261->227 262->273 270 5230c3-5230c8 263->270 271 5230ef-5230fb 263->271 267->253 274 5230e1-5230ea call 51ac78 270->274 275 5230ca-5230dc 270->275 276 523105-523117 271->276 277 5230fd-523103 271->277 273->267 274->233 275->233 276->233 277->223 277->276
                APIs
                • WriteFile.KERNELBASE(?,00000000,00516AF7,?,00000000,00000000,00000000,?,00000000,?,0050C023,00516AF7,00000000,0050C023,?,?), ref: 00523091
                Memory Dump Source
                • Source File: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 0000000A.00000002.4483011351.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4483064804.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484192182.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485039364.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485393293.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: FileWrite
                • String ID:
                • API String ID: 3934441357-0
                • Opcode ID: 541b06348f4885d074a9b0c7f4ca6a6328694b1165fdea4ac9001afa05c1270d
                • Instruction ID: 68e38a6281b0c3e9f8f7b6a26902fdf6248225eda2e7faf14a7ec00183940523
                • Opcode Fuzzy Hash: 541b06348f4885d074a9b0c7f4ca6a6328694b1165fdea4ac9001afa05c1270d
                • Instruction Fuzzy Hash: 41610575C0012ABFDF11CFA8E885AEEBFB9BF4A304F140145E900A7282D376DA11DB60

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 316 4fb05a6-4fb05b4 317 4fb05b6-4fb05b8 316->317 318 4fb0595-4fb05a1 316->318 319 4fb05ba-4fb0771 317->319 318->319 339 4fb077c-4fb078c GetCurrentHwProfileW 319->339 340 4fb0796-4fb088a call 4fb088b 339->340
                Memory Dump Source
                • Source File: 0000000A.00000002.4490702914.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_4fb0000_RageMP131.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cb0908fbe26648a03cea5e2dbd874e7914d42b60b4deed0f21f2e21c2a5da025
                • Instruction ID: be31a224f0a7910ab6c46f984c011dc90078c436ca6bb7b7fd60dc7bda279eef
                • Opcode Fuzzy Hash: cb0908fbe26648a03cea5e2dbd874e7914d42b60b4deed0f21f2e21c2a5da025
                • Instruction Fuzzy Hash: 0D3111E730C211BDB21180836B50AFB676EE3E77307308426F887E6501FB946A8B64F4

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 280 4fb058d-4fb0771 302 4fb077c-4fb078c GetCurrentHwProfileW 280->302 303 4fb0796-4fb088a call 4fb088b 302->303
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 04FB0787
                Memory Dump Source
                • Source File: 0000000A.00000002.4490702914.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_4fb0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 8e5e01f76b9c031765466ef49860b7f50fb5fd73bf9341b056200109bdcc4b26
                • Instruction ID: b97560b750edb3ad8a9e79ee41c88e5d28f1c956e04e0bfa88b3a31ca8d1a1dd
                • Opcode Fuzzy Hash: 8e5e01f76b9c031765466ef49860b7f50fb5fd73bf9341b056200109bdcc4b26
                • Instruction Fuzzy Hash: FA3113E730C215BDB11180876B50AFB566EE3E77307308426F887E6501FB846A8B74F5

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 353 4fb05d6-4fb0771 370 4fb077c-4fb078c GetCurrentHwProfileW 353->370 371 4fb0796-4fb088a call 4fb088b 370->371
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 04FB0787
                Memory Dump Source
                • Source File: 0000000A.00000002.4490702914.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_4fb0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 0e98832d5fa3d83f1824c3adfb3948e1d8faa06ddc7cc08ad1813dc8a74780e1
                • Instruction ID: 2a01964518501b7eb609cf5e2a51e10aeeb5e018a2b2e931f02b12d26ab96d01
                • Opcode Fuzzy Hash: 0e98832d5fa3d83f1824c3adfb3948e1d8faa06ddc7cc08ad1813dc8a74780e1
                • Instruction Fuzzy Hash: 1131C0E730C115BCB21185876B50AFB576EE3E77307308426F887E6501FB946A8B64F4

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 384 4fb05f3-4fb0771 400 4fb077c-4fb078c GetCurrentHwProfileW 384->400 401 4fb0796-4fb088a call 4fb088b 400->401
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 04FB0787
                Memory Dump Source
                • Source File: 0000000A.00000002.4490702914.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_4fb0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: bd55f27c5040146da196bee9bbb81390de417ccc4bc7105c1f06b555dbd74bb0
                • Instruction ID: d07407b9e73a8322c4d318537143789c405301fdf9b6e3a5c160c3f6ae111334
                • Opcode Fuzzy Hash: bd55f27c5040146da196bee9bbb81390de417ccc4bc7105c1f06b555dbd74bb0
                • Instruction Fuzzy Hash: 7E3104E730C115BDB11180876B50AFB976EE3E7730B308426FC8BE6501FA946A8B64F4

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 414 4fb0667-4fb0668 415 4fb066a 414->415 416 4fb0607-4fb0661 414->416 418 4fb066c-4fb0771 415->418 416->418 432 4fb077c-4fb078c GetCurrentHwProfileW 418->432 433 4fb0796-4fb088a call 4fb088b 432->433
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 04FB0787
                Memory Dump Source
                • Source File: 0000000A.00000002.4490702914.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_4fb0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 55e6d3897f5c541e5019648d4f6ff8a9972bea872eeda92eee793d6867e019ea
                • Instruction ID: adead8c02b3696fa22db2b6e815a2d092cb3cb6b93e15b83d079e6673dab8c95
                • Opcode Fuzzy Hash: 55e6d3897f5c541e5019648d4f6ff8a9972bea872eeda92eee793d6867e019ea
                • Instruction Fuzzy Hash: 9231B1E730C115BD711180876B50AFB966EE3EB7307318426F8CBE6501FA956A8B64F4

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 446 4fb062b-4fb0632 447 4fb0639-4fb063f 446->447 448 4fb0634-4fb0636 446->448 449 4fb0641-4fb0771 447->449 448->449 463 4fb077c-4fb078c GetCurrentHwProfileW 449->463 464 4fb0796-4fb088a call 4fb088b 463->464
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 04FB0787
                Memory Dump Source
                • Source File: 0000000A.00000002.4490702914.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_4fb0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 37deb2f21f513c44deb185afd1101dee1adc703884a95b8376bbae421ace1d2e
                • Instruction ID: 706ea740ab16c13c942070b4320c8ca787d338bc0ea95d2763514b806628f84b
                • Opcode Fuzzy Hash: 37deb2f21f513c44deb185afd1101dee1adc703884a95b8376bbae421ace1d2e
                • Instruction Fuzzy Hash: 3F21B4E730C115BDA21185472B50AFB576EE3EB3307308416F8C7E5501FE446A8B64F5

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 477 49ba20-49ba3f 478 49bb6c call 432040 477->478 479 49ba45-49ba58 477->479 486 49bb71 call 431fa0 478->486 480 49ba5a 479->480 481 49ba83-49ba8b 479->481 485 49ba5c-49ba61 480->485 483 49ba8d-49ba92 481->483 484 49ba94-49baa4 481->484 483->485 488 49bab3-49bab5 484->488 489 49baa6-49baab 484->489 490 49ba64-49ba65 call 50cd02 485->490 492 49bb76-49bb7b call 512220 486->492 494 49bac7 488->494 495 49bab7-49bac5 call 50cd02 488->495 489->486 493 49bab1 489->493 496 49ba6a-49ba6f 490->496 493->490 499 49bac9-49baec 494->499 495->499 496->492 500 49ba75-49ba81 496->500 503 49baee-49bb18 call 50e9e0 call 50ef60 499->503 504 49bb43-49bb69 call 50e9e0 call 50ef60 499->504 500->499 513 49bb1a-49bb28 503->513 514 49bb2c-49bb40 call 50cf83 503->514 513->492 515 49bb2a 513->515 515->514
                APIs
                • Concurrency::cancel_current_task.LIBCPMT ref: 0049BB71
                Memory Dump Source
                • Source File: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 0000000A.00000002.4483011351.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4483064804.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484192182.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485039364.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485393293.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: Concurrency::cancel_current_task
                • String ID:
                • API String ID: 118556049-0
                • Opcode ID: b19d2212db506fa46971754378483badd225f06599945ea51feb898bce11e8e1
                • Instruction ID: 38e6669dc504038121b06ab4bb6f7e6ac73a319efce4e92aa354c026f24c6135
                • Opcode Fuzzy Hash: b19d2212db506fa46971754378483badd225f06599945ea51feb898bce11e8e1
                • Instruction Fuzzy Hash: 9341EF729001099BCF15DF68EA816AEBFA5EF85350F24067AF804EB345D734EE118BE5

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 518 4fb064f-4fb0771 532 4fb077c-4fb078c GetCurrentHwProfileW 518->532 533 4fb0796-4fb088a call 4fb088b 532->533
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 04FB0787
                Memory Dump Source
                • Source File: 0000000A.00000002.4490702914.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_4fb0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 2f9bce04386136395e5f4977f949205c147e8178b5f0053fbb1a7806a2897dc6
                • Instruction ID: 20b05736be8582550415f8716ffef17ba9543d61d87aebee234a63ff770cc810
                • Opcode Fuzzy Hash: 2f9bce04386136395e5f4977f949205c147e8178b5f0053fbb1a7806a2897dc6
                • Instruction Fuzzy Hash: 7921BFE730C115BD711094832B90AFB566EE3EB7307318426FC87E6500FA44AA8764F4

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 546 4fb0675-4fb0771 558 4fb077c-4fb078c GetCurrentHwProfileW 546->558 559 4fb0796-4fb088a call 4fb088b 558->559
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 04FB0787
                Memory Dump Source
                • Source File: 0000000A.00000002.4490702914.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_4fb0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: a5f341085a0a24fa959c738ad1b9a47ab40132e05e7f62ad5963b16c752f86be
                • Instruction ID: 0574be77b70b6f3aed72d9b0d98fc6bcc6f782c7aa510d4d475c4ca151ad1a3f
                • Opcode Fuzzy Hash: a5f341085a0a24fa959c738ad1b9a47ab40132e05e7f62ad5963b16c752f86be
                • Instruction Fuzzy Hash: A321B0E730C119BDB11194832B90AFB526EE3EB7307308426FCC7E6500FA556A8768F4
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 04FB0787
                Memory Dump Source
                • Source File: 0000000A.00000002.4490702914.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_4fb0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 56c4fa2053168bb404120ff5b85312124c7a1d9153bff6e467730d952dcd4479
                • Instruction ID: bb8281ebbec97b0fc23883fd445984535920f4dbfbbc7d0849e7f4359125aeee
                • Opcode Fuzzy Hash: 56c4fa2053168bb404120ff5b85312124c7a1d9153bff6e467730d952dcd4479
                • Instruction Fuzzy Hash: 122148B330C255AEA60281522BA09FBA72DE7D733073084A6FCC7DB501FB046A47A5F1
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 04FB0787
                Memory Dump Source
                • Source File: 0000000A.00000002.4490702914.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_4fb0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 548a9817d7488db02c3f4202aa0f48bb3395a367fd7057f9a8ed1386281da24d
                • Instruction ID: 51381ca94dcde3c8d6e8b3d1b606486494c0ab48bf218bc777ed82a7b0510948
                • Opcode Fuzzy Hash: 548a9817d7488db02c3f4202aa0f48bb3395a367fd7057f9a8ed1386281da24d
                • Instruction Fuzzy Hash: F611C3B370C115AD621591576A90AFB936EE7E73307309426FC87D6500FB15AA8768F0
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 04FB0787
                Memory Dump Source
                • Source File: 0000000A.00000002.4490702914.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_4fb0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 6aff13f5e8240f4969441c4ae00c844aeeda15a321d0f9e89c7bf9bf0168ed6b
                • Instruction ID: 4b888fa12d1105423e38249c7a137123c9165ba4b2d2cdc71bb9eaf5353d92d5
                • Opcode Fuzzy Hash: 6aff13f5e8240f4969441c4ae00c844aeeda15a321d0f9e89c7bf9bf0168ed6b
                • Instruction Fuzzy Hash: 8911C1B370C115ADB21491832B60AFB936DD7DB330B708426FC8BD6500FB05AA87A8F0
                Memory Dump Source
                • Source File: 0000000A.00000002.4490702914.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_4fb0000_RageMP131.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4c3f68996cbcd481af01f419289b801e1bd79c7fb00d77f6116ca0786607dc86
                • Instruction ID: 50368b59e5de790b1b7be6dc39cd17f9483d9ad8ff81d4f57b85d7cfa6fda5e5
                • Opcode Fuzzy Hash: 4c3f68996cbcd481af01f419289b801e1bd79c7fb00d77f6116ca0786607dc86
                • Instruction Fuzzy Hash: B711CBF330C204ADE605C563A650AFB6739C787330B304456ECC2DB105FA11AA8748E1
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 04FB0787
                Memory Dump Source
                • Source File: 0000000A.00000002.4490702914.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_4fb0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: b24df9d00037c3f879661df1ab2a2b2f9bcc5afc90150acf71734ebdaaa78882
                • Instruction ID: 7d1ec20f58b47b5ee8161c5db3c6441d8d96ee631c094aa983acd1c0e36bb94c
                • Opcode Fuzzy Hash: b24df9d00037c3f879661df1ab2a2b2f9bcc5afc90150acf71734ebdaaa78882
                • Instruction Fuzzy Hash: 4311E0A730C115AEB61091536B60AFB932DD7DB720B308422FCCBD6500EA14AA8768F1
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 04FB0787
                Memory Dump Source
                • Source File: 0000000A.00000002.4490702914.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_4fb0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: b2b0d4bb96fa58c8f3f97ab7a0accf4f9f56c9ea11ca173aacf7cc001cd5c049
                • Instruction ID: 74b843d61c018fd56d46c081cec2ad752c85625391a5ad4b537bfc3f1b29767f
                • Opcode Fuzzy Hash: b2b0d4bb96fa58c8f3f97ab7a0accf4f9f56c9ea11ca173aacf7cc001cd5c049
                • Instruction Fuzzy Hash: 9A11A0A730C115AD721091436B50AFB932DD7DB7207308426FC87D6100FB04AA87A8F0
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 04FB0787
                Memory Dump Source
                • Source File: 0000000A.00000002.4490702914.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_4fb0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: 99afb6bca97290851078ce95f7eec4449993feaa8e923708fd4ca9a8c01af8e4
                • Instruction ID: 3df2beff89978a7818b0e62606be3679addb46f40bcb2ae34b9bbae50873c6b6
                • Opcode Fuzzy Hash: 99afb6bca97290851078ce95f7eec4449993feaa8e923708fd4ca9a8c01af8e4
                • Instruction Fuzzy Hash: 401125B370C225BEA60191932B50AFBA32DD7DB7307318026FC87D6100FA059E4658F1
                APIs
                • GetCurrentHwProfileW.ADVAPI32(?), ref: 04FB0787
                Memory Dump Source
                • Source File: 0000000A.00000002.4490702914.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_4fb0000_RageMP131.jbxd
                Similarity
                • API ID: CurrentProfile
                • String ID:
                • API String ID: 2104809126-0
                • Opcode ID: aaf626811d4715d0b3c4389e3f59246ac46c786347f757b91be07afb10285236
                • Instruction ID: 4549054dfac73e5b293e6d5dde54d3b78fb1a389eebe8f8de2e82d033db4f06c
                • Opcode Fuzzy Hash: aaf626811d4715d0b3c4389e3f59246ac46c786347f757b91be07afb10285236
                • Instruction Fuzzy Hash: FD0104A370C255AEA21191522B60AFB676DD7EB3307304062ECC6DA100EF15AA8758F1
                APIs
                • SetFilePointerEx.KERNELBASE(00000000,00000000,00560E00,0050C023,00000002,0050C023,00000000,?,?,?,0051BBD6,00000000,?,0050C023,00000002,00560E00), ref: 0051BB08
                Memory Dump Source
                • Source File: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 0000000A.00000002.4483011351.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4483064804.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484192182.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485039364.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485393293.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: FilePointer
                • String ID:
                • API String ID: 973152223-0
                • Opcode ID: 39ac700be729baeecf1a79c3f256d71b3af36a69ddef3de5abc77fd42efcedad
                • Instruction ID: 33ee6917933ea04bd358370f3700448294c908acac7cac6746b13e76671aa9da
                • Opcode Fuzzy Hash: 39ac700be729baeecf1a79c3f256d71b3af36a69ddef3de5abc77fd42efcedad
                • Instruction Fuzzy Hash: DA01C432614155AFEF069F59CC45CEE3F69FF85324F240248F8119B2D1EAB1ED919B90
                APIs
                • ___std_exception_copy.LIBVCRUNTIME ref: 00431FDE
                Memory Dump Source
                • Source File: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 0000000A.00000002.4483011351.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4483064804.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484192182.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485039364.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485393293.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_copy
                • String ID:
                • API String ID: 2659868963-0
                • Opcode ID: 5cd4db2ff6868d8fa905581d9cad760b6f661d469c2f88477529f3b2c12f6310
                • Instruction ID: 65685f2945995c6cb1b21799916f1236761673d58994d2f8d6b174951a5d4f96
                • Opcode Fuzzy Hash: 5cd4db2ff6868d8fa905581d9cad760b6f661d469c2f88477529f3b2c12f6310
                • Instruction Fuzzy Hash: DF012B3640030E67CB14AB98EC0548D7FACFF01360B608636F514A7191FB70E9908791
                APIs
                • RtlAllocateHeap.NTDLL(00000008,0050B16C,?,?,005237E9,00000001,00000364,?,00000006,000000FF,?,0050E0EB,?,?,?,?), ref: 00523EA5
                Memory Dump Source
                • Source File: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 0000000A.00000002.4483011351.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4483064804.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484192182.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485039364.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485393293.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: AllocateHeap
                • String ID:
                • API String ID: 1279760036-0
                • Opcode ID: 7b430b993e9f5f435a4573eebac40da0ac61516eabb1913db70fe8b59f5ecd03
                • Instruction ID: 98ba0b58169991bd07cd2243132139cfff23fc69073f394c6ef2cd4e950673ee
                • Opcode Fuzzy Hash: 7b430b993e9f5f435a4573eebac40da0ac61516eabb1913db70fe8b59f5ecd03
                • Instruction Fuzzy Hash: 69F0E93150153666AF326B716C05B6B3F4EBF83360B174511FC04960C0DB74EE0C82E0
                APIs
                • RtlAllocateHeap.NTDLL(00000000,?,?,?,0050E0EB,?,?,?,?,?,00432D8D,0050B16C,?,?,0050B16C), ref: 005248D0
                Memory Dump Source
                • Source File: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 0000000A.00000002.4483011351.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4483064804.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484192182.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485039364.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485393293.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: AllocateHeap
                • String ID:
                • API String ID: 1279760036-0
                • Opcode ID: 009b2803bd800bf9c541f94ae47a065ce1f2d41aad139b04fd229c496c6d9441
                • Instruction ID: 1b429317c2f4d9898f846ec5960151d1f51618fbd23c2592c81ae1cabd533767
                • Opcode Fuzzy Hash: 009b2803bd800bf9c541f94ae47a065ce1f2d41aad139b04fd229c496c6d9441
                • Instruction Fuzzy Hash: 2DE065351626B256E6212675AD057AB3E4DFF837A0F150621AC14A60D0DB60DC509AE1
                Memory Dump Source
                • Source File: 0000000A.00000002.4490702914.0000000004FB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_4fb0000_RageMP131.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a91919518daa0df833e8a3398b8c59ddec543640694645f66ad4407575b80c45
                • Instruction ID: a0d6f881263ad5f41efa832fa819842f51b00a255e38ab194e796666aa4b7931
                • Opcode Fuzzy Hash: a91919518daa0df833e8a3398b8c59ddec543640694645f66ad4407575b80c45
                • Instruction Fuzzy Hash: 3D110CA75492902EF70387A15A509F73F79EAC733033088A7F481C6457DA996A4BA271
                APIs
                • std::_Lockit::_Lockit.LIBCPMT ref: 0049AEB3
                • std::_Lockit::_Lockit.LIBCPMT ref: 0049AED5
                • std::_Lockit::~_Lockit.LIBCPMT ref: 0049AEF5
                • std::_Lockit::~_Lockit.LIBCPMT ref: 0049AF1F
                • std::_Lockit::_Lockit.LIBCPMT ref: 0049AF8D
                • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0049AFD9
                • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0049AFF3
                • std::_Lockit::~_Lockit.LIBCPMT ref: 0049B088
                • std::_Facet_Register.LIBCPMT ref: 0049B095
                Strings
                Memory Dump Source
                • Source File: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 0000000A.00000002.4483011351.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4483064804.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484192182.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485039364.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485393293.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                • String ID: bad locale name
                • API String ID: 3375549084-1405518554
                • Opcode ID: 68216ce3bc69d52a7a802c54116f71c3b90133f8ea19c604a611106445964900
                • Instruction ID: 28ca33799d53fc0c0cfaa529572509b1fd599d11d558bee70b65712794e4df74
                • Opcode Fuzzy Hash: 68216ce3bc69d52a7a802c54116f71c3b90133f8ea19c604a611106445964900
                • Instruction Fuzzy Hash: A0617FB5D002459BEF20DFA8D889B9EBFB4BF54310F144069E815A7381EB74ED09CB96
                APIs
                • std::_Lockit::_Lockit.LIBCPMT ref: 004337E9
                • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00433835
                • __Getctype.LIBCPMT ref: 0043384E
                • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0043386A
                • std::_Lockit::~_Lockit.LIBCPMT ref: 004338FF
                Strings
                Memory Dump Source
                • Source File: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 0000000A.00000002.4483011351.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4483064804.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484192182.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485039364.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485393293.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                • String ID: 0:C$bad locale name
                • API String ID: 1840309910-3345558881
                • Opcode ID: 6c8b277a969f683e398eedf38784c3077d70f9096ad59c91777d6b1bab1261a6
                • Instruction ID: bf5337a2d8456d9a7b3cc25296a201f84bee19edd370540545fe3331f5bb3e90
                • Opcode Fuzzy Hash: 6c8b277a969f683e398eedf38784c3077d70f9096ad59c91777d6b1bab1261a6
                • Instruction Fuzzy Hash: 52518FF1D00249DBEF10DFA4D88579EFBB8BF54300F144169E814AB381E775AA48CB92
                APIs
                • _ValidateLocalCookies.LIBCMT ref: 005108B7
                • ___except_validate_context_record.LIBVCRUNTIME ref: 005108BF
                • _ValidateLocalCookies.LIBCMT ref: 00510948
                • __IsNonwritableInCurrentImage.LIBCMT ref: 00510973
                • _ValidateLocalCookies.LIBCMT ref: 005109C8
                Strings
                Memory Dump Source
                • Source File: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 0000000A.00000002.4483011351.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4483064804.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484192182.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485039364.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485393293.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                • String ID: CP$csm
                • API String ID: 1170836740-2911555543
                • Opcode ID: 2705f186eab5b10d366c780f1dc8077e49ef89d8806133cf58490e09d346e53e
                • Instruction ID: 5c209c8ff88538713b39aacd4b9f32d119ff755c893dfca957c088ff6b007773
                • Opcode Fuzzy Hash: 2705f186eab5b10d366c780f1dc8077e49ef89d8806133cf58490e09d346e53e
                • Instruction Fuzzy Hash: 4141A134A00209ABEF10DF68C894ADEBFB5BF44324F148155E9189B392DB71AEC5CB91
                APIs
                • std::_Lockit::_Lockit.LIBCPMT ref: 00499543
                • std::_Lockit::_Lockit.LIBCPMT ref: 00499566
                • std::_Lockit::~_Lockit.LIBCPMT ref: 00499586
                • std::_Facet_Register.LIBCPMT ref: 004995FB
                • std::_Lockit::~_Lockit.LIBCPMT ref: 00499613
                • Concurrency::cancel_current_task.LIBCPMT ref: 0049962B
                Memory Dump Source
                • Source File: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 0000000A.00000002.4483011351.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4483064804.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484192182.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485039364.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485393293.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                • String ID:
                • API String ID: 2081738530-0
                • Opcode ID: 935f1abd8dedf7632ba54043f91c00489b421e94b32fbae5dd907fbefc749e05
                • Instruction ID: 3614a086826523f349a425d331120b5fff2c5775198d55a6beab163c66469ade
                • Opcode Fuzzy Hash: 935f1abd8dedf7632ba54043f91c00489b421e94b32fbae5dd907fbefc749e05
                • Instruction Fuzzy Hash: F941DE72900219AFCF11DF58D884AAEBB74FF55320F14422EE845AB391EB74AE04CBD5
                APIs
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004360F2
                • ___std_exception_destroy.LIBVCRUNTIME ref: 0043617F
                • ___std_exception_copy.LIBVCRUNTIME ref: 00436248
                Strings
                • recursive_directory_iterator::operator++, xrefs: 004361CC
                Memory Dump Source
                • Source File: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 0000000A.00000002.4483011351.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4483064804.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484192182.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485039364.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485393293.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_destroy$___std_exception_copy
                • String ID: recursive_directory_iterator::operator++
                • API String ID: 1206660477-953255998
                • Opcode ID: e0fb7ccc28a3226894f5b38585f2f4ffc35b0bfff182273120be10f43cf45e8f
                • Instruction ID: 6619192cb6cb13d441e5431a3ac211069c79c714c18eecd698d3b9a810dc0cd4
                • Opcode Fuzzy Hash: e0fb7ccc28a3226894f5b38585f2f4ffc35b0bfff182273120be10f43cf45e8f
                • Instruction Fuzzy Hash: 35E158B09006059FCB18DF68C945B9EFBF9FF49300F10862EE41697781D778AA44CBA5
                APIs
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004386DE
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004386ED
                Strings
                Memory Dump Source
                • Source File: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 0000000A.00000002.4483011351.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4483064804.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484192182.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485039364.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485393293.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_destroy
                • String ID: at line $, column
                • API String ID: 4194217158-191570568
                • Opcode ID: e471e0a998357f3fa48addbdf422c73e34727f502e91d6f64e561929a658028f
                • Instruction ID: 5f3e4a12ec437e830faa44f1ae52748ae1eae63bb8a8ea15f8bc078d1696ab0e
                • Opcode Fuzzy Hash: e471e0a998357f3fa48addbdf422c73e34727f502e91d6f64e561929a658028f
                • Instruction Fuzzy Hash: 016125719002059BDB08CB68DD86B9EFBB1FF89304F14461EF415A77C2EB78AA848795
                APIs
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004A3946
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004A395F
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004A3A97
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004A3AB0
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004A3C16
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004A3C2F
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004A4479
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004A4492
                Strings
                Memory Dump Source
                • Source File: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 0000000A.00000002.4483011351.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4483064804.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484192182.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485039364.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485393293.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_destroy
                • String ID: value
                • API String ID: 4194217158-494360628
                • Opcode ID: 1b08dc98951d7f5790a1b094ad2d89e696f0962f9333d1608fd539f844dc7a00
                • Instruction ID: 4a1a45faa4979aa4ad64683741266724e854df4c82cb3c25f6892f2cc6feaecc
                • Opcode Fuzzy Hash: 1b08dc98951d7f5790a1b094ad2d89e696f0962f9333d1608fd539f844dc7a00
                • Instruction Fuzzy Hash: 6151D170C00248DBDF14DFA8CD89BDEBFB4BF56304F144259E455A7282D7786A88CB66
                APIs
                • ___std_exception_copy.LIBVCRUNTIME ref: 00433C0F
                Strings
                Memory Dump Source
                • Source File: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 0000000A.00000002.4483011351.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4483064804.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484192182.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485039364.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485393293.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_copy
                • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                • API String ID: 2659868963-1866435925
                • Opcode ID: b2d16b061b1de4e27a50339c30edc60289d9cd77f9fd77f360aa8cd00ae6e4bf
                • Instruction ID: d5909f071a6136875d10a3bbdf0e90f7cb5058d39c392dd0cc78b15cce36ca70
                • Opcode Fuzzy Hash: b2d16b061b1de4e27a50339c30edc60289d9cd77f9fd77f360aa8cd00ae6e4bf
                • Instruction Fuzzy Hash: 031105B29007086BC710DF59C806B9ABBD8BF49311F14892BFD58D7282F774E904CB95
                Strings
                • unordered_map/set too long, xrefs: 004A2F43
                Memory Dump Source
                • Source File: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 0000000A.00000002.4483011351.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4483064804.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484192182.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485039364.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485393293.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: unordered_map/set too long
                • API String ID: 0-306623848
                • Opcode ID: e47e15e7c7996866a8cef593b9a7aeb48dc17a61a2b3e6669089d2f9ba366923
                • Instruction ID: f8355d4db2d7a077ebac295686ef1b0a19316a718a0eae606bf4ee3106e8a93a
                • Opcode Fuzzy Hash: e47e15e7c7996866a8cef593b9a7aeb48dc17a61a2b3e6669089d2f9ba366923
                • Instruction Fuzzy Hash: DDE1E371A002059FCB18DF6CC984A6EBBA1FF5A310F14836AE819DB391D774ED51CB94
                APIs
                • ___std_exception_copy.LIBVCRUNTIME ref: 0043844D
                Strings
                Memory Dump Source
                • Source File: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 0000000A.00000002.4483011351.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4483064804.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484192182.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485039364.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485393293.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_copy
                • String ID: parse error$ror
                • API String ID: 2659868963-4201802366
                • Opcode ID: 0c2e619ea4ddbccf96e7439623da134e8ff527a64572386fe0adaca83156cd92
                • Instruction ID: 71245dc7c5200ccb9d5feb04f8a034911a6c2dbb69dca603ce88a810a63d919f
                • Opcode Fuzzy Hash: 0c2e619ea4ddbccf96e7439623da134e8ff527a64572386fe0adaca83156cd92
                • Instruction Fuzzy Hash: 92C1F4709007498FDB08CF68CD85BADFB71BF59304F24835DE4046B692EB78AA84CB95
                APIs
                • ___std_exception_destroy.LIBVCRUNTIME ref: 00438051
                • ___std_exception_destroy.LIBVCRUNTIME ref: 00438060
                Strings
                Memory Dump Source
                • Source File: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 0000000A.00000002.4483011351.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4483064804.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484192182.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485039364.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485393293.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_destroy
                • String ID: [json.exception.
                • API String ID: 4194217158-791563284
                • Opcode ID: ee293bf76807d2b4d2f121b8cf06325922f7af48a69cc143c8171278a94b6e82
                • Instruction ID: d1ce62d5abae90e2634bcb20a61b6de41888fd83abe4ff02112b5e1b14686f9a
                • Opcode Fuzzy Hash: ee293bf76807d2b4d2f121b8cf06325922f7af48a69cc143c8171278a94b6e82
                • Instruction Fuzzy Hash: F691D4719002089FDB18CF68CD85B9EFBB1FF49314F14425EE450AB692D7B4AA848795
                APIs
                • ___std_exception_copy.LIBVCRUNTIME ref: 00433C0F
                Strings
                Memory Dump Source
                • Source File: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 0000000A.00000002.4483011351.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4483064804.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484192182.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485039364.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485393293.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_copy
                • String ID: ios_base::badbit set$ios_base::failbit set
                • API String ID: 2659868963-1240500531
                • Opcode ID: 2a2068ffb0e0252bae891f637030c685ac8a0f0ef2becaf0656a31c46beada43
                • Instruction ID: 110e67317c22a718e353e223aea29a9baf5df9e7412186fe8e6698b0f87d9281
                • Opcode Fuzzy Hash: 2a2068ffb0e0252bae891f637030c685ac8a0f0ef2becaf0656a31c46beada43
                • Instruction Fuzzy Hash: 28411671900608ABC704DF59CC46BAEFBF8FF49310F14861AF954A7782E774AA40CBA5
                APIs
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004A4E29
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004A4E42
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004A594D
                • ___std_exception_destroy.LIBVCRUNTIME ref: 004A5966
                Strings
                Memory Dump Source
                • Source File: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 0000000A.00000002.4483011351.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4483064804.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484192182.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485039364.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485393293.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: ___std_exception_destroy
                • String ID: value
                • API String ID: 4194217158-494360628
                • Opcode ID: 7ce98c8171c851daeb649d2f84924367efab9f5f6d6f42e2a85f2ec329bb6b81
                • Instruction ID: 2f4644a41b30b767ef63ebfe309279af3947d703a2f95cb1e6974d810ca8874d
                • Opcode Fuzzy Hash: 7ce98c8171c851daeb649d2f84924367efab9f5f6d6f42e2a85f2ec329bb6b81
                • Instruction Fuzzy Hash: 8E51B1B0C00248DBDF14DFA4CD89BDEBFB4BF56304F144259E455AB282D7786A88CB56
                APIs
                • Concurrency::cancel_current_task.LIBCPMT ref: 004A99F1
                Strings
                • type must be boolean, but is , xrefs: 004A9AE2
                • type must be string, but is , xrefs: 004A9A58
                Memory Dump Source
                • Source File: 0000000A.00000002.4483064804.0000000000431000.00000040.00000001.01000000.00000006.sdmp, Offset: 00430000, based on PE: true
                • Associated: 0000000A.00000002.4483011351.0000000000430000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4483064804.0000000000563000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484192182.0000000000567000.00000004.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000057A000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000070E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.00000000007EA000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.0000000000825000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000082E000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4484253694.000000000083C000.00000040.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485039364.000000000083D000.00000080.00000001.01000000.00000006.sdmpDownload File
                • Associated: 0000000A.00000002.4485393293.00000000009F2000.00000040.00000001.01000000.00000006.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_10_2_430000_RageMP131.jbxd
                Yara matches
                Similarity
                • API ID: Concurrency::cancel_current_task
                • String ID: type must be boolean, but is $type must be string, but is
                • API String ID: 118556049-436076039
                • Opcode ID: 6c13dc530ba47eb6493e7812f2132e442f57bfe705df5b27be99a19aa3ac5094
                • Instruction ID: 8e076b49b9d2b40663101391539bb86dd6918c970e6fd0157adda575f1753b03
                • Opcode Fuzzy Hash: 6c13dc530ba47eb6493e7812f2132e442f57bfe705df5b27be99a19aa3ac5094
                • Instruction Fuzzy Hash: 463129B5904248AFCB04EB94D842B9FBBA8EB15304F14466EF415D7791EB38AE04C75A