Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe
Analysis ID:1435113
MD5:6bf87e7f53315e6a41de8e99b6702341
SHA1:125a7d887df3d2ab6f09e87d7c0ffc883eeea35b
SHA256:7cf9c3f092afee2ba38d660aa59e263b329ecc899e583660cd3b59fcd29f9a02
Tags:exe
Infos:

Detection

RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected RisePro Stealer
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject threads in other processes
Found stalling execution ending in API Sleep call
Hides threads from debuggers
PE file has nameless sections
Uses schtasks.exe or at.exe to add and modify task schedules
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found evasive API chain (date check)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe (PID: 5080 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe" MD5: 6BF87E7F53315E6A41DE8E99B6702341)
    • schtasks.exe (PID: 1012 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 5688 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5880 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • MPGPH131.exe (PID: 1440 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: 6BF87E7F53315E6A41DE8E99B6702341)
  • MPGPH131.exe (PID: 6552 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: 6BF87E7F53315E6A41DE8E99B6702341)
  • RageMP131.exe (PID: 2724 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: 6BF87E7F53315E6A41DE8E99B6702341)
  • RageMP131.exe (PID: 5516 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: 6BF87E7F53315E6A41DE8E99B6702341)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe PID: 5080JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    Process Memory Space: MPGPH131.exe PID: 1440JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
      Process Memory Space: MPGPH131.exe PID: 6552JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
        Process Memory Space: RageMP131.exe PID: 2724JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
          Process Memory Space: RageMP131.exe PID: 5516JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security

            System Summary

            barindex
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, ProcessId: 5080, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RageMP131
            Timestamp:05/02/24-06:16:16.523614
            SID:2046266
            Source Port:58709
            Destination Port:49707
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-06:16:21.991545
            SID:2046267
            Source Port:58709
            Destination Port:49707
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-06:18:31.640435
            SID:2046269
            Source Port:49706
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-06:16:16.500069
            SID:2046266
            Source Port:58709
            Destination Port:49706
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-06:18:31.640434
            SID:2046269
            Source Port:49707
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-06:16:10.960089
            SID:2049060
            Source Port:49705
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-06:18:35.093509
            SID:2046269
            Source Port:49721
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-06:16:18.088207
            SID:2046267
            Source Port:58709
            Destination Port:49705
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-06:16:11.105907
            SID:2046266
            Source Port:58709
            Destination Port:49705
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-06:16:21.976112
            SID:2046267
            Source Port:58709
            Destination Port:49706
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-06:17:56.478700
            SID:2046267
            Source Port:58709
            Destination Port:49721
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-06:16:32.277727
            SID:2046266
            Source Port:58709
            Destination Port:49721
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-06:18:31.734139
            SID:2046269
            Source Port:49716
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-06:18:31.624622
            SID:2046269
            Source Port:49705
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-06:17:43.913022
            SID:2046267
            Source Port:58709
            Destination Port:49716
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-06:16:26.984352
            SID:2046266
            Source Port:58709
            Destination Port:49716
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeAvira: detected
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeAvira: detection malicious, Label: HEUR/AGEN.1306558
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeAvira: detection malicious, Label: HEUR/AGEN.1306558
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeReversingLabs: Detection: 50%
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeVirustotal: Detection: 51%Perma Link
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeReversingLabs: Detection: 50%
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeVirustotal: Detection: 51%Perma Link
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeVirustotal: Detection: 51%Perma Link
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeReversingLabs: Detection: 50%
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.5:49708 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.5:49709 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.5:49710 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.5:49711 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.5:49712 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.5:49713 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.5:49723 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.5:49724 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.5:49725 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.5:49726 version: TLS 1.2
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_00092012 GetLastError,GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,0_2_00092012
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_00143B20 FindFirstFileA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,GetLastError,SetFileAttributesA,GetLastError,RemoveDirectoryA,GetLastError,GetLastError,std::_Throw_Cpp_error,std::_Throw_Cpp_error,CreateDirectoryA,std::_Throw_Cpp_error,std::_Throw_Cpp_error,0_2_00143B20
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_000F13F0 FindFirstFileA,FindNextFileA,GetLastError,FindClose,0_2_000F13F0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_000F1680 RegOpenKeyExA,RegQueryValueExA,RegCloseKey,SHGetFolderPathA,FindFirstFileA,FindNextFileA,FindClose,CreateDirectoryA,CreateDirectoryA,CreateDirectoryA,CopyFileA,CreateDirectoryA,CreateDirectoryA,CopyFileA,CopyFileA,CredEnumerateA,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,lstrlen,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,lstrlen,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,lstrlen,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,lstrlen,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,CreateDirectoryA,CreateDirectoryA,CreateDirectoryA,lstrlen,0_2_000F1680
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_00091F8C FindClose,FindFirstFileExW,GetLastError,0_2_00091F8C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00F01F8C FindClose,FindFirstFileExW,GetLastError,6_2_00F01F8C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00F01F8C FindClose,FindFirstFileExW,GetLastError,7_2_00F01F8C
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00801F8C FindClose,FindFirstFileExW,GetLastError,8_2_00801F8C

            Networking

            barindex
            Source: TrafficSnort IDS: 2049060 ET TROJAN RisePro TCP Heartbeat Packet 192.168.2.5:49705 -> 147.45.47.93:58709
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 147.45.47.93:58709 -> 192.168.2.5:49705
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.5:49705 -> 147.45.47.93:58709
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 147.45.47.93:58709 -> 192.168.2.5:49706
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 147.45.47.93:58709 -> 192.168.2.5:49707
            Source: TrafficSnort IDS: 2046267 ET TROJAN [ANY.RUN] RisePro TCP (External IP) 147.45.47.93:58709 -> 192.168.2.5:49705
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.5:49706 -> 147.45.47.93:58709
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.5:49707 -> 147.45.47.93:58709
            Source: TrafficSnort IDS: 2046267 ET TROJAN [ANY.RUN] RisePro TCP (External IP) 147.45.47.93:58709 -> 192.168.2.5:49706
            Source: TrafficSnort IDS: 2046267 ET TROJAN [ANY.RUN] RisePro TCP (External IP) 147.45.47.93:58709 -> 192.168.2.5:49707
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 147.45.47.93:58709 -> 192.168.2.5:49716
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.5:49716 -> 147.45.47.93:58709
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 147.45.47.93:58709 -> 192.168.2.5:49721
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.5:49721 -> 147.45.47.93:58709
            Source: TrafficSnort IDS: 2046267 ET TROJAN [ANY.RUN] RisePro TCP (External IP) 147.45.47.93:58709 -> 192.168.2.5:49716
            Source: TrafficSnort IDS: 2046267 ET TROJAN [ANY.RUN] RisePro TCP (External IP) 147.45.47.93:58709 -> 192.168.2.5:49721
            Source: global trafficTCP traffic: 147.45.47.93 ports 0,5,7,8,58709,9
            Source: global trafficTCP traffic: 192.168.2.5:49705 -> 147.45.47.93:58709
            Source: Joe Sandbox ViewIP Address: 34.117.186.192 34.117.186.192
            Source: Joe Sandbox ViewIP Address: 34.117.186.192 34.117.186.192
            Source: Joe Sandbox ViewIP Address: 147.45.47.93 147.45.47.93
            Source: Joe Sandbox ViewIP Address: 104.26.5.15 104.26.5.15
            Source: Joe Sandbox ViewASN Name: FREE-NET-ASFREEnetEU FREE-NET-ASFREEnetEU
            Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
            Source: unknownDNS query: name: ipinfo.io
            Source: unknownDNS query: name: ipinfo.io
            Source: unknownDNS query: name: ipinfo.io
            Source: unknownDNS query: name: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /widget/demo/191.96.150.225 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=191.96.150.225 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficHTTP traffic detected: GET /widget/demo/191.96.150.225 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /widget/demo/191.96.150.225 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=191.96.150.225 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=191.96.150.225 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficHTTP traffic detected: GET /widget/demo/191.96.150.225 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=191.96.150.225 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficHTTP traffic detected: GET /widget/demo/191.96.150.225 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=191.96.150.225 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_00125940 recv,WSAStartup,getaddrinfo,closesocket,socket,connect,closesocket,FreeAddrInfoW,WSACleanup,FreeAddrInfoW,0_2_00125940
            Source: global trafficHTTP traffic detected: GET /widget/demo/191.96.150.225 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=191.96.150.225 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficHTTP traffic detected: GET /widget/demo/191.96.150.225 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /widget/demo/191.96.150.225 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=191.96.150.225 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=191.96.150.225 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficHTTP traffic detected: GET /widget/demo/191.96.150.225 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=191.96.150.225 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficHTTP traffic detected: GET /widget/demo/191.96.150.225 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: ipinfo.io
            Source: global trafficHTTP traffic detected: GET /demo/home.php?s=191.96.150.225 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36Host: db-ip.com
            Source: global trafficDNS traffic detected: DNS query: ipinfo.io
            Source: global trafficDNS traffic detected: DNS query: db-ip.com
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, RageMP131.exe.0.dr, MPGPH131.exe.0.drString found in binary or memory: http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, RageMP131.exe.0.dr, MPGPH131.exe.0.drString found in binary or memory: http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, RageMP131.exe.0.dr, MPGPH131.exe.0.drString found in binary or memory: http://pki-ocsp.symauth.com0
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3549725655.00000000007D1000.00000040.00000001.01000000.00000005.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
            Source: RageMP131.exe, 0000000A.00000002.3551742424.0000000001B26000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/
            Source: RageMP131.exe, 00000008.00000002.3552009163.0000000001BC6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/6K
            Source: MPGPH131.exe, 00000006.00000002.3549743484.0000000000840000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/Gf
            Source: RageMP131.exe, 00000008.00000002.3552009163.0000000001BC6000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000A.00000002.3551742424.0000000001B26000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=191.96.150.225
            Source: RageMP131.exe, 00000008.00000002.3552009163.0000000001BBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=191.96.150.225(
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3551599762.0000000001361000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=191.96.150.2251
            Source: RageMP131.exe, 0000000A.00000002.3551742424.0000000001B26000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=191.96.150.225c
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3551599762.0000000001361000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000A.00000002.3551742424.0000000001B26000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=191.96.150.225le
            Source: RageMP131.exe, 0000000A.00000002.3551742424.0000000001B26000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=191.96.150.225leM
            Source: MPGPH131.exe, 00000007.00000002.3551704658.0000000001BC2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000003.2881018682.0000000001BC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=191.96.150.225sstD24
            Source: MPGPH131.exe, 00000007.00000002.3551704658.0000000001BC2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000003.2881018682.0000000001BC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=191.96.150.225t
            Source: MPGPH131.exe, 00000007.00000002.3551704658.0000000001BC2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000003.2881018682.0000000001BC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=191.96.150.225u
            Source: MPGPH131.exe, 00000006.00000002.3549743484.00000000007BD000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3551189307.0000000001B5B000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3552009163.0000000001BC6000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000A.00000002.3551742424.0000000001AA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com:443/demo/home.php?s=191.96.150.225
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3551599762.0000000001361000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com:443/demo/home.php?s=191.96.150.225P
            Source: RageMP131.exe, 0000000A.00000002.3551742424.0000000001B26000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3551599762.0000000001361000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3549743484.0000000000840000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3551704658.0000000001BC2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000003.2881018682.0000000001BC1000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3552009163.0000000001BC6000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000A.00000002.3551742424.0000000001B26000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/Mozilla/5.0
            Source: RageMP131.exe, 00000008.00000002.3552009163.0000000001B6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/N
            Source: MPGPH131.exe, 00000006.00000002.3549743484.00000000007BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/X
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3549725655.00000000007D1000.00000040.00000001.01000000.00000005.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3551599762.0000000001361000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3551599762.0000000001319000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3549743484.00000000007F9000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3551189307.0000000001B70000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3551189307.0000000001BB8000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000003.2881296394.0000000001BB8000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3552009163.0000000001BC6000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3552009163.0000000001B7B000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000A.00000002.3551742424.0000000001AE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/191.96.150.225
            Source: RageMP131.exe, 0000000A.00000002.3551742424.0000000001B26000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/191.96.150.225$
            Source: MPGPH131.exe, 00000006.00000002.3549743484.0000000000840000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/191.96.150.225Ly
            Source: MPGPH131.exe, 00000006.00000002.3549743484.00000000007BD000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000A.00000002.3551742424.0000000001AA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io:443/widget/demo/191.96.150.225
            Source: RageMP131.exe, 00000008.00000002.3552009163.0000000001BC6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io:443/widget/demo/191.96.150.225&
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3551599762.0000000001361000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io:443/widget/demo/191.96.150.2256
            Source: MPGPH131.exe, 00000007.00000002.3551189307.0000000001B5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io:443/widget/demo/191.96.150.225e
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3551599762.0000000001361000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.R
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3551599762.00000000012DE000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3549743484.00000000007BD000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3551189307.0000000001B37000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3552009163.0000000001B3E000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000A.00000002.3551742424.0000000001AA7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
            Source: MPGPH131.exe, 00000007.00000002.3551704658.0000000001BC2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro
            Source: MPGPH131.exe, 00000007.00000002.3551704658.0000000001BC2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3551189307.0000000001BAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_bot
            Source: MPGPH131.exe, 00000006.00000002.3549743484.0000000000840000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_botQ=
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3552227478.00000000013AA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000003.3012779154.00000000013A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_botrisepro
            Source: MPGPH131.exe, RageMP131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
            Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
            Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
            Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.5:49708 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.5:49709 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.5:49710 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.5:49711 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.5:49712 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.5:49713 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.5:49723 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.5:49724 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.5:49725 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.5:49726 version: TLS 1.2

            System Summary

            barindex
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeStatic PE information: section name:
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeStatic PE information: section name:
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeStatic PE information: section name:
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeStatic PE information: section name:
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeStatic PE information: section name:
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_001580800_2_00158080
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_001A40A00_2_001A40A0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_0019C8D00_2_0019C8D0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_001920C00_2_001920C0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_0009A9180_2_0009A918
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_001011300_2_00101130
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_0009C9500_2_0009C950
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_001A31600_2_001A3160
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_000971900_2_00097190
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_001A5A400_2_001A5A40
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_000ADA740_2_000ADA74
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_0019F2800_2_0019F280
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_001A4AE00_2_001A4AE0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_001503500_2_00150350
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_000A035F0_2_000A035F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_00144B900_2_00144B90
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_000B8BA00_2_000B8BA0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_000F0BA00_2_000F0BA0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_0008F5700_2_0008F570
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_000B25FE0_2_000B25FE
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_000B8E200_2_000B8E20
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_00101E400_2_00101E40
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_000F16800_2_000F1680
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_000B47AD0_2_000B47AD
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_0014CFC00_2_0014CFC0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_0014BFC00_2_0014BFC0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A06DA0_2_7F5A06DA
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A00000_2_7F5A0000
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00F071906_2_00F07190
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00F0C9506_2_00F0C950
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00F0A9186_2_00F0A918
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00F1DA746_2_00F1DA74
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00F28BA06_2_00F28BA0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00FC03506_2_00FC0350
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00F1035F6_2_00F1035F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00F225FE6_2_00F225FE
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00EFF5706_2_00EFF570
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00FBCFC06_2_00FBCFC0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00F247AD6_2_00F247AD
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_7F8C06DA6_2_7F8C06DA
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_7F8C00006_2_7F8C0000
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00F071907_2_00F07190
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00F0C9507_2_00F0C950
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00F0A9187_2_00F0A918
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00F1DA747_2_00F1DA74
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00F28BA07_2_00F28BA0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00FC03507_2_00FC0350
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00F1035F7_2_00F1035F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00F225FE7_2_00F225FE
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00EFF5707_2_00EFF570
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00FBCFC07_2_00FBCFC0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00F247AD7_2_00F247AD
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_7ECD06DA7_2_7ECD06DA
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_7ECD00007_2_7ECD0000
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_008071908_2_00807190
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_0080A9188_2_0080A918
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_0080C9508_2_0080C950
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_0081DA748_2_0081DA74
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00828BA08_2_00828BA0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_008C03508_2_008C0350
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_0081035F8_2_0081035F
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_007FF5708_2_007FF570
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_008225FE8_2_008225FE
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_008247AD8_2_008247AD
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_008BCFC08_2_008BCFC0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_7F0906DA8_2_7F0906DA
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_7F0900008_2_7F090000
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: String function: 0007ACE0 appears 40 times
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: String function: 00F04370 appears 48 times
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCrossDeviceSettingsHost.exeX vs SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeBinary or memory string: OriginalFilenameCrossDeviceSettingsHost.exeX vs SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeStatic PE information: Section: ZLIB complexity 0.999750239769821
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeStatic PE information: Section: ZLIB complexity 0.9934138808139535
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeStatic PE information: Section: ZLIB complexity 0.9931640625
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeStatic PE information: Section: ZLIB complexity 1.0006510416666667
            Source: RageMP131.exe.0.drStatic PE information: Section: ZLIB complexity 0.999750239769821
            Source: RageMP131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9934138808139535
            Source: RageMP131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9931640625
            Source: RageMP131.exe.0.drStatic PE information: Section: ZLIB complexity 1.0006510416666667
            Source: MPGPH131.exe.0.drStatic PE information: Section: ZLIB complexity 0.999750239769821
            Source: MPGPH131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9934138808139535
            Source: MPGPH131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9931640625
            Source: MPGPH131.exe.0.drStatic PE information: Section: ZLIB complexity 1.0006510416666667
            Source: classification engineClassification label: mal100.troj.evad.winEXE@11/5@3/3
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_00144B90 CopyFileA,GetLastError,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,Process32Next,CloseHandle,0_2_00144B90
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeFile created: C:\Users\user\AppData\Local\RageMP131Jump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5788:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5880:120:WilError_03
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeFile created: C:\Users\user\AppData\Local\Temp\rage131MP.tmpJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3549725655.00000000007D1000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3549725655.00000000007D1000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeVirustotal: Detection: 51%
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeReversingLabs: Detection: 50%
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: MPGPH131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: MPGPH131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: RageMP131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe"
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHESTJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHESTJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: webio.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: version.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wldp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: profapi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: webio.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: schannel.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: version.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wldp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: profapi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: webio.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: schannel.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: webio.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: webio.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winnsi.dllJump to behavior
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeStatic file information: File size 3219456 > 1048576
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x22b000

            Data Obfuscation

            barindex
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeUnpacked PE file: 0.2.SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe.60000.0.unpack Unknown_Section0:EW;Unknown_Section1:EW;Unknown_Section2:EW;Unknown_Section3:EW;Unknown_Section4:EW;.rsrc:R;Unknown_Section6:EW;.data:EW; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:W;Unknown_Section3:R;Unknown_Section4:R;.rsrc:R;Unknown_Section6:EW;.data:EW;
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeUnpacked PE file: 6.2.MPGPH131.exe.ed0000.0.unpack Unknown_Section0:EW;Unknown_Section1:EW;Unknown_Section2:EW;Unknown_Section3:EW;Unknown_Section4:EW;.rsrc:R;Unknown_Section6:EW;.data:EW; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:W;Unknown_Section3:R;Unknown_Section4:R;.rsrc:R;Unknown_Section6:EW;.data:EW;
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeUnpacked PE file: 7.2.MPGPH131.exe.ed0000.0.unpack Unknown_Section0:EW;Unknown_Section1:EW;Unknown_Section2:EW;Unknown_Section3:EW;Unknown_Section4:EW;.rsrc:R;Unknown_Section6:EW;.data:EW; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:W;Unknown_Section3:R;Unknown_Section4:R;.rsrc:R;Unknown_Section6:EW;.data:EW;
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeUnpacked PE file: 8.2.RageMP131.exe.7d0000.0.unpack Unknown_Section0:EW;Unknown_Section1:EW;Unknown_Section2:EW;Unknown_Section3:EW;Unknown_Section4:EW;.rsrc:R;Unknown_Section6:EW;.data:EW; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:W;Unknown_Section3:R;Unknown_Section4:R;.rsrc:R;Unknown_Section6:EW;.data:EW;
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeUnpacked PE file: 10.2.RageMP131.exe.7d0000.0.unpack Unknown_Section0:EW;Unknown_Section1:EW;Unknown_Section2:EW;Unknown_Section3:EW;Unknown_Section4:EW;.rsrc:R;Unknown_Section6:EW;.data:EW; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:W;Unknown_Section3:R;Unknown_Section4:R;.rsrc:R;Unknown_Section6:EW;.data:EW;
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_0012C630 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,0_2_0012C630
            Source: initial sampleStatic PE information: section where entry point is pointing to: .data
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeStatic PE information: section name:
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeStatic PE information: section name:
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeStatic PE information: section name:
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeStatic PE information: section name:
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeStatic PE information: section name:
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_00093F49 push ecx; ret 0_2_00093F5C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A0F50 push 7F5A0002h; ret 0_2_7F5A0F5F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A2750 push 7F5A0002h; ret 0_2_7F5A275F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A1F40 push 7F5A0002h; ret 0_2_7F5A1F4F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A1F70 push 7F5A0002h; ret 0_2_7F5A1F7F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A1760 push 7F5A0002h; ret 0_2_7F5A176F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A1F10 push 7F5A0002h; ret 0_2_7F5A1F1F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A1700 push 7F5A0002h; ret 0_2_7F5A170F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A1730 push 7F5A0002h; ret 0_2_7F5A173F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A0F20 push 7F5A0002h; ret 0_2_7F5A0F2F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A2720 push 7F5A0002h; ret 0_2_7F5A272F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A1FD0 push 7F5A0002h; ret 0_2_7F5A1FDF
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A17C0 push 7F5A0002h; ret 0_2_7F5A17CF
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A17F0 push 7F5A0002h; ret 0_2_7F5A17FF
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A0FE0 push 7F5A0002h; ret 0_2_7F5A0FEF
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A27E0 push 7F5A0002h; ret 0_2_7F5A27EF
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A1790 push 7F5A0002h; ret 0_2_7F5A179F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A0F80 push 7F5A0002h; ret 0_2_7F5A0F8F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A2780 push 7F5A0002h; ret 0_2_7F5A278F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A0FB0 push 7F5A0002h; ret 0_2_7F5A0FBF
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A27B0 push 7F5A0002h; ret 0_2_7F5A27BF
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A1FA0 push 7F5A0002h; ret 0_2_7F5A1FAF
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A1E50 push 7F5A0002h; ret 0_2_7F5A1E5F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A1640 push 7F5A0002h; ret 0_2_7F5A164F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A1670 push 7F5A0002h; ret 0_2_7F5A167F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A0E60 push 7F5A0002h; ret 0_2_7F5A0E6F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A2660 push 7F5A0002h; ret 0_2_7F5A266F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A1610 push 7F5A0002h; ret 0_2_7F5A161F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A0E00 push 7F5A0002h; ret 0_2_7F5A0E0F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A2600 push 7F5A0002h; ret 0_2_7F5A260F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A0E30 push 7F5A0002h; ret 0_2_7F5A0E3F
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeStatic PE information: section name: entropy: 7.999603691993064
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeStatic PE information: section name: entropy: 7.991172527649386
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeStatic PE information: section name: entropy: 7.81663229040033
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeStatic PE information: section name: entropy: 7.993404858996497
            Source: RageMP131.exe.0.drStatic PE information: section name: entropy: 7.999603691993064
            Source: RageMP131.exe.0.drStatic PE information: section name: entropy: 7.991172527649386
            Source: RageMP131.exe.0.drStatic PE information: section name: entropy: 7.81663229040033
            Source: RageMP131.exe.0.drStatic PE information: section name: entropy: 7.993404858996497
            Source: MPGPH131.exe.0.drStatic PE information: section name: entropy: 7.999603691993064
            Source: MPGPH131.exe.0.drStatic PE information: section name: entropy: 7.991172527649386
            Source: MPGPH131.exe.0.drStatic PE information: section name: entropy: 7.81663229040033
            Source: MPGPH131.exe.0.drStatic PE information: section name: entropy: 7.993404858996497
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeFile created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeStalling execution: Execution stalls by calling Sleep
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeStalling execution: Execution stalls by calling Sleepgraph_0-29360
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeStalling execution: Execution stalls by calling Sleepgraph_6-15246
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeWindow / User API: threadDelayed 727Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeWindow / User API: threadDelayed 7866Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 8742Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 8977Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 552Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 4479Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 3891Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 425Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 4886Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 3934Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 495Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-29359
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_6-15245
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_6-17743
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-29967
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe TID: 4296Thread sleep count: 727 > 30Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe TID: 4296Thread sleep count: 162 > 30Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe TID: 2468Thread sleep count: 101 > 30Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe TID: 2468Thread sleep time: -101000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe TID: 2232Thread sleep count: 347 > 30Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe TID: 2232Thread sleep time: -347000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe TID: 4296Thread sleep count: 40 > 30Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe TID: 2232Thread sleep count: 7866 > 30Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe TID: 2232Thread sleep time: -7866000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe TID: 4296Thread sleep count: 200 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1708Thread sleep count: 266 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6392Thread sleep count: 8742 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6392Thread sleep time: -8742000s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5864Thread sleep count: 125 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5864Thread sleep time: -125000s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1708Thread sleep count: 52 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1708Thread sleep count: 34 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1708Thread sleep count: 244 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6720Thread sleep count: 78 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1164Thread sleep count: 8977 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1164Thread sleep time: -8977000s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6156Thread sleep count: 77 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6156Thread sleep time: -77000s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6720Thread sleep count: 51 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6720Thread sleep count: 36 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 3092Thread sleep count: 552 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 3252Thread sleep count: 4479 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 3252Thread sleep time: -4479000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 368Thread sleep count: 3891 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 368Thread sleep time: -3891000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 3092Thread sleep count: 45 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 3092Thread sleep count: 425 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 3092Thread sleep time: -42925s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 5060Thread sleep count: 4886 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 5060Thread sleep time: -4886000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 1172Thread sleep count: 3934 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 1172Thread sleep time: -3934000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 5480Thread sleep count: 495 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 5480Thread sleep time: -49995s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_00092012 GetLastError,GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,0_2_00092012
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_00143B20 FindFirstFileA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,GetLastError,SetFileAttributesA,GetLastError,RemoveDirectoryA,GetLastError,GetLastError,std::_Throw_Cpp_error,std::_Throw_Cpp_error,CreateDirectoryA,std::_Throw_Cpp_error,std::_Throw_Cpp_error,0_2_00143B20
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_000F13F0 FindFirstFileA,FindNextFileA,GetLastError,FindClose,0_2_000F13F0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_000F1680 RegOpenKeyExA,RegQueryValueExA,RegCloseKey,SHGetFolderPathA,FindFirstFileA,FindNextFileA,FindClose,CreateDirectoryA,CreateDirectoryA,CreateDirectoryA,CopyFileA,CreateDirectoryA,CreateDirectoryA,CopyFileA,CopyFileA,CredEnumerateA,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,lstrlen,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,lstrlen,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,lstrlen,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,lstrlen,SHGetFolderPathA,GetPrivateProfileSectionNamesA,GetPrivateProfileStringA,CreateDirectoryA,CreateDirectoryA,CreateDirectoryA,lstrlen,0_2_000F1680
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_00091F8C FindClose,FindFirstFileExW,GetLastError,0_2_00091F8C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00F01F8C FindClose,FindFirstFileExW,GetLastError,6_2_00F01F8C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00F01F8C FindClose,FindFirstFileExW,GetLastError,7_2_00F01F8C
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00801F8C FindClose,FindFirstFileExW,GetLastError,8_2_00801F8C
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 3Windows 2012 Server Standard without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 11 Essential Server Solutions without Hyper-V
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: #Windows 10 Microsoft Hyper-V Server
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 8.1 Microsoft Hyper-V Server
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 2012 Server Standard without Hyper-V
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 8 Microsoft Hyper-V Server
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 3Windows 11 Server Enterprise without Hyper-V (full)
            Source: RageMP131.exe, 00000008.00000002.3552009163.0000000001B99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 5Windows 2012 Server Datacenter without Hyper-V (core)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 3Windows 2016 Server Standard without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 8.1 Server Standard without Hyper-V (core)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 3Windows 11 Server Enterprise without Hyper-V (core)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: (Windows 2012 R2 Microsoft Hyper-V Server
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 11 Microsoft Hyper-V Server
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 6Windows 2012 R2 Server Standard without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 2012 R2 Server Standard without Hyper-V
            Source: MPGPH131.exe, 00000006.00000003.2137786762.000000000082D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}E|
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 8 Server Datacenter without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 10 Server Datacenter without Hyper-V (core)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 0Windows 8 Server Standard without Hyper-V (core)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 6Windows 8.1 Essential Server Solutions without Hyper-V
            Source: MPGPH131.exe, 00000007.00000002.3551189307.0000000001B62000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000+
            Source: RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: vmware
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 8 Server Standard without Hyper-V
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 4Windows 8 Essential Server Solutions without Hyper-V
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 5Windows 2012 Server Datacenter without Hyper-V (full)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 2016 Essential Server Solutions without Hyper-V
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 8Windows 2012 R2 Server Enterprise without Hyper-V (full)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3551599762.0000000001347000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}#$_
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 5Windows 2016 Server Datacenter without Hyper-V (full)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 2Windows 8 Server Enterprise without Hyper-V (core)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: "Windows 8 Microsoft Hyper-V Server
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 4Windows 8.1 Server Datacenter without Hyper-V (full)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 3Windows 11 Server Datacenter without Hyper-V (full)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 10 Server Standard without Hyper-V
            Source: RageMP131.exe, 0000000A.00000003.2295286562.0000000001B15000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 2012 R2 Microsoft Hyper-V Server
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 5Windows 2012 Server Enterprise without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 2012 R2 Server Enterprise without Hyper-V (full)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 2012 R2 Server Datacenter without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 11 Server Standard without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 8.1 Essential Server Solutions without Hyper-V
            Source: MPGPH131.exe, 00000006.00000002.3549743484.000000000081B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ~\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000g}
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3551599762.000000000133B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000X
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 2012 R2 Server Standard without Hyper-V (core)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Hyper-V (guest)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 2012 Essential Server Solutions without Hyper-V
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 10 Microsoft Hyper-V Server
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 2012 R2 Server Datacenter without Hyper-V (full)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: ~VirtualMachineTypes
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: ]DLL_Loader_VirtualMachine
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 2016 Microsoft Hyper-V Server
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: DLL_Loader_Marker]DLL_Loader_VirtualMachineZDLL_Loader_Reloc_Unit
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: /Windows 2012 R2 Server Standard without Hyper-V
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 11 Server Standard without Hyper-V
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: )Windows 8 Server Standard without Hyper-V
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 11 Server Enterprise without Hyper-V (full)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 5Windows 2016 Server Datacenter without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 11 Server Datacenter without Hyper-V (full)
            Source: RageMP131.exe, 0000000A.00000002.3551742424.0000000001AFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}7
            Source: RageMP131.exe, 00000008.00000002.3552009163.0000000001B6D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000T
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 5Windows 2016 Server Enterprise without Hyper-V (core)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: %Windows 2012 Microsoft Hyper-V Server
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Hyper-V
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: $Windows 8.1 Microsoft Hyper-V Server
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: ,Windows 2012 Server Standard without Hyper-V
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 3Windows 10 Server Datacenter without Hyper-V (full)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 2012 Microsoft Hyper-V Server
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 2012 Server Enterprise without Hyper-V (core)
            Source: MPGPH131.exe, 00000007.00000002.3551189307.0000000001B8F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 8Windows 2012 R2 Server Datacenter without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 10 Essential Server Solutions without Hyper-V
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 8 Essential Server Solutions without Hyper-V
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3551599762.0000000001361000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3551599762.000000000133B000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3549743484.0000000000840000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3549743484.000000000081B000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3551704658.0000000001BC2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3551189307.0000000001B8F000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000003.2881018682.0000000001BC1000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3552009163.0000000001BC6000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000A.00000002.3551742424.0000000001AFF000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000A.00000002.3551742424.0000000001B26000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 8Windows 2012 R2 Server Datacenter without Hyper-V (full)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 8.1 Server Enterprise without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 10 Server Standard without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 2012 R2 Server Enterprise without Hyper-V (core)
            Source: RageMP131.exe, 0000000A.00000003.2295286562.0000000001B13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 7Windows 2012 Essential Server Solutions without Hyper-V
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 8 Server Enterprise without Hyper-V (full)
            Source: RageMP131.exe, 0000000A.00000002.3551742424.0000000001AFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}/
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 2016 Server Enterprise without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 2016 Server Datacenter without Hyper-V (full)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 8.1 Server Datacenter without Hyper-V (full)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: %Windows 2016 Microsoft Hyper-V Server
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 5Windows 2012 Server Enterprise without Hyper-V (full)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 3Windows 10 Server Enterprise without Hyper-V (core)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 3Windows 11 Server Datacenter without Hyper-V (core)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 7Windows 2016 Essential Server Solutions without Hyper-V
            Source: MPGPH131.exe, 00000007.00000003.2137471360.0000000001BA5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}d
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: +Windows 8.1 Server Standard without Hyper-V
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 2016 Server Standard without Hyper-V
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 3Windows 10 Server Datacenter without Hyper-V (core)
            Source: RageMP131.exe, 00000008.00000003.2242313224.0000000001BAD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}Z
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 11 Server Enterprise without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 11 Server Datacenter without Hyper-V (core)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 4Windows 8.1 Server Enterprise without Hyper-V (full)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 5Windows 2016 Server Enterprise without Hyper-V (full)
            Source: RageMP131.exe, 00000008.00000003.2242313224.0000000001BAD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}:;
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 2Windows 8 Server Datacenter without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 10 Server Enterprise without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 10 Server Datacenter without Hyper-V (full)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3551599762.0000000001347000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Via W
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: :Windows 2012 R2 Essential Server Solutions without Hyper-V
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 5Windows 11 Essential Server Solutions without Hyper-V
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 2016 Server Standard without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 8 Server Standard without Hyper-V (core)
            Source: RageMP131.exe, 00000008.00000002.3552009163.0000000001BAB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b};3
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 5Windows 10 Essential Server Solutions without Hyper-V
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 8Windows 2012 R2 Server Enterprise without Hyper-V (core)
            Source: RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: xVBoxService.exe
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 2012 Server Datacenter without Hyper-V (core)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 3Windows 10 Server Enterprise without Hyper-V (full)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 8.1 Server Enterprise without Hyper-V (full)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 8 Server Enterprise without Hyper-V (core)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: *Windows 11 Server Standard without Hyper-V
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 2012 R2 Essential Server Solutions without Hyper-V
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: ,Windows 2016 Server Standard without Hyper-V
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 2012 Server Standard without Hyper-V (core)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3551599762.000000000133B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sik&ven_vmware&prod_vidi&1656f219&0&000000#{07f-11d0-94f2-00a0c91e
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 8.1 Server Datacenter without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 8 Server Datacenter without Hyper-V (full)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 2016 Server Datacenter without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 2016 Server Enterprise without Hyper-V (full)
            Source: RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: VBoxService.exe
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 8.1 Server Standard without Hyper-V
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3551599762.0000000001361000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW[
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: *Windows 10 Server Standard without Hyper-V
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 1Windows 11 Server Standard without Hyper-V (core)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 1Windows 10 Server Standard without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 2012 Server Enterprise without Hyper-V (full)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 2012 Server Datacenter without Hyper-V (full)
            Source: RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: VMWare
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 4Windows 8.1 Server Enterprise without Hyper-V (core)
            Source: MPGPH131.exe, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Windows 10 Server Enterprise without Hyper-V (full)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 2Windows 8.1 Server Standard without Hyper-V (core)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 2Windows 8 Server Datacenter without Hyper-V (full)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 4Windows 8.1 Server Datacenter without Hyper-V (core)
            Source: RageMP131.exe, 0000000A.00000002.3551742424.0000000001AA7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: 2Windows 8 Server Enterprise without Hyper-V (full)
            Source: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3550171437.0000000000977000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: #Windows 11 Microsoft Hyper-V Server

            Anti Debugging

            barindex
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_00098A54 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00098A54
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_0012C630 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,0_2_0012C630
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_000F1680 mov eax, dword ptr fs:[00000030h]0_2_000F1680
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_00146E20 GetLastError,GetModuleHandleA,GetProcAddress,GetProcessHeap,RtlAllocateHeap,HeapFree,RtlAllocateHeap,HeapFree,0_2_00146E20
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_00098A54 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00098A54
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_0009450D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0009450D
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00F08A54 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00F08A54
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00F0450D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_00F0450D
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00F08A54 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00F08A54
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00F0450D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_00F0450D
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00808A54 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00808A54
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_0080450D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_0080450D

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_0012C630 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,0_2_0012C630
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00F9C630 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,6_2_00F9C630
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00F9C630 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,7_2_00F9C630
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_0089C630 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,8_2_0089C630
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: EnumSystemLocalesW,0_2_000AB1A3
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: GetLocaleInfoW,0_2_000B31B8
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_000B32E1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,0_2_000B2B48
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: GetLocaleInfoW,0_2_000B33E7
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_000B34BD
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: GetLocaleInfoW,0_2_000B2D4D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: EnumSystemLocalesW,0_2_000B2DF4
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: EnumSystemLocalesW,0_2_000B2E3F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: EnumSystemLocalesW,0_2_000B2EDA
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: GetLocaleInfoW,0_2_000AB726
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_000B2F65
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,6_2_00F231B8
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,6_2_00F1B1A3
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,6_2_00F232E1
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,6_2_00F233E7
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,6_2_00F22B48
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,6_2_00F234BD
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,6_2_00F22DF4
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,6_2_00F22D4D
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,6_2_00F22EDA
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,6_2_00F22E3F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,6_2_00F22F65
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,6_2_00F1B726
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,7_2_00F231B8
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,7_2_00F1B1A3
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,7_2_00F232E1
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,7_2_00F233E7
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,7_2_00F22B48
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,7_2_00F234BD
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,7_2_00F22DF4
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,7_2_00F22D4D
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,7_2_00F22EDA
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,7_2_00F22E3F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,7_2_00F22F65
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,7_2_00F1B726
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: EnumSystemLocalesW,8_2_0081B1A3
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: GetLocaleInfoW,8_2_008231B8
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,8_2_008232E1
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: GetLocaleInfoW,8_2_008233E7
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,8_2_00822B48
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,8_2_008234BD
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: EnumSystemLocalesW,8_2_00822DF4
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: GetLocaleInfoW,8_2_00822D4D
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: EnumSystemLocalesW,8_2_00822EDA
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: EnumSystemLocalesW,8_2_00822E3F
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: GetLocaleInfoW,8_2_0081B726
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,8_2_00822F65
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_0009360D GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,GetSystemTimeAsFileTime,0_2_0009360D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeCode function: 0_2_7F5A1AC0 GetUserNameA,0_2_7F5A1AC0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe PID: 5080, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 1440, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 6552, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 2724, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 5516, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe PID: 5080, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 1440, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 6552, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 2724, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 5516, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Native API
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            OS Credential Dumping1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            2
            Ingress Tool Transfer
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts2
            Command and Scripting Interpreter
            1
            Scheduled Task/Job
            11
            Process Injection
            3
            Obfuscated Files or Information
            LSASS Memory1
            Account Discovery
            Remote Desktop ProtocolData from Removable Media11
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts1
            Scheduled Task/Job
            1
            Registry Run Keys / Startup Folder
            1
            Scheduled Task/Job
            12
            Software Packing
            Security Account Manager1
            File and Directory Discovery
            SMB/Windows Admin SharesData from Network Shared Drive1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            Registry Run Keys / Startup Folder
            1
            DLL Side-Loading
            NTDS23
            System Information Discovery
            Distributed Component Object ModelInput Capture2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Masquerading
            LSA Secrets1
            Query Registry
            SSHKeylogging13
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
            Virtualization/Sandbox Evasion
            Cached Domain Credentials221
            Security Software Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
            Process Injection
            DCSync11
            Virtualization/Sandbox Evasion
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
            Process Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
            Application Window Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
            System Owner/User Discovery
            Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
            System Network Configuration Discovery
            Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1435113 Sample: SecuriteInfo.com.Win32.PWSX... Startdate: 02/05/2024 Architecture: WINDOWS Score: 100 31 ipinfo.io 2->31 33 db-ip.com 2->33 41 Snort IDS alert for network traffic 2->41 43 Antivirus / Scanner detection for submitted sample 2->43 45 Multi AV Scanner detection for submitted file 2->45 47 3 other signatures 2->47 8 SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe 1 9 2->8         started        13 MPGPH131.exe 2 2->13         started        15 RageMP131.exe 2 2->15         started        17 2 other processes 2->17 signatures3 process4 dnsIp5 35 147.45.47.93, 49705, 49706, 49707 FREE-NET-ASFREEnetEU Russian Federation 8->35 37 ipinfo.io 34.117.186.192, 443, 49708, 49710 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 8->37 39 db-ip.com 104.26.5.15, 443, 49709, 49712 CLOUDFLARENETUS United States 8->39 27 C:\Users\user\AppData\Local\...\RageMP131.exe, PE32 8->27 dropped 29 C:\ProgramData\MPGPH131\MPGPH131.exe, PE32 8->29 dropped 49 Detected unpacking (changes PE section rights) 8->49 51 Found stalling execution ending in API Sleep call 8->51 53 Contains functionality to inject threads in other processes 8->53 55 Uses schtasks.exe or at.exe to add and modify task schedules 8->55 19 schtasks.exe 1 8->19         started        21 schtasks.exe 1 8->21         started        57 Antivirus detection for dropped file 13->57 59 Multi AV Scanner detection for dropped file 13->59 61 Hides threads from debuggers 13->61 file6 signatures7 process8 process9 23 conhost.exe 19->23         started        25 conhost.exe 21->25         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe51%VirustotalBrowse
            SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe50%ReversingLabsWin32.Trojan.Privateloader
            SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe100%AviraHEUR/AGEN.1306558
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe100%AviraHEUR/AGEN.1306558
            C:\ProgramData\MPGPH131\MPGPH131.exe100%AviraHEUR/AGEN.1306558
            C:\ProgramData\MPGPH131\MPGPH131.exe50%ReversingLabsWin32.Trojan.Privateloader
            C:\ProgramData\MPGPH131\MPGPH131.exe51%VirustotalBrowse
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe50%ReversingLabsWin32.Trojan.Privateloader
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe51%VirustotalBrowse
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://pki-ocsp.symauth.com00%URL Reputationsafe
            https://t.R0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            ipinfo.io
            34.117.186.192
            truefalse
              high
              db-ip.com
              104.26.5.15
              truefalse
                high
                NameMaliciousAntivirus DetectionReputation
                https://db-ip.com/demo/home.php?s=191.96.150.225false
                  high
                  https://ipinfo.io/widget/demo/191.96.150.225false
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://ipinfo.io/XMPGPH131.exe, 00000006.00000002.3549743484.00000000007BD000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://db-ip.com/demo/home.php?s=191.96.150.225sstD24MPGPH131.exe, 00000007.00000002.3551704658.0000000001BC2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000003.2881018682.0000000001BC1000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://db-ip.com/demo/home.php?s=191.96.150.225tMPGPH131.exe, 00000007.00000002.3551704658.0000000001BC2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000003.2881018682.0000000001BC1000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://db-ip.com/demo/home.php?s=191.96.150.225uMPGPH131.exe, 00000007.00000002.3551704658.0000000001BC2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000003.2881018682.0000000001BC1000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, RageMP131.exe.0.dr, MPGPH131.exe.0.drfalse
                              high
                              https://db-ip.com/RageMP131.exe, 0000000A.00000002.3551742424.0000000001B26000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://db-ip.com/demo/home.php?s=191.96.150.2251SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3551599762.0000000001361000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dllSecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3549725655.00000000007D1000.00000040.00000001.01000000.00000005.sdmpfalse
                                    high
                                    https://db-ip.com:443/demo/home.php?s=191.96.150.225PSecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3551599762.0000000001361000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://t.me/RiseProSUPPORTSecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3551599762.00000000012DE000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3549743484.00000000007BD000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3551189307.0000000001B37000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3552009163.0000000001B3E000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000A.00000002.3551742424.0000000001AA7000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.crSecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, RageMP131.exe.0.dr, MPGPH131.exe.0.drfalse
                                          high
                                          https://ipinfo.io:443/widget/demo/191.96.150.2256SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3551599762.0000000001361000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://ipinfo.io/NRageMP131.exe, 00000008.00000002.3552009163.0000000001B6D000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://t.me/risepro_botQ=MPGPH131.exe, 00000006.00000002.3549743484.0000000000840000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://ipinfo.io/widget/demo/191.96.150.225LyMPGPH131.exe, 00000006.00000002.3549743484.0000000000840000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://ipinfo.io:443/widget/demo/191.96.150.225MPGPH131.exe, 00000006.00000002.3549743484.00000000007BD000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000A.00000002.3551742424.0000000001AA7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://db-ip.com/GfMPGPH131.exe, 00000006.00000002.3549743484.0000000000840000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://ipinfo.io/Mozilla/5.0SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3551599762.0000000001361000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3549743484.0000000000840000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3551704658.0000000001BC2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000003.2881018682.0000000001BC1000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3552009163.0000000001BC6000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000A.00000002.3551742424.0000000001B26000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://t.me/riseproMPGPH131.exe, 00000007.00000002.3551704658.0000000001BC2000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://t.RSecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3551599762.0000000001361000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://t.me/risepro_botMPGPH131.exe, 00000007.00000002.3551704658.0000000001BC2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3551189307.0000000001BAD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://db-ip.com/demo/home.php?s=191.96.150.225leSecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3551599762.0000000001361000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000A.00000002.3551742424.0000000001B26000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://ipinfo.io:443/widget/demo/191.96.150.225&RageMP131.exe, 00000008.00000002.3552009163.0000000001BC6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://db-ip.com/6KRageMP131.exe, 00000008.00000002.3552009163.0000000001BC6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://ipinfo.io/RageMP131.exe, 0000000A.00000002.3551742424.0000000001B26000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://pki-ocsp.symauth.com0SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, RageMP131.exe.0.dr, MPGPH131.exe.0.drfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    https://ipinfo.io:443/widget/demo/191.96.150.225eMPGPH131.exe, 00000007.00000002.3551189307.0000000001B5B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://www.maxmind.com/en/locate-my-ip-addressMPGPH131.exe, RageMP131.exefalse
                                                                        high
                                                                        https://ipinfo.io/widget/demo/191.96.150.225$RageMP131.exe, 0000000A.00000002.3551742424.0000000001B26000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://www.winimage.com/zLibDllSecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, RageMP131.exe, 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 0000000A.00000002.3549725655.00000000007D1000.00000040.00000001.01000000.00000005.sdmpfalse
                                                                            high
                                                                            https://db-ip.com/demo/home.php?s=191.96.150.225(RageMP131.exe, 00000008.00000002.3552009163.0000000001BBC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://db-ip.com:443/demo/home.php?s=191.96.150.225MPGPH131.exe, 00000006.00000002.3549743484.00000000007BD000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3551189307.0000000001B5B000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3552009163.0000000001BC6000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000A.00000002.3551742424.0000000001AA7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://t.me/risepro_botriseproSecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000002.3552227478.00000000013AA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe, 00000000.00000003.3012779154.00000000013A5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://db-ip.com/demo/home.php?s=191.96.150.225leMRageMP131.exe, 0000000A.00000002.3551742424.0000000001B26000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://db-ip.com/demo/home.php?s=191.96.150.225cRageMP131.exe, 0000000A.00000002.3551742424.0000000001B26000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      • No. of IPs < 25%
                                                                                      • 25% < No. of IPs < 50%
                                                                                      • 50% < No. of IPs < 75%
                                                                                      • 75% < No. of IPs
                                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                                      34.117.186.192
                                                                                      ipinfo.ioUnited States
                                                                                      139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
                                                                                      147.45.47.93
                                                                                      unknownRussian Federation
                                                                                      2895FREE-NET-ASFREEnetEUtrue
                                                                                      104.26.5.15
                                                                                      db-ip.comUnited States
                                                                                      13335CLOUDFLARENETUSfalse
                                                                                      Joe Sandbox version:40.0.0 Tourmaline
                                                                                      Analysis ID:1435113
                                                                                      Start date and time:2024-05-02 06:15:15 +02:00
                                                                                      Joe Sandbox product:CloudBasic
                                                                                      Overall analysis duration:0h 8m 31s
                                                                                      Hypervisor based Inspection enabled:false
                                                                                      Report type:full
                                                                                      Cookbook file name:default.jbs
                                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                      Number of analysed new started processes analysed:12
                                                                                      Number of new started drivers analysed:0
                                                                                      Number of existing processes analysed:0
                                                                                      Number of existing drivers analysed:0
                                                                                      Number of injected processes analysed:0
                                                                                      Technologies:
                                                                                      • HCA enabled
                                                                                      • EGA enabled
                                                                                      • AMSI enabled
                                                                                      Analysis Mode:default
                                                                                      Analysis stop reason:Timeout
                                                                                      Sample name:SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe
                                                                                      Detection:MAL
                                                                                      Classification:mal100.troj.evad.winEXE@11/5@3/3
                                                                                      EGA Information:
                                                                                      • Successful, ratio: 100%
                                                                                      HCA Information:Failed
                                                                                      Cookbook Comments:
                                                                                      • Found application associated with file extension: .exe
                                                                                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                      TimeTypeDescription
                                                                                      06:16:11Task SchedulerRun new task: MPGPH131 HR path: C:\ProgramData\MPGPH131\MPGPH131.exe
                                                                                      06:16:11Task SchedulerRun new task: MPGPH131 LG path: C:\ProgramData\MPGPH131\MPGPH131.exe
                                                                                      06:16:12AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                                                                      06:16:20AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                                                                      06:16:43API Interceptor1132289x Sleep call for process: SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe modified
                                                                                      06:16:49API Interceptor1685074x Sleep call for process: MPGPH131.exe modified
                                                                                      06:16:57API Interceptor1316932x Sleep call for process: RageMP131.exe modified
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      34.117.186.192SecuriteInfo.com.Win32.Evo-gen.24318.16217.exeGet hashmaliciousUnknownBrowse
                                                                                      • ipinfo.io/json
                                                                                      SecuriteInfo.com.Win32.Evo-gen.28489.31883.exeGet hashmaliciousUnknownBrowse
                                                                                      • ipinfo.io/json
                                                                                      Raptor.HardwareService.Setup 1.msiGet hashmaliciousUnknownBrowse
                                                                                      • ipinfo.io/ip
                                                                                      Conferma_Pdf_Editor.exeGet hashmaliciousPlanet StealerBrowse
                                                                                      • ipinfo.io/
                                                                                      Conferma_Pdf_Editor.exeGet hashmaliciousPlanet StealerBrowse
                                                                                      • ipinfo.io/
                                                                                      w.shGet hashmaliciousXmrigBrowse
                                                                                      • /ip
                                                                                      Raptor.HardwareService.Setup_2.3.6.0.msiGet hashmaliciousUnknownBrowse
                                                                                      • ipinfo.io/ip
                                                                                      Raptor.HardwareService.Setup_2.3.6.0.msiGet hashmaliciousUnknownBrowse
                                                                                      • ipinfo.io/ip
                                                                                      uUsgzQ3DoW.exeGet hashmaliciousRedLineBrowse
                                                                                      • ipinfo.io/ip
                                                                                      8BZBgbeCcz.exeGet hashmaliciousRedLineBrowse
                                                                                      • ipinfo.io/ip
                                                                                      147.45.47.93file.exeGet hashmaliciousRisePro StealerBrowse
                                                                                        SecuriteInfo.com.Win32.PWSX-gen.2624.6335.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          tZvjMg3Hw9.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro Stealer, Vidar, zgRATBrowse
                                                                                            2zdult23rz.exeGet hashmaliciousRisePro StealerBrowse
                                                                                              file.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                WlCIinu0yp.exeGet hashmaliciousLummaC Stealer, PureLog Stealer, RedLine, RisePro Stealer, Socks5Systemz, Vidar, zgRATBrowse
                                                                                                  file.exeGet hashmaliciousLummaC, GCleaner, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLineBrowse
                                                                                                    file.exeGet hashmaliciousLummaC, PureLog Stealer, RedLine, RisePro Stealer, Vidar, zgRATBrowse
                                                                                                      SecuriteInfo.com.Win32.TrojanX-gen.3413.25873.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                        file.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                          104.26.5.15SecuriteInfo.com.Win64.Evo-gen.17494.7440.exeGet hashmaliciousUnknownBrowse
                                                                                                          • api.db-ip.com/v2/free/127.0.0.1
                                                                                                          Nemty.exeGet hashmaliciousNemtyBrowse
                                                                                                          • api.db-ip.com/v2/free/84.17.52.2/countryName
                                                                                                          227.exeGet hashmaliciousNemtyBrowse
                                                                                                          • api.db-ip.com/v2/free/102.129.143.40/countryName
                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                          ipinfo.iofile.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                          • 34.117.186.192
                                                                                                          831107010C8578AD95A12C5498B03755EAC398B5BBC0D.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                          • 34.117.186.192
                                                                                                          SecuriteInfo.com.Win32.PWSX-gen.2624.6335.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                          • 34.117.186.192
                                                                                                          tZvjMg3Hw9.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro Stealer, Vidar, zgRATBrowse
                                                                                                          • 34.117.186.192
                                                                                                          2zdult23rz.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                          • 34.117.186.192
                                                                                                          MegaUniversesMQ.exeGet hashmaliciousUnknownBrowse
                                                                                                          • 34.117.186.192
                                                                                                          file.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                          • 34.117.186.192
                                                                                                          MegaUniversesMQ.exeGet hashmaliciousUnknownBrowse
                                                                                                          • 34.117.186.192
                                                                                                          file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                                                                                                          • 34.117.186.192
                                                                                                          WlCIinu0yp.exeGet hashmaliciousLummaC Stealer, PureLog Stealer, RedLine, RisePro Stealer, Socks5Systemz, Vidar, zgRATBrowse
                                                                                                          • 34.117.186.192
                                                                                                          db-ip.comfile.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                          • 172.67.75.166
                                                                                                          831107010C8578AD95A12C5498B03755EAC398B5BBC0D.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                          • 104.26.5.15
                                                                                                          SecuriteInfo.com.Win32.PWSX-gen.2624.6335.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                          • 104.26.5.15
                                                                                                          tZvjMg3Hw9.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro Stealer, Vidar, zgRATBrowse
                                                                                                          • 172.67.75.166
                                                                                                          2zdult23rz.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                          • 104.26.4.15
                                                                                                          file.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                          • 104.26.5.15
                                                                                                          file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                                                                                                          • 104.26.5.15
                                                                                                          WlCIinu0yp.exeGet hashmaliciousLummaC Stealer, PureLog Stealer, RedLine, RisePro Stealer, Socks5Systemz, Vidar, zgRATBrowse
                                                                                                          • 104.26.4.15
                                                                                                          file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                                                                                                          • 104.26.4.15
                                                                                                          file.exeGet hashmaliciousLummaC, PureLog Stealer, RedLine, RisePro Stealer, Vidar, zgRATBrowse
                                                                                                          • 104.26.4.15
                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                          GOOGLE-AS-APGoogleAsiaPacificPteLtdSGhttps://herozheng.com/Get hashmaliciousUnknownBrowse
                                                                                                          • 34.117.152.183
                                                                                                          file.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                          • 34.117.186.192
                                                                                                          https://wywljs.com/Get hashmaliciousUnknownBrowse
                                                                                                          • 34.117.152.183
                                                                                                          https://xdywna.com/Get hashmaliciousUnknownBrowse
                                                                                                          • 34.117.152.183
                                                                                                          831107010C8578AD95A12C5498B03755EAC398B5BBC0D.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                          • 34.117.186.192
                                                                                                          SecuriteInfo.com.Win32.PWSX-gen.2624.6335.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                          • 34.117.186.192
                                                                                                          tZvjMg3Hw9.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro Stealer, Vidar, zgRATBrowse
                                                                                                          • 34.117.186.192
                                                                                                          2zdult23rz.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                          • 34.117.186.192
                                                                                                          MegaUniversesMQ.exeGet hashmaliciousUnknownBrowse
                                                                                                          • 34.117.186.192
                                                                                                          file.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                          • 34.117.186.192
                                                                                                          FREE-NET-ASFREEnetEUfile.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                          • 147.45.47.93
                                                                                                          SecuriteInfo.com.Win32.PWSX-gen.2624.6335.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                          • 147.45.47.93
                                                                                                          Iauncher.exeGet hashmaliciousRedLineBrowse
                                                                                                          • 147.45.47.65
                                                                                                          Iauncher.exeGet hashmaliciousRedLineBrowse
                                                                                                          • 147.45.47.65
                                                                                                          tZvjMg3Hw9.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro Stealer, Vidar, zgRATBrowse
                                                                                                          • 193.233.132.226
                                                                                                          2zdult23rz.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                          • 147.45.47.93
                                                                                                          file.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                          • 147.45.47.93
                                                                                                          file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                                                                                                          • 193.233.132.175
                                                                                                          fBirvIlaOJ.exeGet hashmaliciousRedLineBrowse
                                                                                                          • 147.45.47.36
                                                                                                          VOrqSh1Fts.exeGet hashmaliciousNeoreklami, PureLog StealerBrowse
                                                                                                          • 193.233.132.234
                                                                                                          CLOUDFLARENETUSFizet#U00e9s,pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                          • 104.26.13.205
                                                                                                          G1lnGpOLK4.exeGet hashmaliciousNjratBrowse
                                                                                                          • 104.20.3.235
                                                                                                          https://www.postermywall.com/index.php/posterbuilder/view/2ce9c49c8ff31b813c516187dd74b5b6/0Get hashmaliciousHTMLPhisherBrowse
                                                                                                          • 104.17.2.184
                                                                                                          http://www.multipli.com.auGet hashmaliciousUnknownBrowse
                                                                                                          • 104.26.9.44
                                                                                                          https://icobath.filecloudonline.com/url/axbhz4sjfzebth22?shareto=finance@loans.company.comGet hashmaliciousUnknownBrowse
                                                                                                          • 104.16.117.116
                                                                                                          Account report (1).docxGet hashmaliciousUnknownBrowse
                                                                                                          • 104.18.91.62
                                                                                                          Account report (1).docxGet hashmaliciousUnknownBrowse
                                                                                                          • 104.18.89.62
                                                                                                          Account report (1).docxGet hashmaliciousUnknownBrowse
                                                                                                          • 104.18.89.62
                                                                                                          Account report (1).docxGet hashmaliciousUnknownBrowse
                                                                                                          • 104.17.25.14
                                                                                                          Signature requested-Fiona QR.pngGet hashmaliciousHTMLPhisherBrowse
                                                                                                          • 1.1.1.1
                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                          a0e9f5d64349fb13191bc781f81f42e1Detailed RFQ3.xllGet hashmaliciousUnknownBrowse
                                                                                                          • 104.26.5.15
                                                                                                          • 34.117.186.192
                                                                                                          IT1_Individual_Resident_Return_XLS.xlsGet hashmaliciousUnknownBrowse
                                                                                                          • 104.26.5.15
                                                                                                          • 34.117.186.192
                                                                                                          Arrival Notice.xlsGet hashmaliciousUnknownBrowse
                                                                                                          • 104.26.5.15
                                                                                                          • 34.117.186.192
                                                                                                          Pedido-Faturado-39873.msiGet hashmaliciousUnknownBrowse
                                                                                                          • 104.26.5.15
                                                                                                          • 34.117.186.192
                                                                                                          https://broken-rain-1a74.1rwvvy66.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                                                                                                          • 104.26.5.15
                                                                                                          • 34.117.186.192
                                                                                                          file.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                          • 104.26.5.15
                                                                                                          • 34.117.186.192
                                                                                                          831107010C8578AD95A12C5498B03755EAC398B5BBC0D.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                          • 104.26.5.15
                                                                                                          • 34.117.186.192
                                                                                                          SecuriteInfo.com.Win32.PWSX-gen.2624.6335.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                          • 104.26.5.15
                                                                                                          • 34.117.186.192
                                                                                                          tZvjMg3Hw9.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro Stealer, Vidar, zgRATBrowse
                                                                                                          • 104.26.5.15
                                                                                                          • 34.117.186.192
                                                                                                          https://2625819278.org/MIg2p2Get hashmaliciousHTMLPhisherBrowse
                                                                                                          • 104.26.5.15
                                                                                                          • 34.117.186.192
                                                                                                          No context
                                                                                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe
                                                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):3219456
                                                                                                          Entropy (8bit):7.973694392547135
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:98304:jla6IwxUx3q/LzoApQvwkjnMTOpGG33B246QglY:jla3wxU5q/L8obkjMWGG33B2HG
                                                                                                          MD5:6BF87E7F53315E6A41DE8E99B6702341
                                                                                                          SHA1:125A7D887DF3D2AB6F09E87D7C0FFC883EEEA35B
                                                                                                          SHA-256:7CF9C3F092AFEE2BA38D660AA59E263B329ECC899E583660CD3B59FCD29F9A02
                                                                                                          SHA-512:64689448759CA4280D3EFACF836407E6C6F8BEA6EC13AF9BD2951A1ED6744E42F5717D8D5D590E5E0D7BCD31E60113B9A6ED7FD4DEC6538FF4D34F420F2EC33E
                                                                                                          Malicious:true
                                                                                                          Antivirus:
                                                                                                          • Antivirus: Avira, Detection: 100%
                                                                                                          • Antivirus: ReversingLabs, Detection: 50%
                                                                                                          • Antivirus: Virustotal, Detection: 51%, Browse
                                                                                                          Reputation:low
                                                                                                          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L.....2f...............'............d9............@..........................P............@... .. .... .. ..........P.....................................0......................................................................................................*..................@.......................................@............P... .......0..............@................p.......8..............@................ ...`...8..............@....rsrc...............................@..@.........0y..p...(...H..............@....data....."......."..p..............@...................................................................................................................................................
                                                                                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe
                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                          Category:dropped
                                                                                                          Size (bytes):26
                                                                                                          Entropy (8bit):3.95006375643621
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3:ggPYV:rPYV
                                                                                                          MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                          Malicious:false
                                                                                                          Reputation:high, very likely benign file
                                                                                                          Preview:[ZoneTransfer]....ZoneId=0
                                                                                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe
                                                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                          Category:dropped
                                                                                                          Size (bytes):3219456
                                                                                                          Entropy (8bit):7.973694392547135
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:98304:jla6IwxUx3q/LzoApQvwkjnMTOpGG33B246QglY:jla3wxU5q/L8obkjMWGG33B2HG
                                                                                                          MD5:6BF87E7F53315E6A41DE8E99B6702341
                                                                                                          SHA1:125A7D887DF3D2AB6F09E87D7C0FFC883EEEA35B
                                                                                                          SHA-256:7CF9C3F092AFEE2BA38D660AA59E263B329ECC899E583660CD3B59FCD29F9A02
                                                                                                          SHA-512:64689448759CA4280D3EFACF836407E6C6F8BEA6EC13AF9BD2951A1ED6744E42F5717D8D5D590E5E0D7BCD31E60113B9A6ED7FD4DEC6538FF4D34F420F2EC33E
                                                                                                          Malicious:true
                                                                                                          Antivirus:
                                                                                                          • Antivirus: Avira, Detection: 100%
                                                                                                          • Antivirus: ReversingLabs, Detection: 50%
                                                                                                          • Antivirus: Virustotal, Detection: 51%, Browse
                                                                                                          Reputation:low
                                                                                                          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L.....2f...............'............d9............@..........................P............@... .. .... .. ..........P.....................................0......................................................................................................*..................@.......................................@............P... .......0..............@................p.......8..............@................ ...`...8..............@....rsrc...............................@..@.........0y..p...(...H..............@....data....."......."..p..............@...................................................................................................................................................
                                                                                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe
                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                          Category:dropped
                                                                                                          Size (bytes):26
                                                                                                          Entropy (8bit):3.95006375643621
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3:ggPYV:rPYV
                                                                                                          MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                          Malicious:false
                                                                                                          Reputation:high, very likely benign file
                                                                                                          Preview:[ZoneTransfer]....ZoneId=0
                                                                                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe
                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                          Category:modified
                                                                                                          Size (bytes):13
                                                                                                          Entropy (8bit):3.0269868333592873
                                                                                                          Encrypted:false
                                                                                                          SSDEEP:3:LuXX6VSn:KH64n
                                                                                                          MD5:479B2EFD1943075EC8248C3251A53959
                                                                                                          SHA1:D266A5335A60A78E9F13F7C830E6BEA4AC44788A
                                                                                                          SHA-256:2F4D20EC61332D99740BECB34D0FF06B41EB33848651D86612251035ED6AE21C
                                                                                                          SHA-512:5108C5B4AA7A7D5009A62ADDAE4518B36040D96E5F4C23E63DB6C658BEFE21AAA90ABA5613F4DF3331BA986579D632CF8EF601423F97CB6F921DDEE4D2DF3CCC
                                                                                                          Malicious:false
                                                                                                          Reputation:low
                                                                                                          Preview:1714628049377
                                                                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                          Entropy (8bit):7.973694392547135
                                                                                                          TrID:
                                                                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                          • DOS Executable Generic (2002/1) 0.02%
                                                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                          File name:SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe
                                                                                                          File size:3'219'456 bytes
                                                                                                          MD5:6bf87e7f53315e6a41de8e99b6702341
                                                                                                          SHA1:125a7d887df3d2ab6f09e87d7c0ffc883eeea35b
                                                                                                          SHA256:7cf9c3f092afee2ba38d660aa59e263b329ecc899e583660cd3b59fcd29f9a02
                                                                                                          SHA512:64689448759ca4280d3efacf836407e6c6f8bea6ec13af9bd2951a1ed6744e42f5717d8d5d590e5e0d7bcd31e60113b9a6ed7fd4dec6538ff4d34f420f2ec33e
                                                                                                          SSDEEP:98304:jla6IwxUx3q/LzoApQvwkjnMTOpGG33B246QglY:jla3wxU5q/L8obkjMWGG33B2HG
                                                                                                          TLSH:76E5334F281CF981EA48253D956AE9B6C5CEAC4BA51A400D60F2FF5FF1F2924E578343
                                                                                                          File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s...../.s
                                                                                                          Icon Hash:4c4d96ec0ce6c600
                                                                                                          Entrypoint:0xf63964
                                                                                                          Entrypoint Section:.data
                                                                                                          Digitally signed:false
                                                                                                          Imagebase:0x400000
                                                                                                          Subsystem:windows gui
                                                                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                          DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                                                          Time Stamp:0x663202DB [Wed May 1 08:52:43 2024 UTC]
                                                                                                          TLS Callbacks:
                                                                                                          CLR (.Net) Version:
                                                                                                          OS Version Major:6
                                                                                                          OS Version Minor:0
                                                                                                          File Version Major:6
                                                                                                          File Version Minor:0
                                                                                                          Subsystem Version Major:6
                                                                                                          Subsystem Version Minor:0
                                                                                                          Import Hash:272279f18f704f637aa129691266b291
                                                                                                          Instruction
                                                                                                          jmp 00007F03C0EFD0FAh
                                                                                                          add byte ptr [eax+0Eh], dh
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax-18h], ah
                                                                                                          add byte ptr [eax], al
                                                                                                          add byte ptr [eax], al
                                                                                                          pop ebp
                                                                                                          sub ebp, 00000010h
                                                                                                          sub ebp, 00B63964h
                                                                                                          jmp 00007F03C0EFD0F9h
                                                                                                          dec edx
                                                                                                          cmp ebx, dword ptr [B63964B8h]
                                                                                                          add byte ptr [ebx], al
                                                                                                          lds eax, fword ptr [ecx+00004CC0h]
                                                                                                          add byte ptr [ecx+000005CDh], bh
                                                                                                          mov edx, FA1E5B64h
                                                                                                          xor byte ptr [eax], dl
                                                                                                          inc eax
                                                                                                          dec ecx
                                                                                                          jne 00007F03C0EFD0ECh
                                                                                                          jmp 00007F03C0EFD0F9h
                                                                                                          jnbe 00007F03C0EFD09Dh
                                                                                                          inc eax
                                                                                                          dec edx
                                                                                                          out dx, eax
                                                                                                          test eax, 6458EDEFh
                                                                                                          in eax, A5h
                                                                                                          pushfd
                                                                                                          test eax, 646462DCh
                                                                                                          fimul word ptr fs:[esp+64h]
                                                                                                          xchg eax, ebx
                                                                                                          xchg byte ptr [edi-54h], ah
                                                                                                          out dx, eax
                                                                                                          in eax, 68h
                                                                                                          mov eax, dword ptr fs:[00E9h]
                                                                                                          inc eax
                                                                                                          cwde
                                                                                                          in eax, dx
                                                                                                          pushad
                                                                                                          inc eax
                                                                                                          xor al, 0Ch
                                                                                                          mov byte ptr [eax+120C6445h], al
                                                                                                          xor al, dh
                                                                                                          dec eax
                                                                                                          inc eax
                                                                                                          or al, 30h
                                                                                                          jnle 00007F03C0EFD0F1h
                                                                                                          jbe 00007F03C0EFD07Eh
                                                                                                          popad
                                                                                                          lea edx, dword ptr fs:[esp+64h]
                                                                                                          jmp 00007F03AE8810F6h
                                                                                                          dec eax
                                                                                                          inc eax
                                                                                                          jmp 00007F03B05410FDh
                                                                                                          loope 00007F03C0EFD15Eh
                                                                                                          out dx, eax
                                                                                                          int1
                                                                                                          push EF646464h
                                                                                                          jmp 00007F0425543569h
                                                                                                          movsd
                                                                                                          lea esp, dword ptr [esi+55h]
                                                                                                          out A6h, ax
                                                                                                          pushad
                                                                                                          sub eax, 9B90E16Bh
                                                                                                          wait
                                                                                                          wait
                                                                                                          cmp dword ptr [esi+00000000h], esp
                                                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x93d0500xea0.data
                                                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x93def00x3b0.data
                                                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x19c0000xafa0.rsrc
                                                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x93d0300x10.data
                                                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x93d0000x18.data
                                                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                          0x10000x1590000x92a002ab81961f00ec1dbd3ea5e132a10c457False0.999750239769821data7.999603691993064IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                          0x15a0000x280000x10200dd255f77e9b46d5fd64423f7d185098fFalse0.9934138808139535data7.991172527649386IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                          0x1820000x50000x800e92665bb7e02dd4504e9d9317c2216f6False0.9931640625data7.81663229040033IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                          0x1870000xb0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                          0x1920000xa0000x600025046cd7374b7bd38baef77a496b1ad7False1.0006510416666667data7.993404858996497IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                          .rsrc0x19c0000xb0000xb000f55c5215c73a04b580fdee8f27a08ae5False0.11330344460227272data2.153423809128472IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                          0x1a70000x7930000x328001475e5a817c2187eaaf1288227166d7eunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                          .data0x93a0000x22b0000x22b0002d71a8720bf24717d875205a8b604ce8unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                          RT_ICON0x19c2500x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024RussianRussia0.1320921985815603
                                                                                                          RT_ICON0x19c6b80x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 1600RussianRussia0.10465116279069768
                                                                                                          RT_ICON0x19cd700x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304RussianRussia0.08770491803278689
                                                                                                          RT_ICON0x19d6f80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096RussianRussia0.05722326454033771
                                                                                                          RT_ICON0x19e7a00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216RussianRussia0.03475103734439834
                                                                                                          RT_ICON0x1a0d480x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384RussianRussia0.02509447331128956
                                                                                                          RT_ICON0x1a4f700x1aaePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedRussianRussia0.39780380673499266
                                                                                                          RT_GROUP_ICON0x1a6a200x68dataRussianRussia0.7596153846153846
                                                                                                          RT_VERSION0x1a6a880x398OpenPGP Public KeyRussianRussia0.42282608695652174
                                                                                                          RT_MANIFEST0x1a6e200x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                                                                                          DLLImport
                                                                                                          kernel32.dllGetModuleHandleA, GetProcAddress, ExitProcess, LoadLibraryA
                                                                                                          user32.dllMessageBoxA
                                                                                                          advapi32.dllRegCloseKey
                                                                                                          oleaut32.dllSysFreeString
                                                                                                          gdi32.dllCreateFontA
                                                                                                          shell32.dllShellExecuteA
                                                                                                          version.dllGetFileVersionInfoA
                                                                                                          ole32.dllCoInitialize
                                                                                                          WS2_32.dllWSAStartup
                                                                                                          CRYPT32.dllCryptUnprotectData
                                                                                                          SHLWAPI.dllPathFindExtensionA
                                                                                                          gdiplus.dllGdipGetImageEncoders
                                                                                                          SETUPAPI.dllSetupDiEnumDeviceInfo
                                                                                                          ntdll.dllRtlUnicodeStringToAnsiString
                                                                                                          RstrtMgr.DLLRmStartSession
                                                                                                          Language of compilation systemCountry where language is spokenMap
                                                                                                          RussianRussia
                                                                                                          EnglishUnited States
                                                                                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                          05/02/24-06:16:16.523614TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)5870949707147.45.47.93192.168.2.5
                                                                                                          05/02/24-06:16:21.991545TCP2046267ET TROJAN [ANY.RUN] RisePro TCP (External IP)5870949707147.45.47.93192.168.2.5
                                                                                                          05/02/24-06:18:31.640435TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4970658709192.168.2.5147.45.47.93
                                                                                                          05/02/24-06:16:16.500069TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)5870949706147.45.47.93192.168.2.5
                                                                                                          05/02/24-06:18:31.640434TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4970758709192.168.2.5147.45.47.93
                                                                                                          05/02/24-06:16:10.960089TCP2049060ET TROJAN RisePro TCP Heartbeat Packet4970558709192.168.2.5147.45.47.93
                                                                                                          05/02/24-06:18:35.093509TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4972158709192.168.2.5147.45.47.93
                                                                                                          05/02/24-06:16:18.088207TCP2046267ET TROJAN [ANY.RUN] RisePro TCP (External IP)5870949705147.45.47.93192.168.2.5
                                                                                                          05/02/24-06:16:11.105907TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)5870949705147.45.47.93192.168.2.5
                                                                                                          05/02/24-06:16:21.976112TCP2046267ET TROJAN [ANY.RUN] RisePro TCP (External IP)5870949706147.45.47.93192.168.2.5
                                                                                                          05/02/24-06:17:56.478700TCP2046267ET TROJAN [ANY.RUN] RisePro TCP (External IP)5870949721147.45.47.93192.168.2.5
                                                                                                          05/02/24-06:16:32.277727TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)5870949721147.45.47.93192.168.2.5
                                                                                                          05/02/24-06:18:31.734139TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4971658709192.168.2.5147.45.47.93
                                                                                                          05/02/24-06:18:31.624622TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4970558709192.168.2.5147.45.47.93
                                                                                                          05/02/24-06:17:43.913022TCP2046267ET TROJAN [ANY.RUN] RisePro TCP (External IP)5870949716147.45.47.93192.168.2.5
                                                                                                          05/02/24-06:16:26.984352TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)5870949716147.45.47.93192.168.2.5
                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                          May 2, 2024 06:16:10.728481054 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:10.917278051 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:10.917407990 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:10.960088968 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:11.105906963 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:11.158376932 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:11.200058937 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:14.952080011 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:15.199800014 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:16.122921944 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:16.146476984 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:16.311456919 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:16.311593056 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:16.318239927 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:16.334918022 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:16.335052967 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:16.349420071 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:16.500068903 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:16.523613930 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:16.546446085 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:16.559372902 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:16.577693939 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:16.590204954 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:18.088207006 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:18.140162945 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:19.666292906 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:19.666579008 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:19.903136015 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:19.903153896 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:19.908725977 CEST49708443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:19.908766031 CEST4434970834.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:19.908854008 CEST49708443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:19.910379887 CEST49708443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:19.910398960 CEST4434970834.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:20.171745062 CEST4434970834.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:20.171828985 CEST49708443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:20.176116943 CEST49708443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:20.176125050 CEST4434970834.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:20.176341057 CEST4434970834.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:20.218297958 CEST49708443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:20.398972034 CEST49708443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:20.444128036 CEST4434970834.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:20.546247005 CEST4434970834.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:20.546386957 CEST4434970834.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:20.546468973 CEST49708443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:20.552582979 CEST49708443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:20.552607059 CEST4434970834.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:20.552630901 CEST49708443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:20.552637100 CEST4434970834.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:20.656478882 CEST49709443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:16:20.656521082 CEST44349709104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:20.656619072 CEST49709443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:16:20.663209915 CEST49709443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:16:20.663228035 CEST44349709104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:20.850609064 CEST44349709104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:20.850779057 CEST49709443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:16:20.853662014 CEST49709443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:16:20.853688002 CEST44349709104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:20.854023933 CEST44349709104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:20.855715990 CEST49709443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:16:20.896123886 CEST44349709104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:21.102386951 CEST44349709104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:21.102469921 CEST44349709104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:21.102540970 CEST49709443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:16:21.103914022 CEST49709443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:16:21.103935003 CEST44349709104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:21.103948116 CEST49709443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:16:21.103954077 CEST44349709104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:21.104466915 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:21.340837002 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:21.859329939 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:21.905823946 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:21.976111889 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:21.991544962 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:22.030800104 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:22.046412945 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:22.146975994 CEST49710443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:22.147020102 CEST4434971034.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:22.147099972 CEST49710443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:22.149431944 CEST49710443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:22.149450064 CEST4434971034.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:22.219067097 CEST49711443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:22.219131947 CEST4434971134.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:22.219198942 CEST49711443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:22.222786903 CEST49711443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:22.222815037 CEST4434971134.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:22.404473066 CEST4434971034.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:22.404634953 CEST49710443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:22.406224012 CEST49710443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:22.406234980 CEST4434971034.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:22.406445026 CEST4434971034.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:22.448111057 CEST49710443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:22.478627920 CEST4434971134.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:22.478730917 CEST49711443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:24.170864105 CEST49711443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:24.170886040 CEST4434971134.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:24.171367884 CEST4434971134.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:24.218373060 CEST49711443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:24.364819050 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:24.501086950 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:24.516541958 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:24.577671051 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:24.577676058 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:24.593269110 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:25.185060024 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:25.243078947 CEST49710443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:25.251857996 CEST49711443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:25.288120031 CEST4434971034.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:25.296125889 CEST4434971134.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:25.414355993 CEST4434971134.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:25.414496899 CEST4434971134.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:25.414572954 CEST49711443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:25.422171116 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:25.425426006 CEST49711443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:25.425453901 CEST4434971134.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:25.425481081 CEST49711443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:25.425487041 CEST4434971134.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:25.437628031 CEST49712443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:16:25.437664032 CEST44349712104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:25.437736988 CEST49712443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:16:25.438155890 CEST49712443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:16:25.438172102 CEST44349712104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:25.622268915 CEST44349712104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:25.622339964 CEST49712443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:16:25.623524904 CEST49712443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:16:25.623534918 CEST44349712104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:25.623792887 CEST44349712104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:25.625317097 CEST49712443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:16:25.658600092 CEST4434971034.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:25.658725977 CEST4434971034.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:25.658790112 CEST49710443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:25.658904076 CEST49710443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:25.658932924 CEST49710443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:16:25.658931971 CEST4434971034.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:25.658941031 CEST4434971034.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:16:25.660356998 CEST49713443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:16:25.660387993 CEST44349713104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:25.660468102 CEST49713443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:16:25.660732985 CEST49713443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:16:25.660747051 CEST44349713104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:25.668129921 CEST44349712104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:25.843175888 CEST44349713104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:25.843360901 CEST49713443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:16:25.855242014 CEST49713443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:16:25.855261087 CEST44349713104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:25.855510950 CEST44349713104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:25.857304096 CEST49713443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:16:25.879842997 CEST44349712104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:25.879945040 CEST44349712104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:25.880004883 CEST49712443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:16:25.880178928 CEST49712443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:16:25.880219936 CEST44349712104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:25.884057045 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:25.904114962 CEST44349713104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:26.097604036 CEST44349713104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:26.097718000 CEST44349713104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:26.097804070 CEST49713443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:16:26.100754976 CEST49713443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:16:26.100773096 CEST44349713104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:26.100806952 CEST49713443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:16:26.100811958 CEST44349713104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:16:26.104943991 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:26.121495008 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:26.341485977 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:26.606909990 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:26.795289040 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:26.795362949 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:26.802455902 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:26.984352112 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:27.043401957 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:27.093271017 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:29.692603111 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:29.734122038 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:29.894448042 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:29.925344944 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:29.956260920 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:29.956382036 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:29.966208935 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:30.143285990 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:30.200006962 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:30.200026989 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:30.390355110 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:31.900605917 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:32.088974953 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:32.089063883 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:32.100095034 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:32.277726889 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:32.327650070 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:32.340379000 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:35.390290976 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:35.824980021 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:45.468389988 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:45.702831984 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:51.358984947 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:51.359103918 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:16:51.590539932 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:16:51.590559959 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:00.765420914 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:00.996794939 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:01.124672890 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:01.356220961 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:07.046515942 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:07.046531916 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:07.093784094 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:07.277863979 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:07.277885914 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:07.324912071 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:07.406017065 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:07.637232065 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:10.546876907 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:10.778038979 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:13.338032007 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:13.338120937 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:13.338191986 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:13.574982882 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:13.575001955 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:13.575016022 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:14.251780033 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:14.481138945 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:17.249716997 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:17.249840021 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:17.481185913 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:17.481209993 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:17.546616077 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:17.778228045 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:20.390224934 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:20.390285969 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:20.390332937 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:20.390367031 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:20.621694088 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:20.621710062 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:20.621721983 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:20.621845007 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:20.687196970 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:20.918343067 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:23.531196117 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:23.531284094 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:23.531344891 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:23.762525082 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:23.762545109 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:23.762557983 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:23.812299967 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:24.045192003 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:26.656076908 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:26.656147003 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:26.656239033 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:26.656239033 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:26.887691021 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:26.887698889 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:26.887712002 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:26.887717962 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:26.952737093 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:27.184245110 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:29.797274113 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:29.797332048 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:29.797399998 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:29.797481060 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:30.027841091 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:30.027862072 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:30.027879000 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:30.027890921 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:30.093472958 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:30.325189114 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:32.937194109 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:32.937192917 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:32.937266111 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:32.943011045 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:33.168693066 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:33.168716908 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:33.168735027 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:33.184290886 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:33.218563080 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:33.450031042 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:36.078294992 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:36.078385115 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:36.078433990 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:36.078490973 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:36.309261084 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:36.309271097 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:36.309278011 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:36.309289932 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:36.363027096 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:36.605834961 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:39.218781948 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:39.218821049 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:39.218919039 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:39.218919039 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:39.449842930 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:39.449862957 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:39.449870110 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:39.449876070 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:39.501161098 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:39.731971979 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:42.343656063 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:42.343751907 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:42.343754053 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:42.343807936 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:42.574732065 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:42.574743986 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:42.574759960 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:42.574784994 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:42.625432014 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:42.856333017 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:43.648056030 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:43.648087978 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:43.648113966 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:43.648125887 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:43.648149014 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:43.648159981 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:43.648176908 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:43.648179054 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:43.648191929 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:43.648205996 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:43.648221016 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:43.648225069 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:43.648241043 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:43.648260117 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:43.737108946 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:43.749887943 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:43.752156019 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:43.765403032 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:43.836658955 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:43.836692095 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:43.836734056 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:43.836873055 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:43.836941957 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:43.836982965 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:43.837053061 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:43.837191105 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:43.837236881 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:43.843430042 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:43.913022041 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:43.981085062 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:43.996671915 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:44.022659063 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:44.074908018 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:45.484045029 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:45.715337038 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:46.859296083 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:46.875021935 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:46.968611002 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:47.031124115 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:47.090542078 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:47.106520891 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:47.201770067 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:47.262629986 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:48.609407902 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:48.840390921 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:49.999759912 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:49.999933004 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:50.093955040 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:50.156728983 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:50.231185913 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:50.231204033 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:50.324898958 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:50.387542963 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:51.749732018 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:51.981240988 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:53.140396118 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:53.140399933 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:53.234230995 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:53.297851086 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:53.371743917 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:53.371931076 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:53.465904951 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:53.528278112 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:54.890553951 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:55.124783039 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:55.466533899 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:55.562431097 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:55.578322887 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:55.593275070 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:55.702611923 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:55.796391010 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:55.949994087 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:55.955082893 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:56.294684887 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:56.342509985 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:56.478699923 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:56.593209982 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:58.609077930 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:58.702989101 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:58.718521118 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:58.840504885 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:58.934732914 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:58.949805021 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:59.421623945 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:59.609071970 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:17:59.668812990 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:17:59.840508938 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:01.734056950 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:01.827950954 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:01.844048977 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:01.965594053 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:01.987576008 CEST49723443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:18:01.987615108 CEST4434972334.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:18:01.987690926 CEST49723443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:18:01.990514994 CEST49723443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:18:01.990539074 CEST4434972334.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:18:02.059370041 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:02.074856997 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:02.245609999 CEST4434972334.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:18:02.245712996 CEST49723443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:18:02.247545958 CEST49723443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:18:02.247555971 CEST4434972334.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:18:02.247771025 CEST4434972334.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:18:02.300761938 CEST49723443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:18:02.348121881 CEST4434972334.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:18:02.519706964 CEST4434972334.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:18:02.519790888 CEST4434972334.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:18:02.519856930 CEST49723443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:18:02.520494938 CEST49723443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:18:02.520529032 CEST4434972334.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:18:02.520545006 CEST49723443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:18:02.520553112 CEST4434972334.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:18:02.546502113 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:02.670375109 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:02.702569962 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:02.719645977 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:02.749634027 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:02.781858921 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:02.796370983 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:02.796380997 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:02.797369957 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:02.810841084 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:02.905709028 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:02.954466105 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:03.093250990 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:05.812180996 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:05.843450069 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:05.859064102 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:05.937365055 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:06.043832064 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:06.075135946 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:06.090217113 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:06.093585968 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:06.168759108 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:06.325038910 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:07.798872948 CEST49724443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:18:07.798913956 CEST44349724104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:18:07.798995018 CEST49724443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:18:07.799467087 CEST49724443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:18:07.799480915 CEST44349724104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:18:07.985390902 CEST44349724104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:18:07.985529900 CEST49724443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:18:07.987272978 CEST49724443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:18:07.987278938 CEST44349724104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:18:07.987479925 CEST44349724104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:18:07.990725040 CEST49724443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:18:08.032116890 CEST44349724104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:18:08.247870922 CEST44349724104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:18:08.247941971 CEST44349724104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:18:08.248083115 CEST49724443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:18:08.248414040 CEST49724443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:18:08.248425961 CEST44349724104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:18:08.248454094 CEST49724443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:18:08.248459101 CEST44349724104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:18:08.952934027 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:08.953439951 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:08.968530893 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:08.984234095 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:09.184034109 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:09.184062004 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:09.184149981 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:09.199639082 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:09.215714931 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:09.218384981 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:09.421607971 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:09.449769974 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:10.920075893 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:10.951689959 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:10.966949940 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:10.999448061 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:11.003031015 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:11.029383898 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:11.171783924 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:11.202594042 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:11.202620983 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:11.359915972 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:11.360007048 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:11.390124083 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:14.062181950 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:14.093611002 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:14.093619108 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:14.187237978 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:14.293651104 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:14.312354088 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:14.324987888 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:14.325031996 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:14.418559074 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:14.543620110 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:15.938813925 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:15.969727993 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:15.983159065 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:15.999439955 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:16.062206030 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:16.108936071 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:16.108938932 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:16.186997890 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:16.328908920 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:16.483882904 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:19.077833891 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:19.093544006 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:19.108999014 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:19.202811956 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:19.309281111 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:19.324937105 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:19.340651035 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:19.434168100 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:19.452785015 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:19.684348106 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:20.877079964 CEST49725443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:18:20.877132893 CEST4434972534.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:18:20.877204895 CEST49725443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:18:20.878865004 CEST49725443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:18:20.878876925 CEST4434972534.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:18:21.133723021 CEST4434972534.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:18:21.133905888 CEST49725443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:18:21.135298967 CEST49725443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:18:21.135308981 CEST4434972534.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:18:21.135513067 CEST4434972534.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:18:21.179153919 CEST49725443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:18:21.224123001 CEST4434972534.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:18:21.424904108 CEST4434972534.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:18:21.425003052 CEST4434972534.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:18:21.425062895 CEST49725443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:18:21.425868988 CEST49725443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:18:21.425884962 CEST4434972534.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:18:21.425908089 CEST49725443192.168.2.534.117.186.192
                                                                                                          May 2, 2024 06:18:21.425913095 CEST4434972534.117.186.192192.168.2.5
                                                                                                          May 2, 2024 06:18:21.428426981 CEST49726443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:18:21.428458929 CEST44349726104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:18:21.428533077 CEST49726443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:18:21.428826094 CEST49726443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:18:21.428833961 CEST44349726104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:18:21.612442017 CEST44349726104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:18:21.612515926 CEST49726443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:18:21.614752054 CEST49726443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:18:21.614759922 CEST44349726104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:18:21.615148067 CEST44349726104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:18:21.617208958 CEST49726443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:18:21.660115004 CEST44349726104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:18:21.868845940 CEST44349726104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:18:21.868932962 CEST44349726104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:18:21.869045973 CEST49726443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:18:21.869401932 CEST49726443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:18:21.869414091 CEST44349726104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:18:21.869426012 CEST49726443192.168.2.5104.26.5.15
                                                                                                          May 2, 2024 06:18:21.869431019 CEST44349726104.26.5.15192.168.2.5
                                                                                                          May 2, 2024 06:18:21.869899988 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:22.106199026 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:22.218415976 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:22.234004021 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:22.249762058 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:22.327852964 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:22.449722052 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:22.465408087 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:22.481077909 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:22.559155941 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:22.578058958 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:22.809456110 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:25.359153032 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:25.374701977 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:25.374814034 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:25.468560934 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:25.590646982 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:25.606236935 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:25.606251955 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:25.699994087 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:25.702785015 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:25.934355021 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:28.484045029 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:28.499834061 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:28.501061916 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:28.593405008 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:28.715766907 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:28.732388020 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:28.732517004 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:28.826240063 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:28.827892065 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:29.059204102 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:31.624622107 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:31.640434980 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:31.640434027 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:31.734138966 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:31.856394053 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:31.871421099 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:31.871433973 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:31.965579033 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:31.968480110 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:32.199809074 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:34.685784101 CEST5870949705147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:34.720376968 CEST5870949706147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:34.733294010 CEST5870949707147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:34.796334982 CEST4970558709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:34.796427965 CEST4970758709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:34.798258066 CEST5870949716147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:34.866719007 CEST4970658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:34.866796017 CEST4971658709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:35.093508959 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          May 2, 2024 06:18:35.324588060 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:35.497937918 CEST5870949721147.45.47.93192.168.2.5
                                                                                                          May 2, 2024 06:18:35.686932087 CEST4972158709192.168.2.5147.45.47.93
                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                          May 2, 2024 06:16:19.787619114 CEST5602053192.168.2.51.1.1.1
                                                                                                          May 2, 2024 06:16:19.876621008 CEST53560201.1.1.1192.168.2.5
                                                                                                          May 2, 2024 06:16:20.556715965 CEST6402153192.168.2.51.1.1.1
                                                                                                          May 2, 2024 06:16:20.646522999 CEST53640211.1.1.1192.168.2.5
                                                                                                          May 2, 2024 06:18:01.889924049 CEST4965553192.168.2.51.1.1.1
                                                                                                          May 2, 2024 06:18:01.978928089 CEST53496551.1.1.1192.168.2.5
                                                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                          May 2, 2024 06:16:19.787619114 CEST192.168.2.51.1.1.10x3922Standard query (0)ipinfo.ioA (IP address)IN (0x0001)false
                                                                                                          May 2, 2024 06:16:20.556715965 CEST192.168.2.51.1.1.10x5129Standard query (0)db-ip.comA (IP address)IN (0x0001)false
                                                                                                          May 2, 2024 06:18:01.889924049 CEST192.168.2.51.1.1.10x14aStandard query (0)ipinfo.ioA (IP address)IN (0x0001)false
                                                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                          May 2, 2024 06:16:19.876621008 CEST1.1.1.1192.168.2.50x3922No error (0)ipinfo.io34.117.186.192A (IP address)IN (0x0001)false
                                                                                                          May 2, 2024 06:16:20.646522999 CEST1.1.1.1192.168.2.50x5129No error (0)db-ip.com104.26.5.15A (IP address)IN (0x0001)false
                                                                                                          May 2, 2024 06:16:20.646522999 CEST1.1.1.1192.168.2.50x5129No error (0)db-ip.com172.67.75.166A (IP address)IN (0x0001)false
                                                                                                          May 2, 2024 06:16:20.646522999 CEST1.1.1.1192.168.2.50x5129No error (0)db-ip.com104.26.4.15A (IP address)IN (0x0001)false
                                                                                                          May 2, 2024 06:18:01.978928089 CEST1.1.1.1192.168.2.50x14aNo error (0)ipinfo.io34.117.186.192A (IP address)IN (0x0001)false
                                                                                                          • https:
                                                                                                            • ipinfo.io
                                                                                                          • db-ip.com
                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          0192.168.2.54970834.117.186.1924435080C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-05-02 04:16:20 UTC239OUTGET /widget/demo/191.96.150.225 HTTP/1.1
                                                                                                          Connection: Keep-Alive
                                                                                                          Referer: https://ipinfo.io/
                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                                                                                          Host: ipinfo.io
                                                                                                          2024-05-02 04:16:20 UTC513INHTTP/1.1 200 OK
                                                                                                          server: nginx/1.24.0
                                                                                                          date: Thu, 02 May 2024 04:16:20 GMT
                                                                                                          content-type: application/json; charset=utf-8
                                                                                                          Content-Length: 921
                                                                                                          access-control-allow-origin: *
                                                                                                          x-frame-options: SAMEORIGIN
                                                                                                          x-xss-protection: 1; mode=block
                                                                                                          x-content-type-options: nosniff
                                                                                                          referrer-policy: strict-origin-when-cross-origin
                                                                                                          x-envoy-upstream-service-time: 3
                                                                                                          via: 1.1 google
                                                                                                          strict-transport-security: max-age=2592000; includeSubDomains
                                                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                          Connection: close
                                                                                                          2024-05-02 04:16:20 UTC742INData Raw: 7b 0a 20 20 22 69 6e 70 75 74 22 3a 20 22 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 22 2c 0a 20 20 22 64 61 74 61 22 3a 20 7b 0a 20 20 20 20 22 69 70 22 3a 20 22 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 22 2c 0a 20 20 20 20 22 63 69 74 79 22 3a 20 22 4e 65 77 20 59 6f 72 6b 20 43 69 74 79 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 6c 6f 63 22 3a 20 22 34 30 2e 37 31 34 33 2c 2d 37 34 2e 30 30 36 30 22 2c 0a 20 20 20 20 22 6f 72 67 22 3a 20 22 41 53 31 37 34 20 43 6f 67 65 6e 74 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 22 2c 0a 20 20 20 20 22 70 6f 73 74 61 6c 22 3a 20 22 31 30 30 30 31 22 2c 0a 20 20 20 20 22 74 69 6d 65 7a 6f 6e
                                                                                                          Data Ascii: { "input": "191.96.150.225", "data": { "ip": "191.96.150.225", "city": "New York City", "region": "New York", "country": "US", "loc": "40.7143,-74.0060", "org": "AS174 Cogent Communications", "postal": "10001", "timezon
                                                                                                          2024-05-02 04:16:20 UTC179INData Raw: 22 3a 20 22 50 72 69 76 61 74 65 20 52 65 73 69 64 65 6e 63 65 22 2c 0a 20 20 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 20 20 22 65 6d 61 69 6c 22 3a 20 22 61 62 75 73 65 40 69 70 78 6f 2e 63 6f 6d 22 2c 0a 20 20 20 20 20 20 22 6e 61 6d 65 22 3a 20 22 50 72 69 76 61 74 65 20 43 75 73 74 6f 6d 65 72 22 2c 0a 20 20 20 20 20 20 22 6e 65 74 77 6f 72 6b 22 3a 20 22 31 39 31 2e 39 36 2e 31 35 30 2e 30 2f 32 34 22 2c 0a 20 20 20 20 20 20 22 70 68 6f 6e 65 22 3a 20 22 22 0a 20 20 20 20 7d 0a 20 20 7d 0a 7d
                                                                                                          Data Ascii: ": "Private Residence", "country": "US", "email": "abuse@ipxo.com", "name": "Private Customer", "network": "191.96.150.0/24", "phone": "" } }}


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          1192.168.2.549709104.26.5.154435080C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-05-02 04:16:20 UTC263OUTGET /demo/home.php?s=191.96.150.225 HTTP/1.1
                                                                                                          Connection: Keep-Alive
                                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                                                                                          Host: db-ip.com
                                                                                                          2024-05-02 04:16:21 UTC654INHTTP/1.1 200 OK
                                                                                                          Date: Thu, 02 May 2024 04:16:21 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Transfer-Encoding: chunked
                                                                                                          Connection: close
                                                                                                          x-iplb-request-id: A29E9B21:2D18_93878F2E:0050_66331395_B1CD1D2:7B63
                                                                                                          x-iplb-instance: 59128
                                                                                                          CF-Cache-Status: DYNAMIC
                                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qf2P1lSGiyEN%2BxqaT6HpWp7dnc0anghDxfp7knAsDo3kKHr91ttTREOdRwFghiasiy5ewvfpJoxlfNbDZolnDmuv3mRE0DUEX%2FLMdAyxj%2FEJxXFRVnY4bu1Gag%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                          Server: cloudflare
                                                                                                          CF-RAY: 87d532035be94356-EWR
                                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                                          2024-05-02 04:16:21 UTC85INData Raw: 34 66 0d 0a 7b 22 73 74 61 74 75 73 22 3a 22 6f 6b 22 2c 22 64 65 6d 6f 49 6e 66 6f 22 3a 7b 22 65 72 72 6f 72 22 3a 22 6f 76 65 72 20 71 75 65 72 79 20 6c 69 6d 69 74 2c 20 70 6c 65 61 73 65 20 74 72 79 20 61 67 61 69 6e 20 6c 61 74 65 72 22 7d 7d 0d 0a
                                                                                                          Data Ascii: 4f{"status":"ok","demoInfo":{"error":"over query limit, please try again later"}}
                                                                                                          2024-05-02 04:16:21 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                          Data Ascii: 0


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          2192.168.2.54971034.117.186.1924436552C:\ProgramData\MPGPH131\MPGPH131.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-05-02 04:16:25 UTC239OUTGET /widget/demo/191.96.150.225 HTTP/1.1
                                                                                                          Connection: Keep-Alive
                                                                                                          Referer: https://ipinfo.io/
                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                                                                                          Host: ipinfo.io
                                                                                                          2024-05-02 04:16:25 UTC515INHTTP/1.1 200 OK
                                                                                                          server: nginx/1.24.0
                                                                                                          date: Thu, 02 May 2024 04:16:25 GMT
                                                                                                          content-type: application/json; charset=utf-8
                                                                                                          Content-Length: 921
                                                                                                          access-control-allow-origin: *
                                                                                                          x-frame-options: SAMEORIGIN
                                                                                                          x-xss-protection: 1; mode=block
                                                                                                          x-content-type-options: nosniff
                                                                                                          referrer-policy: strict-origin-when-cross-origin
                                                                                                          x-envoy-upstream-service-time: 273
                                                                                                          via: 1.1 google
                                                                                                          strict-transport-security: max-age=2592000; includeSubDomains
                                                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                          Connection: close
                                                                                                          2024-05-02 04:16:25 UTC740INData Raw: 7b 0a 20 20 22 69 6e 70 75 74 22 3a 20 22 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 22 2c 0a 20 20 22 64 61 74 61 22 3a 20 7b 0a 20 20 20 20 22 69 70 22 3a 20 22 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 22 2c 0a 20 20 20 20 22 63 69 74 79 22 3a 20 22 4e 65 77 20 59 6f 72 6b 20 43 69 74 79 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 6c 6f 63 22 3a 20 22 34 30 2e 37 31 34 33 2c 2d 37 34 2e 30 30 36 30 22 2c 0a 20 20 20 20 22 6f 72 67 22 3a 20 22 41 53 31 37 34 20 43 6f 67 65 6e 74 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 22 2c 0a 20 20 20 20 22 70 6f 73 74 61 6c 22 3a 20 22 31 30 30 30 31 22 2c 0a 20 20 20 20 22 74 69 6d 65 7a 6f 6e
                                                                                                          Data Ascii: { "input": "191.96.150.225", "data": { "ip": "191.96.150.225", "city": "New York City", "region": "New York", "country": "US", "loc": "40.7143,-74.0060", "org": "AS174 Cogent Communications", "postal": "10001", "timezon
                                                                                                          2024-05-02 04:16:25 UTC181INData Raw: 73 73 22 3a 20 22 50 72 69 76 61 74 65 20 52 65 73 69 64 65 6e 63 65 22 2c 0a 20 20 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 20 20 22 65 6d 61 69 6c 22 3a 20 22 61 62 75 73 65 40 69 70 78 6f 2e 63 6f 6d 22 2c 0a 20 20 20 20 20 20 22 6e 61 6d 65 22 3a 20 22 50 72 69 76 61 74 65 20 43 75 73 74 6f 6d 65 72 22 2c 0a 20 20 20 20 20 20 22 6e 65 74 77 6f 72 6b 22 3a 20 22 31 39 31 2e 39 36 2e 31 35 30 2e 30 2f 32 34 22 2c 0a 20 20 20 20 20 20 22 70 68 6f 6e 65 22 3a 20 22 22 0a 20 20 20 20 7d 0a 20 20 7d 0a 7d
                                                                                                          Data Ascii: ss": "Private Residence", "country": "US", "email": "abuse@ipxo.com", "name": "Private Customer", "network": "191.96.150.0/24", "phone": "" } }}


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          3192.168.2.54971134.117.186.1924431440C:\ProgramData\MPGPH131\MPGPH131.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-05-02 04:16:25 UTC239OUTGET /widget/demo/191.96.150.225 HTTP/1.1
                                                                                                          Connection: Keep-Alive
                                                                                                          Referer: https://ipinfo.io/
                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                                                                                          Host: ipinfo.io
                                                                                                          2024-05-02 04:16:25 UTC513INHTTP/1.1 200 OK
                                                                                                          server: nginx/1.24.0
                                                                                                          date: Thu, 02 May 2024 04:16:25 GMT
                                                                                                          content-type: application/json; charset=utf-8
                                                                                                          Content-Length: 921
                                                                                                          access-control-allow-origin: *
                                                                                                          x-frame-options: SAMEORIGIN
                                                                                                          x-xss-protection: 1; mode=block
                                                                                                          x-content-type-options: nosniff
                                                                                                          referrer-policy: strict-origin-when-cross-origin
                                                                                                          x-envoy-upstream-service-time: 1
                                                                                                          via: 1.1 google
                                                                                                          strict-transport-security: max-age=2592000; includeSubDomains
                                                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                          Connection: close
                                                                                                          2024-05-02 04:16:25 UTC742INData Raw: 7b 0a 20 20 22 69 6e 70 75 74 22 3a 20 22 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 22 2c 0a 20 20 22 64 61 74 61 22 3a 20 7b 0a 20 20 20 20 22 69 70 22 3a 20 22 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 22 2c 0a 20 20 20 20 22 63 69 74 79 22 3a 20 22 4e 65 77 20 59 6f 72 6b 20 43 69 74 79 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 6c 6f 63 22 3a 20 22 34 30 2e 37 31 34 33 2c 2d 37 34 2e 30 30 36 30 22 2c 0a 20 20 20 20 22 6f 72 67 22 3a 20 22 41 53 31 37 34 20 43 6f 67 65 6e 74 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 22 2c 0a 20 20 20 20 22 70 6f 73 74 61 6c 22 3a 20 22 31 30 30 30 31 22 2c 0a 20 20 20 20 22 74 69 6d 65 7a 6f 6e
                                                                                                          Data Ascii: { "input": "191.96.150.225", "data": { "ip": "191.96.150.225", "city": "New York City", "region": "New York", "country": "US", "loc": "40.7143,-74.0060", "org": "AS174 Cogent Communications", "postal": "10001", "timezon
                                                                                                          2024-05-02 04:16:25 UTC179INData Raw: 22 3a 20 22 50 72 69 76 61 74 65 20 52 65 73 69 64 65 6e 63 65 22 2c 0a 20 20 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 20 20 22 65 6d 61 69 6c 22 3a 20 22 61 62 75 73 65 40 69 70 78 6f 2e 63 6f 6d 22 2c 0a 20 20 20 20 20 20 22 6e 61 6d 65 22 3a 20 22 50 72 69 76 61 74 65 20 43 75 73 74 6f 6d 65 72 22 2c 0a 20 20 20 20 20 20 22 6e 65 74 77 6f 72 6b 22 3a 20 22 31 39 31 2e 39 36 2e 31 35 30 2e 30 2f 32 34 22 2c 0a 20 20 20 20 20 20 22 70 68 6f 6e 65 22 3a 20 22 22 0a 20 20 20 20 7d 0a 20 20 7d 0a 7d
                                                                                                          Data Ascii: ": "Private Residence", "country": "US", "email": "abuse@ipxo.com", "name": "Private Customer", "network": "191.96.150.0/24", "phone": "" } }}


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          4192.168.2.549712104.26.5.154431440C:\ProgramData\MPGPH131\MPGPH131.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-05-02 04:16:25 UTC263OUTGET /demo/home.php?s=191.96.150.225 HTTP/1.1
                                                                                                          Connection: Keep-Alive
                                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                                                                                          Host: db-ip.com
                                                                                                          2024-05-02 04:16:25 UTC650INHTTP/1.1 200 OK
                                                                                                          Date: Thu, 02 May 2024 04:16:25 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Transfer-Encoding: chunked
                                                                                                          Connection: close
                                                                                                          x-iplb-request-id: AC46E6C4:A556_93878F2E:0050_66331399_B1CD272:7B63
                                                                                                          x-iplb-instance: 59128
                                                                                                          CF-Cache-Status: DYNAMIC
                                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tPqLokzyzjuRJWX30DHMwX5w1yZpK2TN81vBW0KtJ9o3q5l9WcHBkxKdz7ieE4PpkgiPKIYHu2gVugT58H62PPLmEXBpR7QtnpSD%2BEjTY7K6MmlasEx72PsQ2Q%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                          Server: cloudflare
                                                                                                          CF-RAY: 87d53221392c7c93-EWR
                                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                                          2024-05-02 04:16:25 UTC85INData Raw: 34 66 0d 0a 7b 22 73 74 61 74 75 73 22 3a 22 6f 6b 22 2c 22 64 65 6d 6f 49 6e 66 6f 22 3a 7b 22 65 72 72 6f 72 22 3a 22 6f 76 65 72 20 71 75 65 72 79 20 6c 69 6d 69 74 2c 20 70 6c 65 61 73 65 20 74 72 79 20 61 67 61 69 6e 20 6c 61 74 65 72 22 7d 7d 0d 0a
                                                                                                          Data Ascii: 4f{"status":"ok","demoInfo":{"error":"over query limit, please try again later"}}
                                                                                                          2024-05-02 04:16:25 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                          Data Ascii: 0


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          5192.168.2.549713104.26.5.154436552C:\ProgramData\MPGPH131\MPGPH131.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-05-02 04:16:25 UTC263OUTGET /demo/home.php?s=191.96.150.225 HTTP/1.1
                                                                                                          Connection: Keep-Alive
                                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                                                                                          Host: db-ip.com
                                                                                                          2024-05-02 04:16:26 UTC658INHTTP/1.1 200 OK
                                                                                                          Date: Thu, 02 May 2024 04:16:26 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Transfer-Encoding: chunked
                                                                                                          Connection: close
                                                                                                          x-iplb-request-id: AC466E2B:2BD4_93878F2E:0050_6633139A_B1F9D6D:4F34
                                                                                                          x-iplb-instance: 59215
                                                                                                          CF-Cache-Status: DYNAMIC
                                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BMItdTY%2F24xdvXBBzlqq1s2u328sJZYWM31eHI7WAE0mzC%2FMv%2BI5NWkcRGxEdcYK4SkqiRkHtLouBkISvcJUTEcMEFaYpEnL6WYEWEulW6VApftslYZ6h7yT%2BQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                          Server: cloudflare
                                                                                                          CF-RAY: 87d532229a9e1861-EWR
                                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                                          2024-05-02 04:16:26 UTC85INData Raw: 34 66 0d 0a 7b 22 73 74 61 74 75 73 22 3a 22 6f 6b 22 2c 22 64 65 6d 6f 49 6e 66 6f 22 3a 7b 22 65 72 72 6f 72 22 3a 22 6f 76 65 72 20 71 75 65 72 79 20 6c 69 6d 69 74 2c 20 70 6c 65 61 73 65 20 74 72 79 20 61 67 61 69 6e 20 6c 61 74 65 72 22 7d 7d 0d 0a
                                                                                                          Data Ascii: 4f{"status":"ok","demoInfo":{"error":"over query limit, please try again later"}}
                                                                                                          2024-05-02 04:16:26 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                          Data Ascii: 0


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          6192.168.2.54972334.117.186.1924432724C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-05-02 04:18:02 UTC239OUTGET /widget/demo/191.96.150.225 HTTP/1.1
                                                                                                          Connection: Keep-Alive
                                                                                                          Referer: https://ipinfo.io/
                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                                                                                          Host: ipinfo.io
                                                                                                          2024-05-02 04:18:02 UTC513INHTTP/1.1 200 OK
                                                                                                          server: nginx/1.24.0
                                                                                                          date: Thu, 02 May 2024 04:18:02 GMT
                                                                                                          content-type: application/json; charset=utf-8
                                                                                                          Content-Length: 921
                                                                                                          access-control-allow-origin: *
                                                                                                          x-frame-options: SAMEORIGIN
                                                                                                          x-xss-protection: 1; mode=block
                                                                                                          x-content-type-options: nosniff
                                                                                                          referrer-policy: strict-origin-when-cross-origin
                                                                                                          x-envoy-upstream-service-time: 2
                                                                                                          via: 1.1 google
                                                                                                          strict-transport-security: max-age=2592000; includeSubDomains
                                                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                          Connection: close
                                                                                                          2024-05-02 04:18:02 UTC742INData Raw: 7b 0a 20 20 22 69 6e 70 75 74 22 3a 20 22 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 22 2c 0a 20 20 22 64 61 74 61 22 3a 20 7b 0a 20 20 20 20 22 69 70 22 3a 20 22 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 22 2c 0a 20 20 20 20 22 63 69 74 79 22 3a 20 22 4e 65 77 20 59 6f 72 6b 20 43 69 74 79 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 6c 6f 63 22 3a 20 22 34 30 2e 37 31 34 33 2c 2d 37 34 2e 30 30 36 30 22 2c 0a 20 20 20 20 22 6f 72 67 22 3a 20 22 41 53 31 37 34 20 43 6f 67 65 6e 74 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 22 2c 0a 20 20 20 20 22 70 6f 73 74 61 6c 22 3a 20 22 31 30 30 30 31 22 2c 0a 20 20 20 20 22 74 69 6d 65 7a 6f 6e
                                                                                                          Data Ascii: { "input": "191.96.150.225", "data": { "ip": "191.96.150.225", "city": "New York City", "region": "New York", "country": "US", "loc": "40.7143,-74.0060", "org": "AS174 Cogent Communications", "postal": "10001", "timezon
                                                                                                          2024-05-02 04:18:02 UTC179INData Raw: 22 3a 20 22 50 72 69 76 61 74 65 20 52 65 73 69 64 65 6e 63 65 22 2c 0a 20 20 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 20 20 22 65 6d 61 69 6c 22 3a 20 22 61 62 75 73 65 40 69 70 78 6f 2e 63 6f 6d 22 2c 0a 20 20 20 20 20 20 22 6e 61 6d 65 22 3a 20 22 50 72 69 76 61 74 65 20 43 75 73 74 6f 6d 65 72 22 2c 0a 20 20 20 20 20 20 22 6e 65 74 77 6f 72 6b 22 3a 20 22 31 39 31 2e 39 36 2e 31 35 30 2e 30 2f 32 34 22 2c 0a 20 20 20 20 20 20 22 70 68 6f 6e 65 22 3a 20 22 22 0a 20 20 20 20 7d 0a 20 20 7d 0a 7d
                                                                                                          Data Ascii: ": "Private Residence", "country": "US", "email": "abuse@ipxo.com", "name": "Private Customer", "network": "191.96.150.0/24", "phone": "" } }}


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          7192.168.2.549724104.26.5.154432724C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-05-02 04:18:07 UTC263OUTGET /demo/home.php?s=191.96.150.225 HTTP/1.1
                                                                                                          Connection: Keep-Alive
                                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                                                                                          Host: db-ip.com
                                                                                                          2024-05-02 04:18:08 UTC662INHTTP/1.1 200 OK
                                                                                                          Date: Thu, 02 May 2024 04:18:08 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Transfer-Encoding: chunked
                                                                                                          Connection: close
                                                                                                          x-iplb-request-id: AC46E6C8:7114_93878F2E:0050_66331400_B1CDDFD:7B63
                                                                                                          x-iplb-instance: 59128
                                                                                                          CF-Cache-Status: DYNAMIC
                                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=w9Ac%2B98JsvT6n0wDRlp0mFsG%2B%2FpcB%2B6l9l5rlq4AQk5Tddy9%2BcXUUnTjDM0etGdLfwqz%2BrPpsLvDwa5PxCYawF1%2Br9lqSp2M1BuXaA215dbKfGVz0ESfwQJ0Gw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                          Server: cloudflare
                                                                                                          CF-RAY: 87d534a0f9f58c81-EWR
                                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                                          2024-05-02 04:18:08 UTC85INData Raw: 34 66 0d 0a 7b 22 73 74 61 74 75 73 22 3a 22 6f 6b 22 2c 22 64 65 6d 6f 49 6e 66 6f 22 3a 7b 22 65 72 72 6f 72 22 3a 22 6f 76 65 72 20 71 75 65 72 79 20 6c 69 6d 69 74 2c 20 70 6c 65 61 73 65 20 74 72 79 20 61 67 61 69 6e 20 6c 61 74 65 72 22 7d 7d 0d 0a
                                                                                                          Data Ascii: 4f{"status":"ok","demoInfo":{"error":"over query limit, please try again later"}}
                                                                                                          2024-05-02 04:18:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                          Data Ascii: 0


                                                                                                          Session IDSource IPSource PortDestination IPDestination Port
                                                                                                          8192.168.2.54972534.117.186.192443
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-05-02 04:18:21 UTC239OUTGET /widget/demo/191.96.150.225 HTTP/1.1
                                                                                                          Connection: Keep-Alive
                                                                                                          Referer: https://ipinfo.io/
                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                                                                                          Host: ipinfo.io
                                                                                                          2024-05-02 04:18:21 UTC513INHTTP/1.1 200 OK
                                                                                                          server: nginx/1.24.0
                                                                                                          date: Thu, 02 May 2024 04:18:21 GMT
                                                                                                          content-type: application/json; charset=utf-8
                                                                                                          Content-Length: 921
                                                                                                          access-control-allow-origin: *
                                                                                                          x-frame-options: SAMEORIGIN
                                                                                                          x-xss-protection: 1; mode=block
                                                                                                          x-content-type-options: nosniff
                                                                                                          referrer-policy: strict-origin-when-cross-origin
                                                                                                          x-envoy-upstream-service-time: 2
                                                                                                          via: 1.1 google
                                                                                                          strict-transport-security: max-age=2592000; includeSubDomains
                                                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                          Connection: close
                                                                                                          2024-05-02 04:18:21 UTC742INData Raw: 7b 0a 20 20 22 69 6e 70 75 74 22 3a 20 22 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 22 2c 0a 20 20 22 64 61 74 61 22 3a 20 7b 0a 20 20 20 20 22 69 70 22 3a 20 22 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 22 2c 0a 20 20 20 20 22 63 69 74 79 22 3a 20 22 4e 65 77 20 59 6f 72 6b 20 43 69 74 79 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 6c 6f 63 22 3a 20 22 34 30 2e 37 31 34 33 2c 2d 37 34 2e 30 30 36 30 22 2c 0a 20 20 20 20 22 6f 72 67 22 3a 20 22 41 53 31 37 34 20 43 6f 67 65 6e 74 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 22 2c 0a 20 20 20 20 22 70 6f 73 74 61 6c 22 3a 20 22 31 30 30 30 31 22 2c 0a 20 20 20 20 22 74 69 6d 65 7a 6f 6e
                                                                                                          Data Ascii: { "input": "191.96.150.225", "data": { "ip": "191.96.150.225", "city": "New York City", "region": "New York", "country": "US", "loc": "40.7143,-74.0060", "org": "AS174 Cogent Communications", "postal": "10001", "timezon
                                                                                                          2024-05-02 04:18:21 UTC179INData Raw: 22 3a 20 22 50 72 69 76 61 74 65 20 52 65 73 69 64 65 6e 63 65 22 2c 0a 20 20 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 20 20 22 65 6d 61 69 6c 22 3a 20 22 61 62 75 73 65 40 69 70 78 6f 2e 63 6f 6d 22 2c 0a 20 20 20 20 20 20 22 6e 61 6d 65 22 3a 20 22 50 72 69 76 61 74 65 20 43 75 73 74 6f 6d 65 72 22 2c 0a 20 20 20 20 20 20 22 6e 65 74 77 6f 72 6b 22 3a 20 22 31 39 31 2e 39 36 2e 31 35 30 2e 30 2f 32 34 22 2c 0a 20 20 20 20 20 20 22 70 68 6f 6e 65 22 3a 20 22 22 0a 20 20 20 20 7d 0a 20 20 7d 0a 7d
                                                                                                          Data Ascii: ": "Private Residence", "country": "US", "email": "abuse@ipxo.com", "name": "Private Customer", "network": "191.96.150.0/24", "phone": "" } }}


                                                                                                          Session IDSource IPSource PortDestination IPDestination Port
                                                                                                          9192.168.2.549726104.26.5.15443
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-05-02 04:18:21 UTC263OUTGET /demo/home.php?s=191.96.150.225 HTTP/1.1
                                                                                                          Connection: Keep-Alive
                                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
                                                                                                          Host: db-ip.com
                                                                                                          2024-05-02 04:18:21 UTC654INHTTP/1.1 200 OK
                                                                                                          Date: Thu, 02 May 2024 04:18:21 GMT
                                                                                                          Content-Type: application/json
                                                                                                          Transfer-Encoding: chunked
                                                                                                          Connection: close
                                                                                                          x-iplb-request-id: AC46739D:3190_93878F2E:0050_6633140D_B1FA9D9:4F34
                                                                                                          x-iplb-instance: 59215
                                                                                                          CF-Cache-Status: DYNAMIC
                                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xjxMyBm8bo7eZbQ0INXCdh6075HBo8rrjaoPaff5PJ4wEjlF0NYPLwpRngXkRBHsDPjeOmIw7y%2F0p73OMuy3BuC%2FZ%2Fjaxa3mWmyJ5w7RsBDMnoVZ0owhNZOk4w%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                          Server: cloudflare
                                                                                                          CF-RAY: 87d534f62eb77286-EWR
                                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                                          2024-05-02 04:18:21 UTC85INData Raw: 34 66 0d 0a 7b 22 73 74 61 74 75 73 22 3a 22 6f 6b 22 2c 22 64 65 6d 6f 49 6e 66 6f 22 3a 7b 22 65 72 72 6f 72 22 3a 22 6f 76 65 72 20 71 75 65 72 79 20 6c 69 6d 69 74 2c 20 70 6c 65 61 73 65 20 74 72 79 20 61 67 61 69 6e 20 6c 61 74 65 72 22 7d 7d 0d 0a
                                                                                                          Data Ascii: 4f{"status":"ok","demoInfo":{"error":"over query limit, please try again later"}}
                                                                                                          2024-05-02 04:18:21 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                          Data Ascii: 0


                                                                                                          Click to jump to process

                                                                                                          Click to jump to process

                                                                                                          Click to dive into process behavior distribution

                                                                                                          Click to jump to process

                                                                                                          Target ID:0
                                                                                                          Start time:06:16:05
                                                                                                          Start date:02/05/2024
                                                                                                          Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exe"
                                                                                                          Imagebase:0x60000
                                                                                                          File size:3'219'456 bytes
                                                                                                          MD5 hash:6BF87E7F53315E6A41DE8E99B6702341
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:Borland Delphi
                                                                                                          Reputation:low
                                                                                                          Has exited:false

                                                                                                          Target ID:2
                                                                                                          Start time:06:16:09
                                                                                                          Start date:02/05/2024
                                                                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
                                                                                                          Imagebase:0xf0000
                                                                                                          File size:187'904 bytes
                                                                                                          MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:3
                                                                                                          Start time:06:16:09
                                                                                                          Start date:02/05/2024
                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                          Wow64 process (32bit):false
                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                          Imagebase:0x7ff6d64d0000
                                                                                                          File size:862'208 bytes
                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:4
                                                                                                          Start time:06:16:09
                                                                                                          Start date:02/05/2024
                                                                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
                                                                                                          Imagebase:0xf0000
                                                                                                          File size:187'904 bytes
                                                                                                          MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:5
                                                                                                          Start time:06:16:09
                                                                                                          Start date:02/05/2024
                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                          Wow64 process (32bit):false
                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                          Imagebase:0x7ff6d64d0000
                                                                                                          File size:862'208 bytes
                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:6
                                                                                                          Start time:06:16:11
                                                                                                          Start date:02/05/2024
                                                                                                          Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                                                                                                          Imagebase:0xed0000
                                                                                                          File size:3'219'456 bytes
                                                                                                          MD5 hash:6BF87E7F53315E6A41DE8E99B6702341
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:Borland Delphi
                                                                                                          Antivirus matches:
                                                                                                          • Detection: 100%, Avira
                                                                                                          • Detection: 50%, ReversingLabs
                                                                                                          • Detection: 51%, Virustotal, Browse
                                                                                                          Reputation:low
                                                                                                          Has exited:false

                                                                                                          Target ID:7
                                                                                                          Start time:06:16:11
                                                                                                          Start date:02/05/2024
                                                                                                          Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                                                                                                          Imagebase:0xed0000
                                                                                                          File size:3'219'456 bytes
                                                                                                          MD5 hash:6BF87E7F53315E6A41DE8E99B6702341
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:Borland Delphi
                                                                                                          Reputation:low
                                                                                                          Has exited:false

                                                                                                          Target ID:8
                                                                                                          Start time:06:16:20
                                                                                                          Start date:02/05/2024
                                                                                                          Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                                                                                                          Imagebase:0x7d0000
                                                                                                          File size:3'219'456 bytes
                                                                                                          MD5 hash:6BF87E7F53315E6A41DE8E99B6702341
                                                                                                          Has elevated privileges:false
                                                                                                          Has administrator privileges:false
                                                                                                          Programmed in:Borland Delphi
                                                                                                          Antivirus matches:
                                                                                                          • Detection: 100%, Avira
                                                                                                          • Detection: 50%, ReversingLabs
                                                                                                          • Detection: 51%, Virustotal, Browse
                                                                                                          Reputation:low
                                                                                                          Has exited:false

                                                                                                          Target ID:10
                                                                                                          Start time:06:16:28
                                                                                                          Start date:02/05/2024
                                                                                                          Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                                                                                                          Imagebase:0x7d0000
                                                                                                          File size:3'219'456 bytes
                                                                                                          MD5 hash:6BF87E7F53315E6A41DE8E99B6702341
                                                                                                          Has elevated privileges:false
                                                                                                          Has administrator privileges:false
                                                                                                          Programmed in:Borland Delphi
                                                                                                          Reputation:low
                                                                                                          Has exited:false

                                                                                                          Reset < >

                                                                                                            Execution Graph

                                                                                                            Execution Coverage:4.8%
                                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                                            Signature Coverage:52.3%
                                                                                                            Total number of Nodes:1004
                                                                                                            Total number of Limit Nodes:9
                                                                                                            execution_graph 29355 124eb0 29356 12527c 29355->29356 29359 124eee std::ios_base::_Ios_base_dtor __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 29355->29359 29357 124f37 setsockopt recv WSAGetLastError 29357->29356 29357->29359 29359->29357 29360 125267 Sleep 29359->29360 29362 1251c5 recv 29359->29362 29363 12525f Sleep 29359->29363 29368 125291 29359->29368 29370 125086 setsockopt recv 29359->29370 29371 78dc0 43 API calls 29359->29371 29375 125940 WSAStartup 29359->29375 29388 78dc0 29359->29388 29397 763b0 29359->29397 29402 1252a0 29359->29402 29461 93059 29359->29461 29464 69280 29359->29464 29360->29356 29360->29359 29362->29363 29363->29360 29365 124fdd recv 29365->29359 29366 124ffe recv 29365->29366 29366->29359 29474 98c60 41 API calls 2 library calls 29368->29474 29370->29359 29371->29370 29376 125a46 29375->29376 29377 125978 29375->29377 29376->29359 29377->29376 29378 1259ae getaddrinfo 29377->29378 29379 125a40 WSACleanup 29378->29379 29380 1259f6 29378->29380 29379->29376 29381 125a54 FreeAddrInfoW 29380->29381 29383 125a04 socket 29380->29383 29381->29379 29382 125a60 29381->29382 29382->29359 29383->29379 29384 125a1a connect 29383->29384 29385 125a50 29384->29385 29386 125a2c closesocket 29384->29386 29385->29381 29386->29383 29387 125a36 FreeAddrInfoW 29386->29387 29387->29379 29389 78e11 29388->29389 29391 78de2 __fread_nolock 29388->29391 29390 78ef8 29389->29390 29475 632d0 29389->29475 29391->29365 29393 78e66 __fread_nolock std::_Locinfo::_Locinfo_ctor 29394 78ecb __fread_nolock std::_Locinfo::_Locinfo_ctor 29393->29394 29489 62fe0 41 API calls 2 library calls 29393->29489 29394->29365 29396 78eb8 29396->29365 29399 763d8 29397->29399 29398 763e7 29398->29359 29399->29398 29400 632d0 std::_Throw_Cpp_error 43 API calls 29399->29400 29401 7642a std::_Locinfo::_Locinfo_ctor 29400->29401 29401->29359 29403 1252ee 29402->29403 29404 12531c 29402->29404 29522 62cf0 43 API calls std::_Throw_Cpp_error 29403->29522 29406 125324 29404->29406 29407 12533e 29404->29407 29523 76290 43 API calls 29406->29523 29410 125360 29407->29410 29411 125346 29407->29411 29408 125300 29412 69280 46 API calls 29408->29412 29414 125385 29410->29414 29415 125368 29410->29415 29524 76290 43 API calls 29411->29524 29429 125314 29412->29429 29416 1253ab 29414->29416 29417 12538d 29414->29417 29415->29429 29525 76290 43 API calls 29415->29525 29420 125670 29416->29420 29421 1253cb 29416->29421 29416->29429 29526 a12a7 51 API calls __fread_nolock 29417->29526 29423 1256cb 29420->29423 29424 125678 29420->29424 29527 65400 88 API calls std::_Throw_Cpp_error 29421->29527 29426 1256d3 29423->29426 29427 125726 29423->29427 29515 7b430 29424->29515 29430 7b430 56 API calls 29426->29430 29431 125781 29427->29431 29432 12572e 29427->29432 29428 1253f0 29444 1254bb 29428->29444 29459 125629 29428->29459 29528 62cf0 43 API calls std::_Throw_Cpp_error 29428->29528 29529 7ace0 43 API calls 29428->29529 29429->29359 29430->29429 29433 125789 29431->29433 29434 1257dc 29431->29434 29435 7b430 56 API calls 29432->29435 29436 7b430 56 API calls 29433->29436 29437 125834 29434->29437 29438 1257e4 29434->29438 29435->29429 29436->29429 29437->29429 29544 b8af0 53 API calls 2 library calls 29437->29544 29441 7b430 56 API calls 29438->29441 29441->29429 29530 62d30 43 API calls std::_Throw_Cpp_error 29444->29530 29446 1254df 29531 133670 45 API calls 5 library calls 29446->29531 29448 1254f0 29449 125562 GetCurrentProcess 29448->29449 29453 125595 29448->29453 29450 763b0 std::_Throw_Cpp_error 43 API calls 29449->29450 29451 12557e 29450->29451 29532 12c630 64 API calls 3 library calls 29451->29532 29533 99810 29453->29533 29454 12558d 29454->29459 29458 125623 29537 9d098 29458->29537 29543 92b9a RtlReleaseSRWLockExclusive 29459->29543 29966 9360d 29461->29966 29465 763b0 std::_Throw_Cpp_error 43 API calls 29464->29465 29466 692d4 29465->29466 29467 78dc0 43 API calls 29466->29467 29468 69523 std::_Locinfo::_Locinfo_ctor 29466->29468 29467->29468 29469 695f0 GetModuleHandleA GetProcAddress WSASend 29468->29469 29471 696e2 std::ios_base::_Ios_base_dtor 29468->29471 29469->29468 29469->29471 29470 6975d std::ios_base::_Ios_base_dtor 29470->29359 29471->29470 29971 98c60 41 API calls 2 library calls 29471->29971 29476 63306 29475->29476 29477 632e2 29475->29477 29480 63318 29476->29480 29482 93662 std::_Facet_Register 43 API calls 29476->29482 29478 6331f 29477->29478 29479 632e9 29477->29479 29501 62b50 43 API calls 3 library calls 29478->29501 29490 93662 29479->29490 29480->29393 29485 63310 29482->29485 29484 632ef 29486 632f8 29484->29486 29502 98c60 41 API calls 2 library calls 29484->29502 29485->29393 29486->29393 29489->29396 29493 93667 29490->29493 29492 93681 29492->29484 29493->29492 29496 62b50 Concurrency::cancel_current_task 29493->29496 29503 a23dc 29493->29503 29512 a5a79 RtlEnterCriticalSection RtlLeaveCriticalSection std::_Facet_Register 29493->29512 29495 9368d 29495->29495 29496->29495 29510 951eb RaiseException 29496->29510 29498 62b6c 29511 94b05 42 API calls 2 library calls 29498->29511 29500 62bac 29500->29484 29501->29484 29509 ab086 __Getctype 29503->29509 29504 ab0c4 29514 a16ef 14 API calls __dosmaperr 29504->29514 29505 ab0af RtlAllocateHeap 29507 ab0c2 29505->29507 29505->29509 29507->29493 29509->29504 29509->29505 29513 a5a79 RtlEnterCriticalSection RtlLeaveCriticalSection std::_Facet_Register 29509->29513 29510->29498 29511->29500 29512->29493 29513->29509 29514->29507 29545 77ef0 29515->29545 29517 7b48d 29564 82100 29517->29564 29521 7b503 29521->29429 29522->29408 29523->29429 29524->29429 29525->29429 29526->29429 29527->29428 29528->29428 29530->29446 29531->29448 29532->29454 29742 9974e 29533->29742 29536 a1618 76 API calls __fread_nolock 29536->29458 29538 9d0ab __fread_nolock 29537->29538 29795 9cf73 29538->29795 29540 9d0b7 29806 9898c 41 API calls __fread_nolock 29540->29806 29542 9d0c3 29542->29459 29543->29429 29544->29429 29546 78034 29545->29546 29547 77f1d 29545->29547 29558 77f29 29546->29558 29628 62cf0 43 API calls std::_Throw_Cpp_error 29546->29628 29548 77f24 29547->29548 29549 77f83 29547->29549 29550 77fcb 29547->29550 29551 77f7c 29547->29551 29552 77f2b 29547->29552 29626 7c3a0 43 API calls std::_Facet_Register 29548->29626 29557 93662 std::_Facet_Register 43 API calls 29549->29557 29550->29517 29627 7cf80 43 API calls 2 library calls 29551->29627 29554 93662 std::_Facet_Register 43 API calls 29552->29554 29554->29558 29557->29558 29558->29517 29559 7804f 29629 67f90 43 API calls 2 library calls 29559->29629 29561 78062 29630 951eb RaiseException 29561->29630 29563 78073 29565 8215f 29564->29565 29631 a132b 29565->29631 29569 7b4f0 29570 7db10 29569->29570 29571 7db56 29570->29571 29572 7de3d 29570->29572 29722 7ebb0 43 API calls 29571->29722 29574 7fd70 43 API calls 29572->29574 29576 7de87 29574->29576 29575 7dba4 29578 7fd70 43 API calls 29575->29578 29615 7df4f std::ios_base::_Ios_base_dtor 29576->29615 29731 7eda0 56 API calls 2 library calls 29576->29731 29580 7dbc1 29578->29580 29579 7dee2 29732 675c0 43 API calls 2 library calls 29579->29732 29624 7dcc3 std::ios_base::_Ios_base_dtor 29580->29624 29723 7eda0 56 API calls 2 library calls 29580->29723 29581 77ef0 43 API calls 29584 7dfc7 29581->29584 29582 7de38 std::ios_base::_Ios_base_dtor 29582->29521 29584->29582 29735 98c60 41 API calls 2 library calls 29584->29735 29585 7df06 29733 7f440 56 API calls 3 library calls 29585->29733 29587 7dd82 29595 77ef0 43 API calls 29587->29595 29599 7dd9f 29587->29599 29588 7dcec 29592 77ef0 43 API calls 29588->29592 29591 7dc1c 29724 675c0 43 API calls 2 library calls 29591->29724 29621 7dd01 29592->29621 29593 7e06f 29736 790b0 42 API calls 29593->29736 29595->29599 29597 7e093 29739 790b0 42 API calls 29597->29739 29598 7dc40 29725 7f440 56 API calls 3 library calls 29598->29725 29728 735b0 41 API calls 2 library calls 29599->29728 29600 7e07d 29737 951eb RaiseException 29600->29737 29603 7e0a1 29740 951eb RaiseException 29603->29740 29606 7df1f 29606->29597 29734 67a20 14 API calls ___std_exception_destroy 29606->29734 29607 7dc56 29607->29593 29608 7dc6b 29607->29608 29726 67a20 14 API calls ___std_exception_destroy 29608->29726 29610 7dd6c 29729 735b0 41 API calls 2 library calls 29610->29729 29611 7e08e 29738 98c60 41 API calls 2 library calls 29611->29738 29613 7e0b2 29741 98c60 41 API calls 2 library calls 29613->29741 29615->29581 29615->29584 29615->29613 29727 735b0 41 API calls 2 library calls 29621->29727 29622 7de26 29730 735b0 41 API calls 2 library calls 29622->29730 29624->29587 29624->29588 29625 7dc86 29625->29611 29625->29624 29626->29558 29627->29558 29628->29559 29629->29561 29630->29563 29650 a9e32 GetLastError 29631->29650 29636 7fd70 29639 7fde4 29636->29639 29640 7fd84 29636->29640 29638 7ff6c 29638->29569 29645 7fe74 29639->29645 29716 801e0 43 API calls 29639->29716 29643 7fdc2 29640->29643 29697 89e20 29640->29697 29643->29639 29644 89e20 43 API calls 29643->29644 29647 7fe58 29643->29647 29644->29647 29645->29569 29646 7fecc 29646->29638 29649 89e20 43 API calls 29646->29649 29717 808f0 43 API calls 29646->29717 29647->29645 29715 81430 43 API calls 29647->29715 29649->29646 29651 a9e48 29650->29651 29652 a9e4e 29650->29652 29681 ab64e 6 API calls std::locale::_Setgloballocale 29651->29681 29675 a9e52 SetLastError 29652->29675 29682 ab68d 6 API calls std::locale::_Setgloballocale 29652->29682 29655 a9e6a 29655->29675 29683 aa64c 14 API calls 3 library calls 29655->29683 29658 a9e7f 29661 a9e98 29658->29661 29662 a9e87 29658->29662 29659 a1336 29677 aa11f 29659->29677 29660 a9ee7 29694 a41b6 41 API calls 2 library calls 29660->29694 29685 ab68d 6 API calls std::locale::_Setgloballocale 29661->29685 29684 ab68d 6 API calls std::locale::_Setgloballocale 29662->29684 29666 a9eec 29667 a9e95 29687 ab00c 29667->29687 29668 a9ea4 29669 a9ea8 29668->29669 29670 a9ebf 29668->29670 29686 ab68d 6 API calls std::locale::_Setgloballocale 29669->29686 29693 a9c60 14 API calls __Getctype 29670->29693 29674 a9eca 29676 ab00c ___std_exception_destroy 14 API calls 29674->29676 29675->29659 29675->29660 29676->29675 29678 8225f 29677->29678 29679 aa132 29677->29679 29678->29636 29679->29678 29696 b2380 41 API calls 3 library calls 29679->29696 29681->29652 29682->29655 29683->29658 29684->29667 29685->29668 29686->29667 29688 ab017 RtlFreeHeap 29687->29688 29692 ab041 29687->29692 29689 ab02c GetLastError 29688->29689 29688->29692 29690 ab039 __dosmaperr 29689->29690 29695 a16ef 14 API calls __dosmaperr 29690->29695 29692->29675 29693->29674 29694->29666 29695->29692 29696->29678 29698 89e62 29697->29698 29699 89f76 29697->29699 29701 89e7c 29698->29701 29703 89eca 29698->29703 29704 89eba 29698->29704 29719 63330 43 API calls 29699->29719 29706 93662 std::_Facet_Register 43 API calls 29701->29706 29702 89f7b 29720 62b50 43 API calls 3 library calls 29702->29720 29707 93662 std::_Facet_Register 43 API calls 29703->29707 29712 89e9a std::_Locinfo::_Locinfo_ctor 29703->29712 29704->29701 29704->29702 29709 89e8f 29706->29709 29707->29712 29708 89f80 29721 98c60 41 API calls 2 library calls 29708->29721 29709->29708 29709->29712 29718 877d0 41 API calls 2 library calls 29712->29718 29714 89f47 29714->29643 29715->29639 29716->29646 29717->29646 29718->29714 29720->29708 29722->29575 29723->29591 29724->29598 29725->29607 29726->29625 29727->29610 29728->29610 29729->29622 29730->29582 29731->29579 29732->29585 29733->29606 29734->29615 29736->29600 29737->29611 29739->29603 29740->29613 29745 9975a __fread_nolock 29742->29745 29743 99761 29767 a16ef 14 API calls __dosmaperr 29743->29767 29745->29743 29747 99781 29745->29747 29746 99766 29768 98c50 41 API calls __fread_nolock 29746->29768 29749 99793 29747->29749 29750 99786 29747->29750 29759 aa8e1 29749->29759 29769 a16ef 14 API calls __dosmaperr 29750->29769 29751 99771 29751->29459 29751->29536 29755 997b0 29771 997ee RtlLeaveCriticalSection __fread_nolock 29755->29771 29756 997a3 29770 a16ef 14 API calls __dosmaperr 29756->29770 29760 aa8ed __fread_nolock 29759->29760 29772 a423b RtlEnterCriticalSection 29760->29772 29762 aa8fb 29773 aa985 29762->29773 29767->29746 29768->29751 29769->29751 29770->29751 29771->29751 29772->29762 29774 aa9a8 29773->29774 29775 aaa00 29774->29775 29782 aa908 29774->29782 29789 a1240 RtlEnterCriticalSection 29774->29789 29790 a1254 RtlLeaveCriticalSection 29774->29790 29791 aa64c 14 API calls 3 library calls 29775->29791 29778 aaa09 29779 ab00c ___std_exception_destroy 14 API calls 29778->29779 29780 aaa12 29779->29780 29780->29782 29792 ab7e6 6 API calls std::locale::_Setgloballocale 29780->29792 29786 aa941 29782->29786 29783 aaa31 29793 a1240 RtlEnterCriticalSection 29783->29793 29794 a4283 RtlLeaveCriticalSection 29786->29794 29788 9979c 29788->29755 29788->29756 29789->29774 29790->29774 29791->29778 29792->29783 29793->29782 29794->29788 29796 9cf7f __fread_nolock 29795->29796 29797 9cf89 29796->29797 29798 9cfac 29796->29798 29822 98bd3 41 API calls 2 library calls 29797->29822 29805 9cfa4 29798->29805 29807 a1240 RtlEnterCriticalSection 29798->29807 29801 9cfca 29808 9d00a 29801->29808 29803 9cfd7 29823 9d002 RtlLeaveCriticalSection __fread_nolock 29803->29823 29805->29540 29806->29542 29807->29801 29809 9d03a 29808->29809 29810 9d017 29808->29810 29812 9d032 29809->29812 29824 99a81 29809->29824 29848 98bd3 41 API calls 2 library calls 29810->29848 29812->29803 29818 9d066 29841 a8d1c 29818->29841 29821 ab00c ___std_exception_destroy 14 API calls 29821->29812 29822->29805 29823->29805 29825 99a9a 29824->29825 29826 99ac1 29824->29826 29825->29826 29827 aa1db __fread_nolock 41 API calls 29825->29827 29830 ab046 29826->29830 29828 99ab6 29827->29828 29849 a9668 29828->29849 29831 ab05d 29830->29831 29832 9d05a 29830->29832 29831->29832 29833 ab00c ___std_exception_destroy 14 API calls 29831->29833 29834 aa1db 29832->29834 29833->29832 29835 aa1fc 29834->29835 29836 aa1e7 29834->29836 29835->29818 29939 a16ef 14 API calls __dosmaperr 29836->29939 29838 aa1ec 29940 98c50 41 API calls __fread_nolock 29838->29940 29840 aa1f7 29840->29818 29842 a8d45 29841->29842 29843 9d06d 29841->29843 29844 a8d94 29842->29844 29846 a8d6c 29842->29846 29843->29812 29843->29821 29949 98bd3 41 API calls 2 library calls 29844->29949 29941 a8c8b 29846->29941 29848->29812 29851 a9674 __fread_nolock 29849->29851 29850 a967c 29850->29826 29851->29850 29852 a96b5 29851->29852 29854 a96fb 29851->29854 29889 98bd3 41 API calls 2 library calls 29852->29889 29860 ae6b2 RtlEnterCriticalSection 29854->29860 29856 a971f 29890 a9771 RtlLeaveCriticalSection 29856->29890 29857 a9701 29857->29856 29861 a9779 29857->29861 29860->29857 29862 a97a1 29861->29862 29888 a97c4 __fread_nolock 29861->29888 29863 a97a5 29862->29863 29865 a9800 29862->29865 29898 98bd3 41 API calls 2 library calls 29863->29898 29866 a981e 29865->29866 29899 a262d 29865->29899 29891 a92be 29866->29891 29870 a987d 29872 a9891 29870->29872 29873 a98e6 WriteFile 29870->29873 29871 a9836 29874 a983e 29871->29874 29875 a9865 29871->29875 29878 a9899 29872->29878 29879 a98d2 29872->29879 29876 a9908 GetLastError 29873->29876 29873->29888 29874->29888 29902 a9256 6 API calls 29874->29902 29903 a8e8f 55 API calls 2 library calls 29875->29903 29876->29888 29882 a98be 29878->29882 29883 a989e 29878->29883 29906 a933b 7 API calls _ValidateLocalCookies 29879->29906 29905 a94ff 8 API calls 2 library calls 29882->29905 29885 a98a7 29883->29885 29883->29888 29884 a9878 29884->29888 29904 a9416 7 API calls _ValidateLocalCookies 29885->29904 29888->29856 29889->29850 29890->29850 29907 b3bd1 29891->29907 29893 a9334 29893->29870 29893->29871 29894 a92fe 29894->29893 29897 a9318 GetConsoleMode 29894->29897 29895 a92d0 29895->29893 29895->29894 29916 9e1c0 51 API calls 2 library calls 29895->29916 29897->29893 29898->29888 29920 a250c 29899->29920 29901 a2646 29901->29866 29902->29888 29903->29884 29904->29888 29905->29884 29906->29884 29908 b3beb 29907->29908 29909 b3bde 29907->29909 29912 b3bf7 29908->29912 29918 a16ef 14 API calls __dosmaperr 29908->29918 29917 a16ef 14 API calls __dosmaperr 29909->29917 29911 b3be3 29911->29895 29912->29895 29914 b3c18 29919 98c50 41 API calls __fread_nolock 29914->29919 29916->29894 29917->29911 29918->29914 29919->29911 29926 ae92e 29920->29926 29922 a251e 29923 a253a SetFilePointerEx 29922->29923 29925 a2526 __fread_nolock 29922->29925 29924 a2552 GetLastError 29923->29924 29923->29925 29924->29925 29925->29901 29927 ae93b 29926->29927 29931 ae950 29926->29931 29928 a16dc __dosmaperr 14 API calls 29927->29928 29930 ae940 29928->29930 29929 a16dc __dosmaperr 14 API calls 29933 ae980 29929->29933 29934 a16ef __dosmaperr 14 API calls 29930->29934 29931->29929 29932 ae975 29931->29932 29932->29922 29935 a16ef __dosmaperr 14 API calls 29933->29935 29936 ae948 29934->29936 29937 ae988 29935->29937 29936->29922 29938 98c50 __fread_nolock 41 API calls 29937->29938 29938->29936 29939->29838 29940->29840 29942 a8c97 __fread_nolock 29941->29942 29950 ae6b2 RtlEnterCriticalSection 29942->29950 29944 a8ca5 29945 a8cd6 29944->29945 29951 a8def 29944->29951 29964 a8d10 RtlLeaveCriticalSection 29945->29964 29948 a8cf9 29948->29843 29949->29843 29950->29944 29952 ae92e __fread_nolock 41 API calls 29951->29952 29955 a8dff 29952->29955 29953 a8e05 29965 ae89d 15 API calls __dosmaperr 29953->29965 29955->29953 29956 a8e37 29955->29956 29957 ae92e __fread_nolock 41 API calls 29955->29957 29956->29953 29958 ae92e __fread_nolock 41 API calls 29956->29958 29959 a8e2e 29957->29959 29960 a8e43 FindCloseChangeNotification 29958->29960 29961 ae92e __fread_nolock 41 API calls 29959->29961 29960->29953 29962 a8e4f GetLastError 29960->29962 29961->29956 29962->29953 29963 a8e5d __fread_nolock 29963->29945 29964->29948 29965->29963 29967 93649 GetSystemTimeAsFileTime 29966->29967 29968 9363d GetSystemTimePreciseAsFileTime 29966->29968 29969 93067 29967->29969 29968->29969 29969->29359 30540 b2d4d 52 API calls 3 library calls 30548 80320 53 API calls __dosmaperr 30545 972c0 20 API calls 4 library calls 30539 92902 9 API calls 3 library calls 30550 b2f65 55 API calls 3 library calls 30553 35ebc4 LoadStringA 30541 b31b8 53 API calls 3 library calls 30536 91c9d RaiseException Concurrency::cancel_current_task std::_Throw_Cpp_error 30542 b25fe 52 API calls 3 library calls 29972 f0019 29976 effb2 29972->29976 29973 f0026 30506 78f00 43 API calls 3 library calls 29973->30506 29976->29972 29976->29973 29984 effcd 29976->29984 29997 f1680 29976->29997 30505 63040 43 API calls 2 library calls 29976->30505 29979 f00c0 30507 f13f0 47 API calls 2 library calls 29979->30507 29981 f0553 30514 785d0 79 API calls 3 library calls 29981->30514 29983 f0594 30515 98c60 41 API calls 2 library calls 29983->30515 29990 f011a 30508 7e8a0 43 API calls 2 library calls 29990->30508 30509 7ad80 43 API calls std::_Throw_Cpp_error 29990->30509 30510 7ab20 43 API calls 29990->30510 30511 f0ba0 48 API calls 4 library calls 29990->30511 29993 632d0 std::_Throw_Cpp_error 43 API calls 29996 f00e7 std::ios_base::_Ios_base_dtor std::_Locinfo::_Locinfo_ctor 29993->29996 29994 763b0 43 API calls std::_Throw_Cpp_error 29994->29996 29996->29981 29996->29983 29996->29990 29996->29993 29996->29994 30512 f05a0 105 API calls 5 library calls 29996->30512 30513 82ac0 43 API calls 4 library calls 29996->30513 29998 a23dc ___std_exception_copy 15 API calls 29997->29998 29999 f16c5 __fread_nolock 29998->29999 30000 a23dc ___std_exception_copy 15 API calls 29999->30000 30001 f16e4 __fread_nolock 30000->30001 30002 f16f7 RegOpenKeyExA 30001->30002 30003 f1a3b 30002->30003 30004 f18b7 RegQueryValueExA RegCloseKey 30002->30004 30003->29976 30004->30003 30005 f18e5 30004->30005 30516 63040 43 API calls 2 library calls 30005->30516 30007 f190a 30008 f1939 30007->30008 30009 f1a50 30007->30009 30517 63040 43 API calls 2 library calls 30008->30517 30522 79e60 43 API calls 30009->30522 30012 f1a55 30523 98c60 41 API calls 2 library calls 30012->30523 30014 f1955 std::_Locinfo::_Locinfo_ctor 30014->30012 30015 f19b7 std::ios_base::_Ios_base_dtor 30014->30015 30518 a1c86 30015->30518 30017 f1a5f __fread_nolock 30020 f1ab5 SHGetFolderPathA 30017->30020 30022 f1c20 30020->30022 30021 f1a09 std::ios_base::_Ios_base_dtor 30021->29976 30022->30022 30023 63040 std::_Throw_Cpp_error 43 API calls 30022->30023 30024 f1c3c 30023->30024 30025 7fbf0 43 API calls 30024->30025 30028 f1c6d std::ios_base::_Ios_base_dtor 30025->30028 30026 144050 89 API calls 30031 f1d2d 30026->30031 30027 f3299 30029 98c60 std::_Throw_Cpp_error 41 API calls 30027->30029 30028->30026 30028->30027 30030 f329e 30029->30030 30034 77ef0 43 API calls 30030->30034 30031->30030 30032 f324d 30031->30032 30033 7e8a0 43 API calls 30031->30033 30032->29976 30035 f1e13 30033->30035 30036 f32fd 30034->30036 30037 144050 89 API calls 30035->30037 30038 740c0 105 API calls 30036->30038 30039 f1e34 30037->30039 30040 f3328 30038->30040 30039->30032 30044 7ab20 43 API calls 30039->30044 30041 f33dc 30040->30041 30045 77ef0 43 API calls 30040->30045 30042 f3e1d 30041->30042 30043 f33f7 30041->30043 30049 62cf0 std::_Throw_Cpp_error 43 API calls 30042->30049 30047 63040 std::_Throw_Cpp_error 43 API calls 30043->30047 30046 f1f64 30044->30046 30045->30041 30048 99810 43 API calls 30046->30048 30060 f343d std::ios_base::_Ios_base_dtor 30047->30060 30050 f1f80 30048->30050 30051 f3e30 30049->30051 30054 f1f98 30050->30054 30055 f1f9e 30050->30055 30052 7ace0 43 API calls 30051->30052 30053 f3e45 30052->30053 30056 67cf0 43 API calls 30053->30056 30058 9d098 79 API calls 30054->30058 30057 7ab20 43 API calls 30055->30057 30059 f3e5d 30056->30059 30062 f205c FindFirstFileA 30057->30062 30058->30055 30064 951eb std::_Throw_Cpp_error RaiseException 30059->30064 30061 f3503 CredEnumerateA 30060->30061 30063 f3e71 30060->30063 30083 f3d70 30061->30083 30142 f352b std::ios_base::_Ios_base_dtor 30061->30142 30066 f24a2 30062->30066 30122 f2090 std::ios_base::_Ios_base_dtor 30062->30122 30065 98c60 std::_Throw_Cpp_error 41 API calls 30063->30065 30064->30063 30068 f3e76 30065->30068 30072 f320e 30066->30072 30073 7ab20 43 API calls 30066->30073 30067 f3d57 30070 f3d61 GetPEB 30067->30070 30067->30083 30077 62cf0 std::_Throw_Cpp_error 43 API calls 30068->30077 30069 f2484 FindNextFileA 30071 f249b FindClose 30069->30071 30069->30122 30070->30083 30071->30066 30080 785d0 79 API calls 30072->30080 30074 f254f CreateDirectoryA 30073->30074 30074->30072 30076 f257d 30074->30076 30075 7ab20 43 API calls 30075->30122 30078 7ab20 43 API calls 30076->30078 30079 f3e8a 30077->30079 30081 f261b CreateDirectoryA 30078->30081 30082 7ace0 43 API calls 30079->30082 30084 f324a 30080->30084 30085 f2643 30081->30085 30086 f31ff 30081->30086 30087 f3e9f 30082->30087 30083->29976 30084->30032 30092 7ab20 43 API calls 30085->30092 30172 f27cb 30085->30172 30089 143b20 97 API calls 30086->30089 30090 67cf0 43 API calls 30087->30090 30088 78f00 std::_Throw_Cpp_error 43 API calls 30088->30122 30089->30072 30093 f3eb7 30090->30093 30091 77ef0 43 API calls 30091->30142 30095 f26eb 30092->30095 30096 951eb std::_Throw_Cpp_error RaiseException 30093->30096 30094 7abb0 43 API calls 30094->30122 30100 7ab20 43 API calls 30095->30100 30098 f3ecb 30096->30098 30097 7cf80 43 API calls 30097->30142 30106 77ef0 43 API calls 30098->30106 30099 99810 43 API calls 30099->30122 30103 f279e CopyFileA 30100->30103 30101 f31ed 30101->30072 30104 143b20 97 API calls 30101->30104 30102 78dc0 43 API calls 30102->30142 30103->30172 30104->30086 30107 f3f2f 30106->30107 30108 740c0 105 API calls 30107->30108 30109 f3f59 30108->30109 30110 7af80 43 API calls 30109->30110 30115 f3ff4 __fread_nolock 30110->30115 30111 63040 std::_Throw_Cpp_error 43 API calls 30111->30142 30112 144050 89 API calls 30112->30172 30113 9d098 79 API calls 30113->30122 30114 f294d CreateDirectoryA 30114->30172 30117 f4012 SHGetFolderPathA 30115->30117 30116 7ab20 43 API calls 30116->30172 30118 7ac50 43 API calls 30117->30118 30119 f403f 30118->30119 30121 7ab20 43 API calls 30119->30121 30120 63040 std::_Throw_Cpp_error 43 API calls 30120->30122 30123 f40e4 __fread_nolock 30121->30123 30122->30027 30122->30069 30122->30075 30122->30088 30122->30094 30122->30099 30122->30113 30122->30120 30124 842a0 43 API calls 30122->30124 30125 f40fe GetPrivateProfileSectionNamesA 30123->30125 30124->30122 30174 f4131 std::ios_base::_Ios_base_dtor __fread_nolock std::_Locinfo::_Locinfo_ctor 30125->30174 30126 a0f9e 51 API calls 30126->30174 30127 8c070 43 API calls 30127->30142 30128 f2c12 CopyFileA 30128->30172 30129 f606e lstrlen 30136 f6084 30129->30136 30129->30174 30130 7af80 43 API calls 30130->30142 30131 f4222 GetPrivateProfileStringA 30131->30174 30132 93662 std::_Facet_Register 43 API calls 30132->30142 30133 f616b 30137 98c60 std::_Throw_Cpp_error 41 API calls 30133->30137 30134 7e8a0 43 API calls 30134->30174 30135 763b0 std::_Throw_Cpp_error 43 API calls 30135->30142 30136->29976 30139 f6175 30137->30139 30138 7abb0 43 API calls 30138->30174 30141 62cf0 std::_Throw_Cpp_error 43 API calls 30139->30141 30140 7ad80 43 API calls 30140->30172 30143 f618c 30141->30143 30142->30063 30142->30067 30142->30068 30142->30091 30142->30097 30142->30102 30142->30111 30142->30127 30142->30130 30142->30132 30142->30135 30144 736c0 105 API calls 30142->30144 30145 7ace0 43 API calls 30143->30145 30144->30142 30146 f61a1 30145->30146 30147 67cf0 43 API calls 30146->30147 30148 f61b9 30147->30148 30150 951eb std::_Throw_Cpp_error RaiseException 30148->30150 30149 99810 43 API calls 30149->30172 30152 f61cd 30150->30152 30151 7ab20 43 API calls 30151->30174 30155 77ef0 43 API calls 30152->30155 30153 99810 43 API calls 30153->30174 30154 9d098 79 API calls 30154->30172 30158 f622f 30155->30158 30156 143b20 97 API calls 30156->30172 30157 9d098 79 API calls 30157->30174 30160 740c0 105 API calls 30158->30160 30159 63040 43 API calls std::_Throw_Cpp_error 30159->30174 30162 f6259 30160->30162 30161 77ef0 43 API calls 30161->30174 30163 7af80 43 API calls 30162->30163 30171 f62f4 __fread_nolock 30163->30171 30164 740c0 105 API calls 30164->30174 30165 7abb0 43 API calls 30165->30172 30166 f3140 CopyFileA 30166->30172 30167 632d0 43 API calls std::_Throw_Cpp_error 30167->30174 30168 143880 46 API calls 30168->30174 30169 7c3a0 43 API calls 30302 f4b54 std::ios_base::_Ios_base_dtor __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 30169->30302 30170 f60c3 30178 62cf0 std::_Throw_Cpp_error 43 API calls 30170->30178 30173 f6312 SHGetFolderPathA 30171->30173 30172->30101 30172->30112 30172->30114 30172->30116 30172->30128 30172->30140 30172->30149 30172->30154 30172->30156 30172->30165 30172->30166 30176 7ac50 43 API calls 30173->30176 30174->30126 30174->30129 30174->30131 30174->30133 30174->30134 30174->30138 30174->30151 30174->30153 30174->30157 30174->30159 30174->30161 30174->30164 30174->30167 30174->30168 30174->30170 30177 785d0 79 API calls 30174->30177 30182 76130 43 API calls 30174->30182 30174->30302 30175 780a0 43 API calls 30175->30302 30179 f633f 30176->30179 30177->30174 30181 f60da 30178->30181 30180 7ab20 43 API calls 30179->30180 30184 f63e4 __fread_nolock 30180->30184 30183 7ace0 43 API calls 30181->30183 30182->30174 30186 f60ef 30183->30186 30188 f63fe GetPrivateProfileSectionNamesA 30184->30188 30185 133b40 151 API calls 30185->30302 30187 67cf0 43 API calls 30186->30187 30189 f6107 30187->30189 30240 f6434 __fread_nolock std::_Locinfo::_Locinfo_ctor 30188->30240 30192 951eb std::_Throw_Cpp_error RaiseException 30189->30192 30190 7af80 43 API calls 30190->30302 30191 a0f9e 51 API calls 30191->30240 30192->30133 30193 f8930 lstrlen 30205 f8949 30193->30205 30193->30240 30194 f5f15 30199 62cf0 std::_Throw_Cpp_error 43 API calls 30194->30199 30195 1339a0 90 API calls 30195->30302 30196 f6525 GetPrivateProfileStringA 30196->30240 30197 73d50 105 API calls 30197->30302 30198 84900 105 API calls 30198->30302 30200 f5f28 30199->30200 30203 7ace0 43 API calls 30200->30203 30201 f8a17 30207 98c60 std::_Throw_Cpp_error 41 API calls 30201->30207 30202 7e8a0 43 API calls 30202->30240 30204 f5f3d 30203->30204 30208 67cf0 43 API calls 30204->30208 30205->29976 30206 7abb0 43 API calls 30206->30240 30209 f8a21 30207->30209 30210 f6157 30208->30210 30211 62cf0 std::_Throw_Cpp_error 43 API calls 30209->30211 30210->30189 30212 f8a35 30211->30212 30213 7ace0 43 API calls 30212->30213 30215 f8a4a 30213->30215 30214 7fbf0 43 API calls 30214->30302 30216 67cf0 43 API calls 30215->30216 30217 f8a62 30216->30217 30219 951eb std::_Throw_Cpp_error RaiseException 30217->30219 30218 7ab20 43 API calls 30218->30240 30221 f8a76 30219->30221 30220 78f00 std::_Throw_Cpp_error 43 API calls 30220->30302 30223 77ef0 43 API calls 30221->30223 30222 99810 43 API calls 30222->30240 30225 f8adf 30223->30225 30224 63040 43 API calls std::_Throw_Cpp_error 30224->30240 30227 740c0 105 API calls 30225->30227 30226 9d098 79 API calls 30226->30240 30228 f8b09 30227->30228 30230 7af80 43 API calls 30228->30230 30229 77ef0 43 API calls 30229->30240 30235 f8c48 __fread_nolock 30230->30235 30231 62fe0 std::_Throw_Cpp_error 41 API calls 30231->30240 30232 740c0 105 API calls 30232->30240 30233 632d0 43 API calls std::_Throw_Cpp_error 30233->30240 30234 143880 46 API calls 30234->30240 30239 f8c66 SHGetFolderPathA 30235->30239 30236 7c3a0 43 API calls 30470 f6e54 std::ios_base::_Ios_base_dtor 30236->30470 30237 f8988 30243 62cf0 std::_Throw_Cpp_error 43 API calls 30237->30243 30238 785d0 79 API calls 30238->30240 30241 7ac50 43 API calls 30239->30241 30240->30191 30240->30193 30240->30196 30240->30201 30240->30202 30240->30206 30240->30218 30240->30222 30240->30224 30240->30226 30240->30229 30240->30231 30240->30232 30240->30233 30240->30234 30240->30237 30240->30238 30246 76130 43 API calls 30240->30246 30240->30470 30244 f8c93 30241->30244 30242 780a0 43 API calls 30242->30470 30245 f899f 30243->30245 30247 7ab20 43 API calls 30244->30247 30248 7ace0 43 API calls 30245->30248 30246->30240 30250 f8d47 __fread_nolock 30247->30250 30251 f89b4 30248->30251 30249 93662 std::_Facet_Register 43 API calls 30249->30302 30253 f8d61 GetPrivateProfileSectionNamesA 30250->30253 30254 67cf0 43 API calls 30251->30254 30252 133b40 151 API calls 30252->30470 30308 f8d94 std::ios_base::_Ios_base_dtor __fread_nolock std::_Locinfo::_Locinfo_ctor 30253->30308 30255 f8a03 30254->30255 30258 951eb std::_Throw_Cpp_error RaiseException 30255->30258 30256 a0f9e 51 API calls 30256->30308 30257 7af80 43 API calls 30257->30470 30258->30201 30259 fad4c lstrlen 30271 fad62 30259->30271 30259->30308 30260 1339a0 90 API calls 30260->30470 30261 f883a 30266 62cf0 std::_Throw_Cpp_error 43 API calls 30261->30266 30262 f8e85 GetPrivateProfileStringA 30262->30308 30263 73d50 105 API calls 30263->30470 30264 84900 105 API calls 30264->30470 30265 77ef0 43 API calls 30265->30470 30268 f884d 30266->30268 30267 fae49 30273 98c60 std::_Throw_Cpp_error 41 API calls 30267->30273 30270 7ace0 43 API calls 30268->30270 30269 7e8a0 43 API calls 30269->30308 30272 f8862 30270->30272 30271->29976 30272->30251 30275 fae53 30273->30275 30274 7abb0 43 API calls 30274->30308 30276 79e60 43 API calls 30275->30276 30277 fae58 30276->30277 30279 62cf0 std::_Throw_Cpp_error 43 API calls 30277->30279 30278 a12e6 51 API calls 30278->30302 30280 fae6f 30279->30280 30281 7ace0 43 API calls 30280->30281 30282 fae84 30281->30282 30285 67cf0 43 API calls 30282->30285 30283 7ab20 43 API calls 30283->30308 30284 63040 43 API calls std::_Throw_Cpp_error 30284->30302 30286 fae9c 30285->30286 30288 951eb std::_Throw_Cpp_error RaiseException 30286->30288 30287 99810 43 API calls 30287->30308 30289 faeb0 30288->30289 30292 77ef0 43 API calls 30289->30292 30290 9d098 79 API calls 30290->30308 30291 63040 43 API calls std::_Throw_Cpp_error 30291->30308 30294 faf1f 30292->30294 30293 77ef0 43 API calls 30293->30308 30295 740c0 105 API calls 30294->30295 30296 faf49 30295->30296 30298 7af80 43 API calls 30296->30298 30297 740c0 105 API calls 30297->30308 30309 fafe4 __fread_nolock 30298->30309 30299 143880 46 API calls 30299->30308 30300 f6117 30307 62cf0 std::_Throw_Cpp_error 43 API calls 30300->30307 30301 77ef0 43 API calls 30301->30302 30302->30133 30302->30139 30302->30169 30302->30174 30302->30175 30302->30185 30302->30190 30302->30194 30302->30195 30302->30197 30302->30198 30302->30214 30302->30220 30302->30249 30302->30278 30302->30284 30302->30300 30302->30301 30303 7c3a0 43 API calls 30450 f97b4 std::ios_base::_Ios_base_dtor 30303->30450 30304 fada1 30314 62cf0 std::_Throw_Cpp_error 43 API calls 30304->30314 30305 632d0 43 API calls std::_Throw_Cpp_error 30305->30308 30306 785d0 79 API calls 30306->30308 30310 f612a 30307->30310 30308->30256 30308->30259 30308->30262 30308->30267 30308->30269 30308->30274 30308->30283 30308->30287 30308->30290 30308->30291 30308->30293 30308->30297 30308->30299 30308->30304 30308->30305 30308->30306 30315 76130 43 API calls 30308->30315 30308->30450 30312 fb002 SHGetFolderPathA 30309->30312 30313 7ace0 43 API calls 30310->30313 30311 780a0 43 API calls 30311->30450 30316 7ac50 43 API calls 30312->30316 30313->30204 30317 fadb8 30314->30317 30315->30308 30318 fb02f 30316->30318 30319 7ace0 43 API calls 30317->30319 30320 7ab20 43 API calls 30318->30320 30322 fadcd 30319->30322 30323 fb0d4 __fread_nolock 30320->30323 30321 133b40 151 API calls 30321->30450 30324 67cf0 43 API calls 30322->30324 30327 fb0ee GetPrivateProfileSectionNamesA 30323->30327 30325 fade5 30324->30325 30328 951eb std::_Throw_Cpp_error RaiseException 30325->30328 30326 7af80 43 API calls 30326->30450 30376 fb121 __fread_nolock std::_Locinfo::_Locinfo_ctor 30327->30376 30328->30267 30329 a0f9e 51 API calls 30329->30376 30330 1339a0 90 API calls 30330->30450 30331 fabf3 30335 62cf0 std::_Throw_Cpp_error 43 API calls 30331->30335 30332 fca51 lstrlen 30343 fca67 30332->30343 30332->30376 30333 73d50 105 API calls 30333->30450 30334 84900 105 API calls 30334->30450 30337 fac06 30335->30337 30336 fb212 GetPrivateProfileStringA 30336->30376 30338 7ace0 43 API calls 30337->30338 30339 fac1b 30338->30339 30342 67cf0 43 API calls 30339->30342 30340 fcb88 30347 98c60 std::_Throw_Cpp_error 41 API calls 30340->30347 30341 7e8a0 43 API calls 30341->30376 30344 fae35 30342->30344 30343->29976 30344->30325 30345 93662 43 API calls std::_Facet_Register 30345->30470 30346 7abb0 43 API calls 30346->30376 30348 fcb92 30347->30348 30350 62cf0 std::_Throw_Cpp_error 43 API calls 30348->30350 30349 7fbf0 43 API calls 30349->30450 30351 fcba9 30350->30351 30352 7ace0 43 API calls 30351->30352 30353 fcbbe 30352->30353 30354 67cf0 43 API calls 30353->30354 30357 fcbd6 30354->30357 30355 78f00 std::_Throw_Cpp_error 43 API calls 30355->30450 30356 63040 43 API calls std::_Throw_Cpp_error 30356->30470 30358 951eb std::_Throw_Cpp_error RaiseException 30357->30358 30360 fcbea 30358->30360 30359 7ab20 43 API calls 30359->30376 30362 77ef0 43 API calls 30360->30362 30361 99810 43 API calls 30361->30376 30365 fcc4f 30362->30365 30363 9d098 79 API calls 30363->30376 30364 63040 43 API calls std::_Throw_Cpp_error 30364->30376 30366 740c0 105 API calls 30365->30366 30368 fcc79 30366->30368 30367 77ef0 43 API calls 30367->30376 30369 7af80 43 API calls 30368->30369 30375 fcd14 __fread_nolock 30369->30375 30370 740c0 105 API calls 30370->30376 30371 143880 46 API calls 30371->30376 30372 7c3a0 43 API calls 30462 fbc2c std::ios_base::_Ios_base_dtor 30372->30462 30373 fcae0 30381 62cf0 std::_Throw_Cpp_error 43 API calls 30373->30381 30374 632d0 43 API calls std::_Throw_Cpp_error 30374->30376 30377 fcd32 SHGetFolderPathA 30375->30377 30376->30329 30376->30332 30376->30336 30376->30340 30376->30341 30376->30346 30376->30359 30376->30361 30376->30363 30376->30364 30376->30367 30376->30370 30376->30371 30376->30373 30376->30374 30380 785d0 79 API calls 30376->30380 30385 76130 43 API calls 30376->30385 30376->30462 30379 7ac50 43 API calls 30377->30379 30378 780a0 43 API calls 30378->30462 30382 fcd5f 30379->30382 30380->30376 30383 fcaf7 30381->30383 30384 7ab20 43 API calls 30382->30384 30386 7ace0 43 API calls 30383->30386 30387 fce04 __fread_nolock 30384->30387 30385->30376 30388 fcb0c 30386->30388 30391 fce1e GetPrivateProfileSectionNamesA 30387->30391 30390 67cf0 43 API calls 30388->30390 30389 133b40 151 API calls 30389->30462 30392 fcb24 30390->30392 30504 fce51 __fread_nolock std::_Locinfo::_Locinfo_ctor 30391->30504 30395 951eb std::_Throw_Cpp_error RaiseException 30392->30395 30393 a0f9e 51 API calls 30393->30504 30394 77ef0 43 API calls 30394->30462 30395->30340 30396 fcaa6 30401 62cf0 std::_Throw_Cpp_error 43 API calls 30396->30401 30397 100fad lstrlen 30410 100fc3 30397->30410 30397->30504 30398 1339a0 90 API calls 30398->30462 30399 63040 43 API calls std::_Throw_Cpp_error 30399->30450 30400 fcf42 GetPrivateProfileStringA 30400->30504 30402 fcab9 30401->30402 30403 7ace0 43 API calls 30402->30403 30422 fc9a7 30403->30422 30404 7e8a0 43 API calls 30404->30504 30405 a12e6 51 API calls 30405->30470 30406 10101b 30411 62cf0 std::_Throw_Cpp_error 43 API calls 30406->30411 30407 67cf0 43 API calls 30408 fcb74 30407->30408 30408->30392 30409 fc97e 30414 62cf0 std::_Throw_Cpp_error 43 API calls 30409->30414 30410->29976 30412 101034 30411->30412 30413 7ace0 43 API calls 30412->30413 30415 101049 30413->30415 30416 fc992 30414->30416 30417 67cf0 43 API calls 30415->30417 30418 7ace0 43 API calls 30416->30418 30421 101061 30417->30421 30418->30422 30419 63040 43 API calls std::_Throw_Cpp_error 30419->30462 30420 93662 43 API calls std::_Facet_Register 30420->30462 30423 951eb std::_Throw_Cpp_error RaiseException 30421->30423 30422->30407 30424 101075 30423->30424 30425 98c60 std::_Throw_Cpp_error 41 API calls 30424->30425 30427 10107a 30425->30427 30426 93662 43 API calls std::_Facet_Register 30426->30450 30430 62cf0 std::_Throw_Cpp_error 43 API calls 30427->30430 30428 7e8a0 43 API calls 30500 fd45b std::ios_base::_Ios_base_dtor 30428->30500 30429 763b0 std::_Throw_Cpp_error 43 API calls 30429->30450 30434 10108d 30430->30434 30431 1449f0 90 API calls 30431->30504 30432 83f40 105 API calls 30432->30462 30433 133b40 151 API calls 30433->30500 30436 7ace0 43 API calls 30434->30436 30435 632d0 std::_Throw_Cpp_error 43 API calls 30435->30504 30438 1010a2 30436->30438 30437 7b430 56 API calls 30437->30504 30439 67cf0 43 API calls 30438->30439 30440 1010ba 30439->30440 30441 951eb std::_Throw_Cpp_error RaiseException 30440->30441 30443 1010ce 30441->30443 30442 1339a0 90 API calls 30442->30500 30444 62cf0 std::_Throw_Cpp_error 43 API calls 30443->30444 30445 1010e2 30444->30445 30446 7ace0 43 API calls 30445->30446 30449 1010f7 30446->30449 30447 fadf5 30454 62cf0 std::_Throw_Cpp_error 43 API calls 30447->30454 30448 77ef0 43 API calls 30448->30450 30451 67cf0 43 API calls 30449->30451 30450->30267 30450->30275 30450->30277 30450->30303 30450->30308 30450->30311 30450->30321 30450->30326 30450->30330 30450->30331 30450->30333 30450->30334 30450->30349 30450->30355 30450->30399 30450->30426 30450->30429 30450->30447 30450->30448 30453 10110f 30451->30453 30452 8c070 43 API calls 30452->30470 30455 951eb std::_Throw_Cpp_error RaiseException 30453->30455 30456 fae08 30454->30456 30457 101123 30455->30457 30458 7ace0 43 API calls 30456->30458 30458->30339 30459 62fe0 41 API calls std::_Throw_Cpp_error 30459->30470 30460 fcb34 30464 62cf0 std::_Throw_Cpp_error 43 API calls 30460->30464 30461 73200 43 API calls 30461->30504 30462->30340 30462->30348 30462->30372 30462->30376 30462->30378 30462->30389 30462->30394 30462->30396 30462->30398 30462->30409 30462->30419 30462->30420 30462->30432 30462->30460 30465 73d50 105 API calls 30462->30465 30466 84900 105 API calls 30462->30466 30463 144050 89 API calls 30463->30504 30467 fcb47 30464->30467 30465->30462 30466->30462 30472 7ace0 43 API calls 30467->30472 30468 ff77f CreateDirectoryA 30468->30504 30469 f89c3 30473 62cf0 std::_Throw_Cpp_error 43 API calls 30469->30473 30470->30201 30470->30209 30470->30236 30470->30240 30470->30242 30470->30252 30470->30257 30470->30260 30470->30261 30470->30263 30470->30264 30470->30265 30470->30345 30470->30356 30470->30405 30470->30452 30470->30459 30470->30469 30471 77ef0 43 API calls 30471->30504 30472->30422 30475 f89d6 30473->30475 30474 7b9d0 43 API calls 30474->30504 30476 7ace0 43 API calls 30475->30476 30476->30272 30477 7ad80 43 API calls 30477->30504 30478 7abb0 43 API calls 30478->30504 30479 73d50 105 API calls 30479->30504 30480 7af80 43 API calls 30480->30504 30481 7b0e0 105 API calls 30481->30504 30482 93662 43 API calls std::_Facet_Register 30482->30500 30483 ffa66 CreateDirectoryA 30483->30504 30484 7b7b0 43 API calls 30484->30504 30485 63040 43 API calls std::_Throw_Cpp_error 30485->30500 30486 144120 79 API calls 30486->30504 30487 62fe0 41 API calls std::_Throw_Cpp_error 30487->30500 30488 62cf0 std::_Throw_Cpp_error 43 API calls 30488->30504 30489 8c070 43 API calls 30489->30500 30490 7ace0 43 API calls 30490->30504 30491 7ab20 43 API calls 30491->30504 30492 99810 43 API calls 30492->30504 30493 9d098 79 API calls 30493->30504 30494 77ef0 43 API calls 30494->30500 30495 736c0 105 API calls 30495->30504 30496 63040 43 API calls std::_Throw_Cpp_error 30496->30504 30497 a1618 76 API calls 30497->30504 30498 101130 185 API calls 30498->30504 30499 73980 43 API calls 30499->30504 30500->30406 30500->30424 30500->30427 30500->30428 30500->30433 30500->30442 30500->30443 30500->30482 30500->30485 30500->30487 30500->30489 30500->30494 30502 73d50 105 API calls 30500->30502 30503 84900 105 API calls 30500->30503 30500->30504 30501 730f0 43 API calls 30501->30504 30502->30500 30503->30500 30504->30393 30504->30397 30504->30400 30504->30404 30504->30406 30504->30431 30504->30435 30504->30437 30504->30461 30504->30463 30504->30468 30504->30471 30504->30474 30504->30477 30504->30478 30504->30479 30504->30480 30504->30481 30504->30483 30504->30484 30504->30486 30504->30488 30504->30490 30504->30491 30504->30492 30504->30493 30504->30495 30504->30496 30504->30497 30504->30498 30504->30499 30504->30500 30504->30501 30505->29976 30506->29979 30507->29996 30508->29990 30509->29990 30510->29990 30511->29996 30512->29996 30513->29996 30514->29984 30516->30007 30517->30014 30519 ab00c ___std_exception_destroy 14 API calls 30518->30519 30520 a1c9e 30519->30520 30520->30021 30521 98c60 41 API calls 2 library calls 30520->30521 30543 79e70 77 API calls 2 library calls 30524 80ad0 30529 814a0 30524->30529 30526 80b2a 30527 80ae0 30527->30526 30528 89e20 43 API calls 30527->30528 30528->30526 30531 814cb 30529->30531 30530 814ee 30530->30527 30531->30530 30532 89e20 43 API calls 30531->30532 30533 8150b 30532->30533 30533->30527 30544 80270 43 API calls 30534 98410 5 API calls _ValidateLocalCookies

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 56 125940-125972 WSAStartup 57 125a46-125a4f 56->57 58 125978-1259a2 call 1477d0 * 2 56->58 63 1259a4-1259a8 58->63 64 1259ae-1259f4 getaddrinfo 58->64 63->57 63->64 65 125a40 WSACleanup 64->65 66 1259f6-1259fc 64->66 65->57 67 125a54-125a5e FreeAddrInfoW 66->67 68 1259fe 66->68 67->65 69 125a60-125a68 67->69 70 125a04-125a18 socket 68->70 70->65 71 125a1a-125a2a connect 70->71 72 125a50 71->72 73 125a2c-125a34 closesocket 71->73 72->67 73->70 74 125a36-125a3a FreeAddrInfoW 73->74 74->65
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddrFreeInfo$CleanupStartupclosesocketconnectgetaddrinfosocket
                                                                                                            • String ID:
                                                                                                            • API String ID: 448659506-0
                                                                                                            • Opcode ID: e070ed87ede8f5f52c74d3753f47ac9619cc9d983d2924b2b14d8a18ea4c8119
                                                                                                            • Instruction ID: 368e2e510650450eea4b220262cca0d0300e756aa1d3dd6cf415d4431c5f2a20
                                                                                                            • Opcode Fuzzy Hash: e070ed87ede8f5f52c74d3753f47ac9619cc9d983d2924b2b14d8a18ea4c8119
                                                                                                            • Instruction Fuzzy Hash: B531A1325047109BD7209F68EC89B6ABBE6FF84734F544B1DF9A5935F0D33098548B92
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • setsockopt.WS2_32(000003FC,0000FFFF,00001006,?,00000008), ref: 00124F56
                                                                                                            • recv.WS2_32(?,00000004,00000002), ref: 00124F71
                                                                                                            • WSAGetLastError.WS2_32 ref: 00124F75
                                                                                                            • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 00124FF3
                                                                                                            • recv.WS2_32(00000000,0000000C,00000008), ref: 00125014
                                                                                                            • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?), ref: 001250B0
                                                                                                            • recv.WS2_32(00000000,?,00000008), ref: 001250CB
                                                                                                              • Part of subcall function 00125940: WSAStartup.WS2_32 ref: 0012596A
                                                                                                              • Part of subcall function 00125940: getaddrinfo.WS2_32(?,?,?,001E6328), ref: 001259EC
                                                                                                              • Part of subcall function 00125940: socket.WS2_32(?,?,?), ref: 00125A0D
                                                                                                              • Part of subcall function 00125940: connect.WS2_32(00000000,001B6B31,?), ref: 00125A21
                                                                                                              • Part of subcall function 00125940: closesocket.WS2_32(00000000), ref: 00125A2D
                                                                                                              • Part of subcall function 00125940: FreeAddrInfoW.WS2_32(?), ref: 00125A3A
                                                                                                              • Part of subcall function 00125940: WSACleanup.WS2_32 ref: 00125A40
                                                                                                            • recv.WS2_32(?,00000004,00000008), ref: 001251D3
                                                                                                            • __Xtime_get_ticks.LIBCPMT ref: 001251DA
                                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 001251E8
                                                                                                            • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 00125261
                                                                                                            • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 00125269
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: recv$Sleepsetsockopt$AddrCleanupErrorFreeInfoLastStartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectgetaddrinfosocket
                                                                                                            • String ID:
                                                                                                            • API String ID: 3089209366-0
                                                                                                            • Opcode ID: 3e9dd5d8e396fb87fd36f4a6f42390e6f0eed841e82b3213117c4d99029bb963
                                                                                                            • Instruction ID: 581380d956ce076616978c96dc8814aaf962ec9f92be08e007c6ad1d30f99682
                                                                                                            • Opcode Fuzzy Hash: 3e9dd5d8e396fb87fd36f4a6f42390e6f0eed841e82b3213117c4d99029bb963
                                                                                                            • Instruction Fuzzy Hash: 93B1C9B1D00358DFEB14DFA8DC89BADBBB6BB55300F604218E454AF6E2D7B05994CB81
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 75 69280-692dd call 763b0 78 69413-69521 call 62df0 call 1477d0 75->78 79 692e3-692e9 75->79 95 69537-6953f call 78dc0 78->95 96 69523-69535 78->96 81 692f0-69313 79->81 83 69324-69331 81->83 84 69315-6931f 81->84 85 69342-6934f 83->85 86 69333-6933d 83->86 88 69403-69406 84->88 90 69360-6936d 85->90 91 69351-6935b 85->91 86->88 89 69409-6940d 88->89 89->78 89->81 93 6937e-6938b 90->93 94 6936f-69379 90->94 91->88 97 6938d-69397 93->97 98 69399-693a6 93->98 94->88 99 69544-69597 call 1477d0 * 2 95->99 96->99 97->88 101 693b4-693c1 98->101 102 693a8-693b2 98->102 112 695cb-695e1 call 1477d0 99->112 113 69599-695c8 call 1477d0 call 95260 99->113 104 693c3-693cd 101->104 105 693cf-693dc 101->105 102->88 104->88 107 693de-693e8 105->107 108 693ea-693f4 105->108 107->88 108->89 111 693f6-693ff 108->111 111->88 119 695e7-695ed 112->119 120 696e2 112->120 113->112 122 695f0-696ce GetModuleHandleA GetProcAddress WSASend 119->122 123 696e6-696f0 120->123 124 696d4-696dc 122->124 125 6975f-69763 122->125 126 696f2-696fe 123->126 127 6971e-6973d 123->127 124->120 124->122 125->123 130 69714-6971b call 938e3 126->130 131 69700-6970e 126->131 128 6976f-69796 127->128 129 6973f-6974b 127->129 132 69765-6976c call 938e3 129->132 133 6974d-6975b 129->133 130->127 131->130 134 69797-697fe call 98c60 call 62df0 * 2 131->134 132->128 133->134 136 6975d 133->136 136->132
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(Ws2_32.dll,?,?,?,?,001AA4DC,00000000,76A923A0,-001E6880), ref: 000696A6
                                                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 000696B4
                                                                                                            • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,001AA4DC,00000000,76A923A0,-001E6880), ref: 000696C9
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressHandleModuleProcSend
                                                                                                            • String ID: 4oST$4oST$Ws2_32.dll
                                                                                                            • API String ID: 2819740048-1839276265
                                                                                                            • Opcode ID: d4a74c9092c48154d8cdfac6e8b4422fced103b583d3d99ca7a330e446b55fd1
                                                                                                            • Instruction ID: 7b0b1ef7989d8ba7cd3810a856982811d32c5617f1a1dd9aae788fa4370f39c7
                                                                                                            • Opcode Fuzzy Hash: d4a74c9092c48154d8cdfac6e8b4422fced103b583d3d99ca7a330e446b55fd1
                                                                                                            • Instruction Fuzzy Hash: E402E070D04298DFCF25CF94C890BEDBBB5EF55310F244289E4456BA86D7701A86CB92
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 146 a8900-a8910 147 a892a-a892c 146->147 148 a8912-a8925 call a16dc call a16ef 146->148 150 a8c6c-a8c79 call a16dc call a16ef 147->150 151 a8932-a8938 147->151 164 a8c84 148->164 170 a8c7f call 98c50 150->170 151->150 154 a893e-a8967 151->154 154->150 157 a896d-a8976 154->157 160 a8978-a898b call a16dc call a16ef 157->160 161 a8990-a8992 157->161 160->170 162 a8c68-a8c6a 161->162 163 a8998-a899c 161->163 169 a8c87-a8c8a 162->169 163->162 168 a89a2-a89a6 163->168 164->169 168->160 172 a89a8-a89bf 168->172 170->164 175 a89c1-a89c4 172->175 176 a89f4-a89fa 172->176 179 a89ea-a89f2 175->179 180 a89c6-a89cc 175->180 177 a89ce-a89e5 call a16dc call a16ef call 98c50 176->177 178 a89fc-a8a03 176->178 207 a8b9f 177->207 182 a8a07-a8a25 call ab086 call ab00c * 2 178->182 183 a8a05 178->183 181 a8a67-a8a86 179->181 180->177 180->179 185 a8a8c-a8a98 181->185 186 a8b42-a8b4b call b3bd1 181->186 217 a8a42-a8a65 call a25ed 182->217 218 a8a27-a8a3d call a16ef call a16dc 182->218 183->182 185->186 189 a8a9e-a8aa0 185->189 197 a8bbc 186->197 198 a8b4d-a8b5f 186->198 189->186 193 a8aa6-a8ac7 189->193 193->186 199 a8ac9-a8adf 193->199 205 a8bc0-a8bd6 ReadFile 197->205 198->197 202 a8b61-a8b70 GetConsoleMode 198->202 199->186 203 a8ae1-a8ae3 199->203 202->197 208 a8b72-a8b76 202->208 203->186 209 a8ae5-a8b08 203->209 211 a8bd8-a8bde 205->211 212 a8c34-a8c3f GetLastError 205->212 215 a8ba2-a8bac call ab00c 207->215 208->205 214 a8b78-a8b90 ReadConsoleW 208->214 209->186 216 a8b0a-a8b20 209->216 211->212 213 a8be0 211->213 219 a8c58-a8c5b 212->219 220 a8c41-a8c53 call a16ef call a16dc 212->220 222 a8be3-a8bf5 213->222 224 a8b92 GetLastError 214->224 225 a8bb1-a8bba 214->225 215->169 216->186 229 a8b22-a8b24 216->229 217->181 218->207 226 a8b98-a8b9e call a1695 219->226 227 a8c61-a8c63 219->227 220->207 222->215 232 a8bf7-a8bfb 222->232 224->226 225->222 226->207 227->215 229->186 236 a8b26-a8b3d 229->236 239 a8bfd-a8c0d call a8612 232->239 240 a8c14-a8c21 232->240 236->186 251 a8c10-a8c12 239->251 245 a8c2d-a8c32 call a8458 240->245 246 a8c23 call a8769 240->246 252 a8c28-a8c2b 245->252 246->252 251->215 252->251
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: d83a4e116ad9e24a3b102875af8e3342863e04a2e4cec53a187a53492161e82f
                                                                                                            • Instruction ID: f8f85c89dbf2621f7e48dc475f9c3abf09e391fb258ce50fb0d3e0b6e5ddb055
                                                                                                            • Opcode Fuzzy Hash: d83a4e116ad9e24a3b102875af8e3342863e04a2e4cec53a187a53492161e82f
                                                                                                            • Instruction Fuzzy Hash: C5B1E5B4A14249AFDB11DFD8C881BEEBBF5BF4A314F188158E5059B292CB709981CF61
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 254 1252a0-1252ec 255 1252ee-125317 call 62cf0 call 69280 254->255 256 12531c-125322 254->256 272 12588b-1258b4 call 62df0 255->272 258 125324-125339 call 76290 256->258 259 12533e-125344 256->259 258->272 262 125360-125366 259->262 263 125346-12535b call 76290 259->263 267 125385-12538b 262->267 268 125368-12536c 262->268 263->272 269 1253ab-1253b1 267->269 270 12538d-1253a6 call a12a7 267->270 268->272 274 125372-125380 call 76290 268->274 278 1253b3-1253ba 269->278 279 1253bf-1253c5 269->279 270->272 274->272 278->272 283 125670-125676 279->283 284 1253cb-1253f0 call 65400 279->284 286 1256cb-1256d1 283->286 287 125678-1256a5 call 7b430 283->287 296 1253f2-12540d 284->296 289 1256d3-125721 call 7b430 call 73cb0 286->289 290 125726-12572c 286->290 292 1256aa-1256c6 call 73cb0 287->292 289->272 294 125781-125787 290->294 295 12572e-12577c call 7b430 call 73cb0 290->295 292->272 297 125789-1257d7 call 7b430 call 73cb0 294->297 298 1257dc-1257e2 294->298 295->272 302 125413-1254b5 call 62cf0 call 732d0 call 7ace0 call 76030 call 62df0 * 2 296->302 303 125655-125662 call 92b9a 296->303 297->272 306 125834-12583a 298->306 307 1257e4-125832 call 7b430 call 73cb0 298->307 341 125667-12566b 302->341 342 1254bb-125560 call 62d30 call 133670 call 62df0 call 732d0 call 75ff0 302->342 303->272 306->272 316 12583c-12586f call b8af0 call 762c0 call 62df0 306->316 307->272 316->272 341->296 353 125562-125590 GetCurrentProcess call 763b0 call 12c630 342->353 354 125595-1255ec call 732d0 342->354 365 12562c-125650 call 75230 call 62df0 353->365 360 1255f0-1255fe call 99810 354->360 361 1255ee 354->361 360->365 366 125600-125629 call a1618 call 9d098 360->366 361->360 365->303 366->365
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: 191.96.150.225$4oST$4oST$4oST
                                                                                                            • API String ID: 0-2793144940
                                                                                                            • Opcode ID: 08a59304f20bf11f4946ea74479f4278c0929372990e10ed4f86ed37f06c826c
                                                                                                            • Instruction ID: f57389981bf469a10c5cc4211d551b9f67e69da284de27a4ad4f8bfc8de5ff59
                                                                                                            • Opcode Fuzzy Hash: 08a59304f20bf11f4946ea74479f4278c0929372990e10ed4f86ed37f06c826c
                                                                                                            • Instruction Fuzzy Hash: 17021D70D04298DFEB14DFA8C9857DDBBB1AF14304F548099E8097B283D7B55E88DBA2
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 374 144050-144085 call 92b89 377 144087-144091 374->377 378 1440fd-1440ff call 92524 374->378 380 144104-144115 call 92524 377->380 381 144093-144098 377->381 378->380 383 1440d5 381->383 384 14409a-14409f 381->384 385 1440d7-1440fc call 92b9a 383->385 387 1440a0-1440a5 384->387 387->387 389 1440a7-1440a9 387->389 389->383 390 1440ab-1440b5 GetFileAttributesA 389->390 392 1440b7-1440c0 GetLastError 390->392 393 1440d1-1440d3 390->393 392->393 394 1440c2-1440c5 392->394 393->385 394->393 395 1440c7-1440ca 394->395 395->393 396 1440cc-1440cf 395->396 396->383 396->393
                                                                                                            APIs
                                                                                                            • GetFileAttributesA.KERNELBASE(?), ref: 001440AC
                                                                                                            • GetLastError.KERNEL32 ref: 001440B7
                                                                                                            • std::_Throw_Cpp_error.LIBCPMT ref: 001440FF
                                                                                                            • std::_Throw_Cpp_error.LIBCPMT ref: 00144110
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Cpp_errorThrow_std::_$AttributesErrorFileLast
                                                                                                            • String ID:
                                                                                                            • API String ID: 995686243-0
                                                                                                            • Opcode ID: ce7c7bfc88954c145ef68910b315f8e58a6c4741385c39ad55118987ec147d32
                                                                                                            • Instruction ID: b9c315fddb9d46bb1fd879f31552fa774713082885ecfdf675c4deb38ae2e83d
                                                                                                            • Opcode Fuzzy Hash: ce7c7bfc88954c145ef68910b315f8e58a6c4741385c39ad55118987ec147d32
                                                                                                            • Instruction Fuzzy Hash: EA11BAB0500680AFCF245F289C093ED37649B12B70F640324F6359BAE1DB3288A98652
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 455 a9779-a979b 456 a998e 455->456 457 a97a1-a97a3 455->457 458 a9990-a9994 456->458 459 a97cf-a97f2 457->459 460 a97a5-a97c4 call 98bd3 457->460 461 a97f8-a97fe 459->461 462 a97f4-a97f6 459->462 466 a97c7-a97ca 460->466 461->460 465 a9800-a9811 461->465 462->461 462->465 467 a9813-a9821 call a262d 465->467 468 a9824-a9834 call a92be 465->468 466->458 467->468 473 a987d-a988f 468->473 474 a9836-a983c 468->474 475 a9891-a9897 473->475 476 a98e6-a9906 WriteFile 473->476 477 a983e-a9841 474->477 478 a9865-a987b call a8e8f 474->478 482 a9899-a989c 475->482 483 a98d2-a98e4 call a933b 475->483 479 a9908-a990e GetLastError 476->479 480 a9911 476->480 484 a984c-a985b call a9256 477->484 485 a9843-a9846 477->485 495 a985e-a9860 478->495 479->480 489 a9914-a991f 480->489 490 a98be-a98d0 call a94ff 482->490 491 a989e-a98a1 482->491 501 a98b9-a98bc 483->501 484->495 485->484 492 a9926-a9929 485->492 496 a9989-a998c 489->496 497 a9921-a9924 489->497 490->501 498 a992c-a992e 491->498 499 a98a7-a98b4 call a9416 491->499 492->498 495->489 496->458 497->492 502 a995c-a9968 498->502 503 a9930-a9935 498->503 499->501 501->495 506 a996a-a9970 502->506 507 a9972-a9984 502->507 508 a994e-a9957 call a16b8 503->508 509 a9937-a9949 503->509 506->456 506->507 507->466 508->466 509->466
                                                                                                            APIs
                                                                                                              • Part of subcall function 000A8E8F: GetConsoleOutputCP.KERNEL32(21FC8FDF,00000000,00000000,?), ref: 000A8EF2
                                                                                                            • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 000A98FE
                                                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?), ref: 000A9908
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ConsoleErrorFileLastOutputWrite
                                                                                                            • String ID:
                                                                                                            • API String ID: 2915228174-0
                                                                                                            • Opcode ID: 549404e0783ac4e05719f7f7fda890daac3ebf7fa16c024dfa3f6ee8607b2211
                                                                                                            • Instruction ID: c4f8331a4559bb2f01de87c7aeb0775c73b16d80dd8ccfb02072b95e3bd35d3d
                                                                                                            • Opcode Fuzzy Hash: 549404e0783ac4e05719f7f7fda890daac3ebf7fa16c024dfa3f6ee8607b2211
                                                                                                            • Instruction Fuzzy Hash: B6618071E04119BFDF11DFE8C884AEEBBF9AF4A308F140159E904A7256D736D941CBA0
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 512 a8def-a8e03 call ae92e 515 a8e09-a8e11 512->515 516 a8e05-a8e07 512->516 518 a8e1c-a8e1f 515->518 519 a8e13-a8e1a 515->519 517 a8e57-a8e77 call ae89d 516->517 527 a8e89 517->527 528 a8e79-a8e87 call a16b8 517->528 522 a8e3d-a8e4d call ae92e FindCloseChangeNotification 518->522 523 a8e21-a8e25 518->523 519->518 521 a8e27-a8e3b call ae92e * 2 519->521 521->516 521->522 522->516 534 a8e4f-a8e55 GetLastError 522->534 523->521 523->522 532 a8e8b-a8e8e 527->532 528->532 534->517
                                                                                                            APIs
                                                                                                            • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,000A8CD6,00000000,?,001D7178,0000000C,000A8D92,?,?,?), ref: 000A8E45
                                                                                                            • GetLastError.KERNEL32(?,000A8CD6,00000000,?,001D7178,0000000C,000A8D92,?,?,?), ref: 000A8E4F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ChangeCloseErrorFindLastNotification
                                                                                                            • String ID:
                                                                                                            • API String ID: 1687624791-0
                                                                                                            • Opcode ID: 30e2a0ff14fc9e24edc88749b9f4854f42612ddc83773e6333062a7ce01fef6b
                                                                                                            • Instruction ID: 25e39e3d6dd5999d726bdbe81111cf82c82bd7cd98795e78149c3fe2bad2f15f
                                                                                                            • Opcode Fuzzy Hash: 30e2a0ff14fc9e24edc88749b9f4854f42612ddc83773e6333062a7ce01fef6b
                                                                                                            • Instruction Fuzzy Hash: C9114C32604250A6C665A2F49D49BFE27DD8B83734F294609F918DB1C3DF709CC08390
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 537 a250c-a2524 call ae92e 540 a253a-a2550 SetFilePointerEx 537->540 541 a2526-a252d 537->541 543 a2552-a2563 GetLastError call a16b8 540->543 544 a2565-a256f 540->544 542 a2534-a2538 541->542 546 a258b-a258e 542->546 543->542 544->542 545 a2571-a2586 544->545 545->546
                                                                                                            APIs
                                                                                                            • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,000A2616,?,?,?,?,?), ref: 000A2548
                                                                                                            • GetLastError.KERNEL32(?,?,?,?,000A2616,?,?,?,?,?,00000000,?,00000000), ref: 000A2555
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorFileLastPointer
                                                                                                            • String ID:
                                                                                                            • API String ID: 2976181284-0
                                                                                                            • Opcode ID: 5fdbf12fdd23a9b803ea2dea7b9a765518c752e892a236cf0e5d87368ac42ff6
                                                                                                            • Instruction ID: 10d54a2a6ed6b22d1f6f76226cc16a4a8f82619a94519143266f19f2ca447921
                                                                                                            • Opcode Fuzzy Hash: 5fdbf12fdd23a9b803ea2dea7b9a765518c752e892a236cf0e5d87368ac42ff6
                                                                                                            • Instruction Fuzzy Hash: F1012633A14655AFCF09CFA8DC1589E3B69EF86320F640218F801DB291E671ED818B90
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 549 ab00c-ab015 550 ab017-ab02a RtlFreeHeap 549->550 551 ab044-ab045 549->551 550->551 552 ab02c-ab043 GetLastError call a1652 call a16ef 550->552 552->551
                                                                                                            APIs
                                                                                                            • RtlFreeHeap.NTDLL(00000000,00000000,?,000B1B36,?,00000000,?,?,000B1DD7,?,00000007,?,?,000B22CB,?,?), ref: 000AB022
                                                                                                            • GetLastError.KERNEL32(?,?,000B1B36,?,00000000,?,?,000B1DD7,?,00000007,?,?,000B22CB,?,?), ref: 000AB02D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorFreeHeapLast
                                                                                                            • String ID:
                                                                                                            • API String ID: 485612231-0
                                                                                                            • Opcode ID: 95e66d7676d614e75f11abc5e9aa3ebd71af969b8d742cee19a7d6b4a01dc807
                                                                                                            • Instruction ID: 6270f9ca046847f815df709903dd0775237d479b0dec569e29e70100750b1b56
                                                                                                            • Opcode Fuzzy Hash: 95e66d7676d614e75f11abc5e9aa3ebd71af969b8d742cee19a7d6b4a01dc807
                                                                                                            • Instruction Fuzzy Hash: 28E0C232100214ABCB213FF4EC09BCE3B99AF01395F444060F70DDB462DB388890C784
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 597 98df2-98dff 598 98e29-98e3d call aa1db 597->598 599 98e01-98e24 call 98bd3 597->599 605 98e3f 598->605 606 98e42-98e4b call a25cf 598->606 604 98f90-98f92 599->604 605->606 608 98e50-98e5f 606->608 609 98e6f-98e78 608->609 610 98e61 608->610 613 98e7a-98e87 609->613 614 98e8c-98ec0 609->614 611 98f39-98f3e 610->611 612 98e67-98e69 610->612 615 98f8e-98f8f 611->615 612->609 612->611 616 98f8c 613->616 617 98f1d-98f29 614->617 618 98ec2-98ecc 614->618 615->604 616->615 621 98f2b-98f32 617->621 622 98f40-98f43 617->622 619 98ece-98eda 618->619 620 98ef3-98eff 618->620 619->620 624 98edc-98eee call 9915e 619->624 620->622 625 98f01-98f1b call 99309 620->625 621->611 623 98f46-98f4e 622->623 626 98f8a 623->626 627 98f50-98f56 623->627 624->615 625->623 626->616 630 98f58-98f6c call 98f93 627->630 631 98f6e-98f72 627->631 630->615 635 98f85-98f87 631->635 636 98f74-98f82 call b8650 631->636 635->626 636->635
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 551d96903b21bd7a6fd3a80ff7de6a75cbbd39a9594514dfde71e2aac60443a7
                                                                                                            • Instruction ID: e67e475febdab31459d591b8d5b16d38c4430dd7be8e40a930ef5d12e123d51f
                                                                                                            • Opcode Fuzzy Hash: 551d96903b21bd7a6fd3a80ff7de6a75cbbd39a9594514dfde71e2aac60443a7
                                                                                                            • Instruction Fuzzy Hash: A851A371A00204AFDF14CF58C895AAE7BF6EB4A314F28D169F8099B352D731DE41EB90
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 757 89e20-89e5c 758 89e62-89e7a 757->758 759 89f76 call 63330 757->759 761 89ea8-89eb8 758->761 762 89e7c-89e84 758->762 763 89f7b call 62b50 759->763 765 89eca-89ecc 761->765 766 89eba-89ec2 761->766 764 89e89-89e8a call 93662 762->764 773 89f80-89f85 call 98c60 763->773 775 89e8f-89e94 764->775 768 89ece-89ee2 call 93662 765->768 769 89ee4-89ee6 765->769 766->763 767 89ec8 766->767 767->764 778 89eec-89f05 768->778 774 89ee9 769->774 774->778 775->773 779 89e9a-89ea6 775->779 781 89f0e-89f2b call 95260 778->781 782 89f07-89f0c 778->782 779->774 783 89f2c-89f5c call 95260 call 877d0 781->783 782->783
                                                                                                            APIs
                                                                                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00089F7B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Concurrency::cancel_current_task
                                                                                                            • String ID:
                                                                                                            • API String ID: 118556049-0
                                                                                                            • Opcode ID: 51120e908a1a3a6ce0e714f3c66e6a8a6327792f1c2089bdcb1c738ab8da5ee2
                                                                                                            • Instruction ID: f51a9c45899195070633e9456e35955c60d1d65a076a02adaf93b29f34696453
                                                                                                            • Opcode Fuzzy Hash: 51120e908a1a3a6ce0e714f3c66e6a8a6327792f1c2089bdcb1c738ab8da5ee2
                                                                                                            • Instruction Fuzzy Hash: 2D41B271A001159FCB14EF68C9459BEBBF9FB89350F28422AE855E7386D770DE018BE0
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • Concurrency::cancel_current_task.LIBCPMT ref: 0006331F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Concurrency::cancel_current_task
                                                                                                            • String ID:
                                                                                                            • API String ID: 118556049-0
                                                                                                            • Opcode ID: 88e0f75f83d5f9e69285ef2088a1dfdc1055322beeb667a90db4e8c6ac7f301f
                                                                                                            • Instruction ID: d006d200d0c83988e018bf6d044ce3067b6f1a4cf7915d440358aaa6152cb69b
                                                                                                            • Opcode Fuzzy Hash: 88e0f75f83d5f9e69285ef2088a1dfdc1055322beeb667a90db4e8c6ac7f301f
                                                                                                            • Instruction Fuzzy Hash: 3EF0B4721001149BCF186F64D4168EAB3E9EF143A5710497AE88DD7313EB26DB4097D0
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • RtlAllocateHeap.NTDLL(00000000,00000001,?), ref: 000AB0B8
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AllocateHeap
                                                                                                            • String ID:
                                                                                                            • API String ID: 1279760036-0
                                                                                                            • Opcode ID: b1486e9d3af0c4ecbb2653e8ca9cc9726540b61e7b908fc618df3012709508e6
                                                                                                            • Instruction ID: 23b077ea1f1f87aebc1476bf2660930e58585eac2374758f81db05f19f15a4c1
                                                                                                            • Opcode Fuzzy Hash: b1486e9d3af0c4ecbb2653e8ca9cc9726540b61e7b908fc618df3012709508e6
                                                                                                            • Instruction Fuzzy Hash: 32E06D312016206BEA712BF59C00FAF3A89AF433E0F150221FD65E70D3DB20CC4082E1
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,00000001,?,?,?,?,?,?,?,?,00000000), ref: 000F18A9
                                                                                                            • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000000,00000000,4843FA0B,?,?,?,?,?,?,?,00000000), ref: 000F18CC
                                                                                                            • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,00000000), ref: 000F18D7
                                                                                                            • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 000F1AC7
                                                                                                              • Part of subcall function 00144050: GetFileAttributesA.KERNELBASE(?), ref: 001440AC
                                                                                                              • Part of subcall function 00144050: GetLastError.KERNEL32 ref: 001440B7
                                                                                                            • FindFirstFileA.KERNEL32(?,?), ref: 000F207F
                                                                                                            • FindNextFileA.KERNEL32(00000000,?), ref: 000F248C
                                                                                                            • FindClose.KERNEL32(00000000), ref: 000F249C
                                                                                                            • CreateDirectoryA.KERNEL32(?,00000000), ref: 000F2573
                                                                                                            • CreateDirectoryA.KERNEL32(?,00000000), ref: 000F2639
                                                                                                            • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 000F27BD
                                                                                                              • Part of subcall function 00144050: std::_Throw_Cpp_error.LIBCPMT ref: 001440FF
                                                                                                              • Part of subcall function 00144050: std::_Throw_Cpp_error.LIBCPMT ref: 00144110
                                                                                                            • CreateDirectoryA.KERNEL32(?,00000000), ref: 000F2964
                                                                                                            • CopyFileA.KERNEL32(00000000,?,00000000), ref: 000F2C18
                                                                                                            • CopyFileA.KERNEL32(?,00000000,00000000), ref: 000F3158
                                                                                                            • CredEnumerateA.ADVAPI32(00000000,00000001,00000000,?,?,?,?,?,?), ref: 000F351D
                                                                                                              • Part of subcall function 000951EB: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,76A923A0,?,00091CF9,?,001D69D8,76A923A0,?,76A923A0,-001E6880), ref: 0009524B
                                                                                                            • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?,?,?,?), ref: 000F4024
                                                                                                            • GetPrivateProfileSectionNamesA.KERNEL32(?,00001000,?), ref: 000F4122
                                                                                                            • GetPrivateProfileStringA.KERNEL32(?,?,00000000,?,00000104,?), ref: 000F4315
                                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000F5B98
                                                                                                            • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 000F606F
                                                                                                            • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?,?,?,?), ref: 000F6324
                                                                                                            • GetPrivateProfileSectionNamesA.KERNEL32(?,00001000,?), ref: 000F6422
                                                                                                            • GetPrivateProfileStringA.KERNEL32(?,?,00000000,?,00000104,?), ref: 000F6618
                                                                                                            • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 000F8931
                                                                                                            • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?,?,?,?), ref: 000F8C78
                                                                                                            • GetPrivateProfileSectionNamesA.KERNEL32(?,00001000,?), ref: 000F8D85
                                                                                                            • GetPrivateProfileStringA.KERNEL32(?,?,00000000,?,00000104,?), ref: 000F8F78
                                                                                                            • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 000FAD4D
                                                                                                            • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 000FB014
                                                                                                            • GetPrivateProfileSectionNamesA.KERNEL32(?,00001000,?), ref: 000FB112
                                                                                                            • GetPrivateProfileStringA.KERNEL32(?,?,00000000,?,00000104,?), ref: 000FB305
                                                                                                            • lstrlen.KERNEL32(?), ref: 000FCA52
                                                                                                            • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 000FCD44
                                                                                                            • GetPrivateProfileSectionNamesA.KERNEL32(?,00001000,?), ref: 000FCE42
                                                                                                            • GetPrivateProfileStringA.KERNEL32(?,?,00000000,?,00000104,?), ref: 000FD035
                                                                                                            • CreateDirectoryA.KERNEL32(?,00000000), ref: 000FF796
                                                                                                            • CreateDirectoryA.KERNEL32(?,00000000), ref: 000FFA7D
                                                                                                            • lstrlen.KERNEL32(?), ref: 00100FAE
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: PrivateProfile$FileFolderPath$CreateDirectoryNamesSectionStringlstrlen$CopyFind$CloseCpp_errorThrow_std::_$AttributesCredEnumerateErrorExceptionFirstLastNextOpenQueryRaiseUnothrow_t@std@@@Value__ehfuncinfo$??2@
                                                                                                            • String ID: #iR@$#iR@$3gX$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$9lX$9lX$9lX$HWg$KGa$KGa$MXg$P: 1$P?2'$PM!$PM&$SGf$UYw$VoST$VoST$VoST$VoST$VoST$VoST$WS{$WS{$WS{$WS{$WS{$WS{$WS{$XFf$XFf$]?0$]Xw$^W`$^W`$_Ys$cannot use operator[] with a string argument with $cannot use push_back() with $gQ`$gQ`$gQ`$gQ`$gQ`$gQ`$gQk$gQk$gQk$gQk$gQk$gQk$gUb$g[`$g[u$k,6&$k@z$k@z$k@z$k@z$nI?/$v}{$v}{&I$*ct$*ct$*ct$x<$x<$x<$x<
                                                                                                            • API String ID: 4212196321-1071398278
                                                                                                            • Opcode ID: 88d719eb6a8c1aca01b238ae4d9b08ea7cf745aa8857a47fadaae691bbd131a8
                                                                                                            • Instruction ID: 7c5182a5ee299c960b03ad38f74fb7d0731dff39f945b7bddff2293c3a68545f
                                                                                                            • Opcode Fuzzy Hash: 88d719eb6a8c1aca01b238ae4d9b08ea7cf745aa8857a47fadaae691bbd131a8
                                                                                                            • Instruction Fuzzy Hash: AF740FB4D052A88FDB65CF28C890BEDBBB1AF49304F1081D9E94DA7242DB346B85CF55
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00144CF2
                                                                                                            • Process32First.KERNEL32(00000000,?), ref: 00144D02
                                                                                                            • Process32Next.KERNEL32(00000000,?), ref: 00144D1F
                                                                                                            • Process32Next.KERNEL32(00000000,?), ref: 00144FB6
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00144FC2
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Process32$Next$CloseCreateFirstHandleSnapshotToolhelp32
                                                                                                            • String ID: 4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$exists
                                                                                                            • API String ID: 2284531361-891485653
                                                                                                            • Opcode ID: ea5596406a15bcc520db35eb70e64e3b2036a4ebf2154c7b9378538f0aea975a
                                                                                                            • Instruction ID: ca769912490f0857f7b20e9c8425466cc8e416c55a9779443a5ae7a390093ae0
                                                                                                            • Opcode Fuzzy Hash: ea5596406a15bcc520db35eb70e64e3b2036a4ebf2154c7b9378538f0aea975a
                                                                                                            • Instruction Fuzzy Hash: E6F246B0C056688FDB25CF68C894BEDBBB1BF49314F2482D9D8496B252DB305E86CF51
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • std::_Throw_Cpp_error.LIBCPMT ref: 00143F97
                                                                                                            • std::_Throw_Cpp_error.LIBCPMT ref: 00143FA8
                                                                                                            • CreateDirectoryA.KERNEL32(?,00000000), ref: 00144005
                                                                                                            • std::_Throw_Cpp_error.LIBCPMT ref: 00144034
                                                                                                            • std::_Throw_Cpp_error.LIBCPMT ref: 00144045
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Cpp_errorThrow_std::_$CreateDirectory
                                                                                                            • String ID: \*.*
                                                                                                            • API String ID: 2715195259-1173974218
                                                                                                            • Opcode ID: 1e89874eb57563e2bda2a9c1ef6d00b69d29957ef978c63c64bc4e0e065db248
                                                                                                            • Instruction ID: 386797a1d3a5abe5705ff10fdab6168741f77c81d5c71810b35d5bcf4a0c8381
                                                                                                            • Opcode Fuzzy Hash: 1e89874eb57563e2bda2a9c1ef6d00b69d29957ef978c63c64bc4e0e065db248
                                                                                                            • Instruction Fuzzy Hash: F6E1F270D01249DFDB10DFA8C9487EDBBB5EF15314F208259E424BB2A2DB705A89DB62
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,00000000,00000000), ref: 000F0BED
                                                                                                            • GetFileSize.KERNEL32(00000000,00000000,?,80000000,00000001,00000000,00000003,00000080,00000000,00000000,00000000), ref: 000F0C01
                                                                                                            • ReadFile.KERNEL32(00000000,00000000,?,00000000,00000000,?,?,?,00000000), ref: 000F0C38
                                                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,00000000), ref: 000F0C43
                                                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,00000000), ref: 000F0C65
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$CloseHandle$CreateReadSize
                                                                                                            • String ID: 4oST$4oST$4oST$4oST$4oST$4oST$kGa$zW}
                                                                                                            • API String ID: 3664964396-4071347269
                                                                                                            • Opcode ID: 23256c7691bdee4d55130813fe3b4b668a9da716748793a96a9c9d0162eb9d7b
                                                                                                            • Instruction ID: 99a28b56cbf0edd920a2be6e6f502169fbe38dfa4175f3f464e8bbdb2c530a04
                                                                                                            • Opcode Fuzzy Hash: 23256c7691bdee4d55130813fe3b4b668a9da716748793a96a9c9d0162eb9d7b
                                                                                                            • Instruction Fuzzy Hash: 76325670D04268DFDB25CFA4CC90BEDBBB1BF49300F148299E959A7682DB306A85DF51
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • VirtualAllocEx.KERNEL32(00000000,00000000,?,00003000,00000040), ref: 0012C6A1
                                                                                                            • WriteProcessMemory.KERNEL32(00000000,00000000,?,?,00000000), ref: 0012C6BD
                                                                                                            • WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0012C6F2
                                                                                                            • VirtualAllocEx.KERNEL32(?,00000000,00001000,00003000,00000040), ref: 0012C71B
                                                                                                            • WriteProcessMemory.KERNEL32(?,00000000,?,00000218,00000000), ref: 0012C8BF
                                                                                                            • WriteProcessMemory.KERNEL32(?,00000218,0012C990,-00000010,00000000), ref: 0012C8E1
                                                                                                            • CreateRemoteThread.KERNEL32(?,00000000,00000000,00000218,00000000,00000000,00000000), ref: 0012C8F4
                                                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0012C8FD
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MemoryProcessWrite$AllocVirtual$CreateObjectRemoteSingleThreadWait
                                                                                                            • String ID: %s|%s$131$4oST
                                                                                                            • API String ID: 2137838514-1634972829
                                                                                                            • Opcode ID: ada0ce892b066d32bca4b4c9f8b226209b508d61afcbd136e0582eebfd57b360
                                                                                                            • Instruction ID: afef3d220b7e7d7e670dc6cbf9eb0778d2d596e0198e3ac38105116febf30d76
                                                                                                            • Opcode Fuzzy Hash: ada0ce892b066d32bca4b4c9f8b226209b508d61afcbd136e0582eebfd57b360
                                                                                                            • Instruction Fuzzy Hash: 91B16AB1D00208DFDB14CFA8CC85BEEBBB0FF48310F504259E509AB291D775AA81CBA5
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: 4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$cannot use operator[] with a string argument with $cannot use push_back() with $ct
                                                                                                            • API String ID: 0-1099484197
                                                                                                            • Opcode ID: 75d5fc51640a5041426569c160b13e111f410601e677684cc301fb6d3815de75
                                                                                                            • Instruction ID: bbf4d838f967c29e60588e63803d12eed919ddadd9de85582a4ffad5961a5a62
                                                                                                            • Opcode Fuzzy Hash: 75d5fc51640a5041426569c160b13e111f410601e677684cc301fb6d3815de75
                                                                                                            • Instruction Fuzzy Hash: BDC26670D04298CBDB25DF68C894BEDBBB1AF19304F1481D9E449A7282DB749F85CF91
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                              • Part of subcall function 000951EB: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,76A923A0,?,00091CF9,?,001D69D8,76A923A0,?,76A923A0,-001E6880), ref: 0009524B
                                                                                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00101E22
                                                                                                              • Part of subcall function 00062B50: ___std_exception_copy.LIBVCRUNTIME ref: 00062BA7
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Concurrency::cancel_current_taskExceptionRaise___std_exception_copy
                                                                                                            • String ID: 4oST$4oST$4oST$4oST$OV~$OV~$Y T$cannot use operator[] with a string argument with $cannot use push_back() with
                                                                                                            • API String ID: 3394888853-2408073570
                                                                                                            • Opcode ID: eaeb8f8da2009a74580de838de41a8e1c4756baca2bbc18fd1e75f4f757f41c5
                                                                                                            • Instruction ID: d43066c8d47b1e243cf21035d64fa7fadb151f6f904acb770dd68d3c1ff11fd6
                                                                                                            • Opcode Fuzzy Hash: eaeb8f8da2009a74580de838de41a8e1c4756baca2bbc18fd1e75f4f757f41c5
                                                                                                            • Instruction Fuzzy Hash: F1926B70C05298DFDB25DF64C9447DEBBB1AF55300F24829DE489AB282DBB46B84CF91
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: +$+Inf$-Inf$Inf$NaN$gfff
                                                                                                            • API String ID: 0-2743850093
                                                                                                            • Opcode ID: 378e753e7d4cdc4ccaae056df1fcadf010a8a215f14ea684a28069bdd34fc845
                                                                                                            • Instruction ID: a0063cb2220f321b93b03e8036b1e869167793b02497d45fc8eedf15689e5066
                                                                                                            • Opcode Fuzzy Hash: 378e753e7d4cdc4ccaae056df1fcadf010a8a215f14ea684a28069bdd34fc845
                                                                                                            • Instruction Fuzzy Hash: 2472F17590CB808FD71ACF28845076ABFE6AF97344F088A5DF8DA9B242D734D945CB42
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • GetFileAttributesExW.KERNEL32(?,00000000,?,7591E010,?), ref: 000920AA
                                                                                                            • GetLastError.KERNEL32 ref: 000920B4
                                                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 000920CB
                                                                                                            • GetLastError.KERNEL32 ref: 000920D6
                                                                                                            • FindClose.KERNEL32(00000000), ref: 000920E2
                                                                                                            • ___std_fs_open_handle@16.LIBCPMT ref: 0009219B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorFileFindLast$AttributesCloseFirst___std_fs_open_handle@16
                                                                                                            • String ID:
                                                                                                            • API String ID: 2340820627-0
                                                                                                            • Opcode ID: 7c4e74c4ccb9a59edf652fb1c691b3f675a5bb299d6c90cfa2d1188e8b9b75eb
                                                                                                            • Instruction ID: 1bc79371d48b546cb2b036999dfb9423b08f8306776688dad16f31c6cef029d9
                                                                                                            • Opcode Fuzzy Hash: 7c4e74c4ccb9a59edf652fb1c691b3f675a5bb299d6c90cfa2d1188e8b9b75eb
                                                                                                            • Instruction Fuzzy Hash: 2E717975A00619BFCFA4CF68DC88BADB7B8BF05310F144295E865E3390DB30AA95DB51
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(?,7591E010,?), ref: 00146F9E
                                                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00146FA9
                                                                                                            • GetProcessHeap.KERNEL32 ref: 00146FB4
                                                                                                            • RtlAllocateHeap.NTDLL(00000000,00000000,00010000), ref: 00146FCE
                                                                                                            • RtlAllocateHeap.NTDLL(?,00000000,00010000), ref: 00147007
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Heap$Allocate$AddressHandleModuleProcProcess
                                                                                                            • String ID: 4oST
                                                                                                            • API String ID: 3330366720-3759581069
                                                                                                            • Opcode ID: eef7517b73cfa9bbc6a98d071124227c9d7f10ee12e1f2d416a9bea8b568e93c
                                                                                                            • Instruction ID: fc694cbab9c16a3d6dde777cd83ac0ea40f713cf71ea2e920f0f04f39738b298
                                                                                                            • Opcode Fuzzy Hash: eef7517b73cfa9bbc6a98d071124227c9d7f10ee12e1f2d416a9bea8b568e93c
                                                                                                            • Instruction Fuzzy Hash: F981EFB9D04259AFCB14CF99D881AEEFBB0FF49310F14825AE924A7350D7306A01CF55
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: __floor_pentium4
                                                                                                            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                            • API String ID: 4168288129-2761157908
                                                                                                            • Opcode ID: d98c5c8c08f66037025913b02e5f9839843e72c41cc125b51047765b5f9a6695
                                                                                                            • Instruction ID: 775bf0c938d610f46c0a3e4315200e1bf342ce5064d623bb5fb715108ddefb1a
                                                                                                            • Opcode Fuzzy Hash: d98c5c8c08f66037025913b02e5f9839843e72c41cc125b51047765b5f9a6695
                                                                                                            • Instruction Fuzzy Hash: 82D22771E086298FDB65CE28DC84BEAB7F5EB44315F1441EAD40DE7241EB78AE818F41
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: BINARY$MATCH$NOCASE$RTRIM$automatic extension loading failed: %s$no such vfs: %s$sqlite_rename_table
                                                                                                            • API String ID: 0-1885142750
                                                                                                            • Opcode ID: f106afd220187048dbc6ae1ce103661d829d260413d259f970df43063f442abf
                                                                                                            • Instruction ID: 9be74cc8853d948bd6ac3ae339fb7d13f1fe6e8bd2d1986d692908bdb6a6cdc6
                                                                                                            • Opcode Fuzzy Hash: f106afd220187048dbc6ae1ce103661d829d260413d259f970df43063f442abf
                                                                                                            • Instruction Fuzzy Hash: 9E021970A00700DFEB218F65DC85B6B77E5AB50305F14442CEC6AAF691DFB1EA89CB91
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002,00000000,?,?,?,000B35F3,?,?), ref: 000B337A
                                                                                                            • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002,00000000,?,?,?,000B35F3,?,?), ref: 000B33A3
                                                                                                            • GetACP.KERNEL32(?,?,000B35F3,?,?), ref: 000B33B8
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: InfoLocale
                                                                                                            • String ID: ACP$OCP
                                                                                                            • API String ID: 2299586839-711371036
                                                                                                            • Opcode ID: c90eab603ce9579e590f2df18519ffe97aa986c953688a45229f4a295cef347f
                                                                                                            • Instruction ID: 52fb17b347d3e1fd1c257f79d80d4cd69ac5a8fd863f3b6277ef2c18a111d56d
                                                                                                            • Opcode Fuzzy Hash: c90eab603ce9579e590f2df18519ffe97aa986c953688a45229f4a295cef347f
                                                                                                            • Instruction Fuzzy Hash: 23218032604105AADB748F29D945BDBB3E6AF54F50BB68564E90ADB110FF32DF81C350
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                              • Part of subcall function 000A9E32: GetLastError.KERNEL32(00000000,?,000AF819), ref: 000A9E36
                                                                                                              • Part of subcall function 000A9E32: SetLastError.KERNEL32(00000000,00000000,00000001,00000007,000000FF), ref: 000A9ED8
                                                                                                            • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 000B35C5
                                                                                                            • IsValidCodePage.KERNEL32(?), ref: 000B3603
                                                                                                            • IsValidLocale.KERNEL32(?,00000001), ref: 000B3616
                                                                                                            • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 000B365E
                                                                                                            • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 000B3679
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                                            • String ID:
                                                                                                            • API String ID: 415426439-0
                                                                                                            • Opcode ID: 0f0d0bbb206c037bfb49535400b198a810008dca693a7e1bcd1d7c4af9ed47e0
                                                                                                            • Instruction ID: d8212a3b13da65f8e5c784b7657a26f46c1256636569bd0568f83c5b4f87bced
                                                                                                            • Opcode Fuzzy Hash: 0f0d0bbb206c037bfb49535400b198a810008dca693a7e1bcd1d7c4af9ed47e0
                                                                                                            • Instruction Fuzzy Hash: 05515E71A00605AFDB60DFA9DC45BFEB7F8AF08700F244569E911EB191EB70DA44CB61
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                              • Part of subcall function 000A9E32: GetLastError.KERNEL32(00000000,?,000AF819), ref: 000A9E36
                                                                                                              • Part of subcall function 000A9E32: SetLastError.KERNEL32(00000000,00000000,00000001,00000007,000000FF), ref: 000A9ED8
                                                                                                            • GetACP.KERNEL32(?,?,?,?,?,?,000A72F0,?,?,?,?,?,-00000050,?,?,?), ref: 000B2C07
                                                                                                            • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,000A72F0,?,?,?,?,?,-00000050,?,?), ref: 000B2C3E
                                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 000B2DA1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$CodeInfoLocalePageValid
                                                                                                            • String ID: utf8
                                                                                                            • API String ID: 607553120-905460609
                                                                                                            • Opcode ID: 7fc077a3b9e9631ba6b7ff8559bb366d7021a4f8f1912b219b75245943c80613
                                                                                                            • Instruction ID: 0d75c06f69f61b0c71e03f96f5b0046887d90000293d7b043cc6fbd04c332bd4
                                                                                                            • Opcode Fuzzy Hash: 7fc077a3b9e9631ba6b7ff8559bb366d7021a4f8f1912b219b75245943c80613
                                                                                                            • Instruction Fuzzy Hash: 8371F236600606AADB25AF74CC86FFB77E8EF05700F14482AF915DB182EB70ED818761
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: d832fe2a0f42001a57c9b2c34ab75cd1b9a187cae735d2738bff895b2773b599
                                                                                                            • Instruction ID: 4d1515993591a0bcd00f3b3fca58cb0ade915d6532a6bf3957ad4d7b4816d890
                                                                                                            • Opcode Fuzzy Hash: d832fe2a0f42001a57c9b2c34ab75cd1b9a187cae735d2738bff895b2773b599
                                                                                                            • Instruction Fuzzy Hash: 1D021D71E012199BEF14CFA9D980AAEBBF1FF48314F248269D519E7381D731A941DB90
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • FindFirstFileA.KERNEL32(00000000,001C2EFC,001C2EFC,00000002,?,?), ref: 000F148F
                                                                                                            • FindNextFileA.KERNEL32(00000000,00000010), ref: 000F15EF
                                                                                                            • GetLastError.KERNEL32 ref: 000F15FD
                                                                                                            • FindClose.KERNEL32(00000000), ref: 000F160D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Find$File$CloseErrorFirstLastNext
                                                                                                            • String ID:
                                                                                                            • API String ID: 819619735-0
                                                                                                            • Opcode ID: 3e63cc000c346a9364b621ac0c1e776b5110fb2e1181a340c278bcfb0af3dcbc
                                                                                                            • Instruction ID: 156a79f4ee27b522782452e7368a7c55bc6193e5bf87ef69baaeea802a37e1ee
                                                                                                            • Opcode Fuzzy Hash: 3e63cc000c346a9364b621ac0c1e776b5110fb2e1181a340c278bcfb0af3dcbc
                                                                                                            • Instruction Fuzzy Hash: 50712A70C0024CDBDB15CF64C894BFDBBB5AF55314F184258E541ABA82D7369E88DB60
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                              • Part of subcall function 000A9E32: GetLastError.KERNEL32(00000000,?,000AF819), ref: 000A9E36
                                                                                                              • Part of subcall function 000A9E32: SetLastError.KERNEL32(00000000,00000000,00000001,00000007,000000FF), ref: 000A9ED8
                                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 000B2FB9
                                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 000B3003
                                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 000B30C9
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: InfoLocale$ErrorLast
                                                                                                            • String ID:
                                                                                                            • API String ID: 661929714-0
                                                                                                            • Opcode ID: 93edc1be90998cc3118728112a12b0436f13073b64136b10a2ed4330346cc792
                                                                                                            • Instruction ID: cfd0b1e7dfe4afe8e9f1bc6d5da2724df91663b80e60616782f902acf91ea994
                                                                                                            • Opcode Fuzzy Hash: 93edc1be90998cc3118728112a12b0436f13073b64136b10a2ed4330346cc792
                                                                                                            • Instruction Fuzzy Hash: 886171719102079FDB68EF28CD96BFA77E8EF04310F204679E915C6586EB34DA82DB50
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • IsDebuggerPresent.KERNEL32 ref: 00098B4C
                                                                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00098B56
                                                                                                            • UnhandledExceptionFilter.KERNEL32(?), ref: 00098B63
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                            • String ID:
                                                                                                            • API String ID: 3906539128-0
                                                                                                            • Opcode ID: b141879b6f71e0b7fe84fd16d87cb50397cd052ca4f0f1b8c15627cbbf9a3f31
                                                                                                            • Instruction ID: 51510d0bc4a15d697c8859a7c40f1467c87bf58f1fa8df71115bf7e505fe6b92
                                                                                                            • Opcode Fuzzy Hash: b141879b6f71e0b7fe84fd16d87cb50397cd052ca4f0f1b8c15627cbbf9a3f31
                                                                                                            • Instruction Fuzzy Hash: 2531B375901218ABCF61DF68DC89BCDBBB8BF08310F5041DAE41CA7251EB749B859F45
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • FindClose.KERNEL32(000000FF,?,0007D027,?,?,?,00084721), ref: 00091F98
                                                                                                            • FindFirstFileExW.KERNEL32(000000FF,00000001,?,00000000,00000000,00000000,?,?,?,0007D027,?,?,?,00084721), ref: 00091FC7
                                                                                                            • GetLastError.KERNEL32(?,0007D027,?,?,?,00084721), ref: 00091FD9
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Find$CloseErrorFileFirstLast
                                                                                                            • String ID:
                                                                                                            • API String ID: 4020440971-0
                                                                                                            • Opcode ID: 306fc210f491e19e4b47020e9455d895a69fe167369e0c2232c82cfd51df8806
                                                                                                            • Instruction ID: 1b6263dc6e8919179b6ad0af01f983dbf58e77788bdf9d2d735f5d3e11f2dd8b
                                                                                                            • Opcode Fuzzy Hash: 306fc210f491e19e4b47020e9455d895a69fe167369e0c2232c82cfd51df8806
                                                                                                            • Instruction Fuzzy Hash: BFF05E3520420EBFDF506FA5EC049FA7BADEF14370B508634F929C15A1D73189A1A661
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0019CA85
                                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0019CD87
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                                            • String ID:
                                                                                                            • API String ID: 885266447-0
                                                                                                            • Opcode ID: 08a3e2016fa4f08bf3e81fd6b302f8a0cb9d243c822405662e840bc1f8d95540
                                                                                                            • Instruction ID: 8da8d6903e39da1173e3d1d19030a6d893f45d936fec1626222d9767237ff7c4
                                                                                                            • Opcode Fuzzy Hash: 08a3e2016fa4f08bf3e81fd6b302f8a0cb9d243c822405662e840bc1f8d95540
                                                                                                            • Instruction Fuzzy Hash: 1602BF70A04602AFDF18CF68C850B6AB7E4BF99354F04866DE899C7650E774ED94CBC2
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 001A4443
                                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 001A44A1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                                            • String ID:
                                                                                                            • API String ID: 885266447-0
                                                                                                            • Opcode ID: c5440fcf590c25723296fd30bd8dd7134001728b0d3188cc1612fd63cfd0dc9b
                                                                                                            • Instruction ID: bae28312608cf3344927638294ece9210b9ef392212143e360d0e5413678d751
                                                                                                            • Opcode Fuzzy Hash: c5440fcf590c25723296fd30bd8dd7134001728b0d3188cc1612fd63cfd0dc9b
                                                                                                            • Instruction Fuzzy Hash: 6602D475E006298BCF19CF6CD8907BDFBB5BFD6310F1942AAE855AB281D7748941C780
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • GetSystemTimePreciseAsFileTime.KERNEL32(?,00093067,?,?,?,?,001251DF), ref: 00093645
                                                                                                            • GetSystemTimeAsFileTime.KERNEL32(?,21FC8FDF,00000000,?,001AE6F2,000000FF,?,00093067,?,?,?,?,001251DF), ref: 00093649
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Time$FileSystem$Precise
                                                                                                            • String ID:
                                                                                                            • API String ID: 743729956-0
                                                                                                            • Opcode ID: 319e03274b31e20291943fa86ae1a23889f98e7a1478cd8c57be3feac3397574
                                                                                                            • Instruction ID: f4df73e77f7a36d1fea67a3fb1dd2d25f1d6cb69e52264f629cbb7ffb57722ce
                                                                                                            • Opcode Fuzzy Hash: 319e03274b31e20291943fa86ae1a23889f98e7a1478cd8c57be3feac3397574
                                                                                                            • Instruction Fuzzy Hash: C4F0E5369046A4EFCB018F58DC44B5DB7E9FB08F20F004226F81297BA0CB74A900DF80
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: +$/
                                                                                                            • API String ID: 0-2439032044
                                                                                                            • Opcode ID: 128709c3d78b592050f2099eea1845dca92049bbeb02c6047a3e816553cf263d
                                                                                                            • Instruction ID: 847042e087653e31a9c41f50f626b45a00af7dd906b08c4c767ae8d7896facea
                                                                                                            • Opcode Fuzzy Hash: 128709c3d78b592050f2099eea1845dca92049bbeb02c6047a3e816553cf263d
                                                                                                            • Instruction Fuzzy Hash: 6502F470D042469FCB15CF68C8947EEBBF5FF49310F24426AE965AB392D7309A44DBA0
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: %s-mj%08X
                                                                                                            • API String ID: 0-77246884
                                                                                                            • Opcode ID: 5a2e0a8028ff38f35049eaeb6619baffb9916aaaaee568f37a6ca0049fad2bb5
                                                                                                            • Instruction ID: 30a19f8a0d6a1fdc3be573d669d74ffdcc1dff107b32015b6ee6a331ff83ade2
                                                                                                            • Opcode Fuzzy Hash: 5a2e0a8028ff38f35049eaeb6619baffb9916aaaaee568f37a6ca0049fad2bb5
                                                                                                            • Instruction Fuzzy Hash: 49428AB4A00205AFDF18CFA9D884BAEBBF5BF58304F148469E81AA7351D775ED81CB50
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,000ADA6F,?,?,?,?,?,?,00000000), ref: 000ADCA1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ExceptionRaise
                                                                                                            • String ID:
                                                                                                            • API String ID: 3997070919-0
                                                                                                            • Opcode ID: c7ce38be8ff473711b8027adac105d50612c62c6c5324e67451df7de92d09229
                                                                                                            • Instruction ID: e0b2a60efb0b0b7ed487288cb1b152aa3d79186f5c25d5f610ced2ba44834895
                                                                                                            • Opcode Fuzzy Hash: c7ce38be8ff473711b8027adac105d50612c62c6c5324e67451df7de92d09229
                                                                                                            • Instruction Fuzzy Hash: 96B19F31120609DFD755CF68C48AB647BE0FF46364F25865AE8DACF6A1C335E981CB40
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: __allrem
                                                                                                            • String ID:
                                                                                                            • API String ID: 2933888876-0
                                                                                                            • Opcode ID: c44bbcc0f39f7b0d23c97f2dc5159623da48b00775b52752b9f1f5bb8d69db2a
                                                                                                            • Instruction ID: b28bd48ee2359256747c14045d8d412dc3e355802665030cd1c04762dd3d0c7f
                                                                                                            • Opcode Fuzzy Hash: c44bbcc0f39f7b0d23c97f2dc5159623da48b00775b52752b9f1f5bb8d69db2a
                                                                                                            • Instruction Fuzzy Hash: 4A617C31614744DFCB19CF6DC88066ABBF1BF95300B0886AED886DB752C734EA55CB90
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                              • Part of subcall function 000A9E32: GetLastError.KERNEL32(00000000,?,000AF819), ref: 000A9E36
                                                                                                              • Part of subcall function 000A9E32: SetLastError.KERNEL32(00000000,00000000,00000001,00000007,000000FF), ref: 000A9ED8
                                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 000B320C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$InfoLocale
                                                                                                            • String ID:
                                                                                                            • API String ID: 3736152602-0
                                                                                                            • Opcode ID: d5b613b04f63b98e3f4043c33868f923c108da7331888de48e7e52aa166316f3
                                                                                                            • Instruction ID: 69949a8ad4c1eabdbae88ab9574e08c4875317795a3cee72b5f18e910306c7a7
                                                                                                            • Opcode Fuzzy Hash: d5b613b04f63b98e3f4043c33868f923c108da7331888de48e7e52aa166316f3
                                                                                                            • Instruction Fuzzy Hash: A4218E32601216ABDF289B64DC82AFB77E8EF45310F20007AF901D6242EB75EE459B50
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                              • Part of subcall function 000A9E32: GetLastError.KERNEL32(00000000,?,000AF819), ref: 000A9E36
                                                                                                              • Part of subcall function 000A9E32: SetLastError.KERNEL32(00000000,00000000,00000001,00000007,000000FF), ref: 000A9ED8
                                                                                                            • EnumSystemLocalesW.KERNEL32(000B2F65,00000001,00000000,?,?,?,000B3599,?), ref: 000B2EB1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$EnumLocalesSystem
                                                                                                            • String ID:
                                                                                                            • API String ID: 2417226690-0
                                                                                                            • Opcode ID: a14269743c117a582ef612a0503a573a0f553106fe2272f52715738b8a91ccab
                                                                                                            • Instruction ID: f710693b1d17368bf6b46b648d29295e92a9772493fabd590a974cb337f999ea
                                                                                                            • Opcode Fuzzy Hash: a14269743c117a582ef612a0503a573a0f553106fe2272f52715738b8a91ccab
                                                                                                            • Instruction Fuzzy Hash: E011253B2103015FDB18DF39D8916FAB7A1FF84368B14443DE98687B40D771A842CB40
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                              • Part of subcall function 000A9E32: GetLastError.KERNEL32(00000000,?,000AF819), ref: 000A9E36
                                                                                                              • Part of subcall function 000A9E32: SetLastError.KERNEL32(00000000,00000000,00000001,00000007,000000FF), ref: 000A9ED8
                                                                                                            • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,000B3181,00000000,00000000,?), ref: 000B3413
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$InfoLocale
                                                                                                            • String ID:
                                                                                                            • API String ID: 3736152602-0
                                                                                                            • Opcode ID: dee55a822138f7e8a7193a66f68527392702b396c7739621871198e1faaa2751
                                                                                                            • Instruction ID: 5fed1a2ad868c6172a291b685d79db92128c6cd82ae95061e6d5e300e022dd76
                                                                                                            • Opcode Fuzzy Hash: dee55a822138f7e8a7193a66f68527392702b396c7739621871198e1faaa2751
                                                                                                            • Instruction Fuzzy Hash: 7901D632A10126BBDF299A24CC45AFA37A4EB40354F264428AC46A7180EB34FF41D690
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                              • Part of subcall function 000A9E32: GetLastError.KERNEL32(00000000,?,000AF819), ref: 000A9E36
                                                                                                              • Part of subcall function 000A9E32: SetLastError.KERNEL32(00000000,00000000,00000001,00000007,000000FF), ref: 000A9ED8
                                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 000B2DA1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$InfoLocale
                                                                                                            • String ID: utf8
                                                                                                            • API String ID: 3736152602-905460609
                                                                                                            • Opcode ID: 458d6b420c5a7560bb54e9cabe247cc4618878e176461bba5755b0f32fa59b5f
                                                                                                            • Instruction ID: eb518002fe9081179fa677ce7ee518aa1a2e4451f97b41f1e5af42c2b0c62f4b
                                                                                                            • Opcode Fuzzy Hash: 458d6b420c5a7560bb54e9cabe247cc4618878e176461bba5755b0f32fa59b5f
                                                                                                            • Instruction Fuzzy Hash: 09F0A432640105ABCB14EB64DC56EFA73E8DF45315F110179F512DB282DA74AD059750
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                              • Part of subcall function 000A9E32: GetLastError.KERNEL32(00000000,?,000AF819), ref: 000A9E36
                                                                                                              • Part of subcall function 000A9E32: SetLastError.KERNEL32(00000000,00000000,00000001,00000007,000000FF), ref: 000A9ED8
                                                                                                            • EnumSystemLocalesW.KERNEL32(000B31B8,00000001,?,?,?,?,000B3561,?,?,?,?), ref: 000B2F24
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$EnumLocalesSystem
                                                                                                            • String ID:
                                                                                                            • API String ID: 2417226690-0
                                                                                                            • Opcode ID: 5e23cb640ec5eaf2ae5ab673c725dc8c5a22ec56633a468450c5657755a01e8e
                                                                                                            • Instruction ID: 80233339d070f1e47ab94a2d9c2fd71082cc6b3ecee9f48b7a4b87ddac938cf9
                                                                                                            • Opcode Fuzzy Hash: 5e23cb640ec5eaf2ae5ab673c725dc8c5a22ec56633a468450c5657755a01e8e
                                                                                                            • Instruction Fuzzy Hash: B9F0C2362003055FDB149F39D881ABABBE5EF81768B55443DFA454B681D671AC42CA50
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                              • Part of subcall function 000A423B: RtlEnterCriticalSection.NTDLL(-001E5967), ref: 000A424A
                                                                                                            • EnumSystemLocalesW.KERNEL32(000AB196,00000001,001D7298,0000000C,000AB5CB,?,?,?,?), ref: 000AB1DB
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                                            • String ID:
                                                                                                            • API String ID: 1272433827-0
                                                                                                            • Opcode ID: 1bb47c239ba119dcfc9d1f623a1d46f85124915a3f1f2a4674ce82c543e2a0b7
                                                                                                            • Instruction ID: 8aec8d01d67e548d6f15cd1bf303a9a0993a6df6e3dab2de4dc7a57c6089343e
                                                                                                            • Opcode Fuzzy Hash: 1bb47c239ba119dcfc9d1f623a1d46f85124915a3f1f2a4674ce82c543e2a0b7
                                                                                                            • Instruction Fuzzy Hash: D5F08776A04200AFDB10DFA8E842B8CB7B0EB09720F10815AF4109B2A2CBB55A408F50
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                              • Part of subcall function 000A9E32: GetLastError.KERNEL32(00000000,?,000AF819), ref: 000A9E36
                                                                                                              • Part of subcall function 000A9E32: SetLastError.KERNEL32(00000000,00000000,00000001,00000007,000000FF), ref: 000A9ED8
                                                                                                            • EnumSystemLocalesW.KERNEL32(000B2D4D,00000001,?,?,?,000B35BB,?,?,?,?), ref: 000B2E2B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$EnumLocalesSystem
                                                                                                            • String ID:
                                                                                                            • API String ID: 2417226690-0
                                                                                                            • Opcode ID: 5b939f7e3e0872a6c3684521b191f83e982472ae71a867774e53f7dcc1352f1c
                                                                                                            • Instruction ID: f8c25a73d061d1ff58f1f4eda822f64fa3582108f03f56ee6b0b9337870e145e
                                                                                                            • Opcode Fuzzy Hash: 5b939f7e3e0872a6c3684521b191f83e982472ae71a867774e53f7dcc1352f1c
                                                                                                            • Instruction Fuzzy Hash: 45F0E53630020557CB14EF36D8456ABBF94EFC2710B464059EA168F751C671D843CB90
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,?,?,?,?,000A7E66,?,20001004,?,00000002,?,?,000A7458), ref: 000AB75A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: InfoLocale
                                                                                                            • String ID:
                                                                                                            • API String ID: 2299586839-0
                                                                                                            • Opcode ID: b9b289b668b4597c2dd4fbc65d484ab84cf4fb26da6214256990feded6436165
                                                                                                            • Instruction ID: ac27871c92b29de26d2a60b1c810739bbc391c0917a67ab749341772f67e2528
                                                                                                            • Opcode Fuzzy Hash: b9b289b668b4597c2dd4fbc65d484ab84cf4fb26da6214256990feded6436165
                                                                                                            • Instruction Fuzzy Hash: 22E04F3150021CBBCF123FA0DC48AEE3F66EF46761F044111FD0565172CB729960ABD5
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: e66eafb21ff0ac23a1e243a383367402beece03311f5ec548545498dddb0c253
                                                                                                            • Instruction ID: 878174dbf5aff41fdc09f75b36a645431e767394eb96d3daeec0866e9919d909
                                                                                                            • Opcode Fuzzy Hash: e66eafb21ff0ac23a1e243a383367402beece03311f5ec548545498dddb0c253
                                                                                                            • Instruction Fuzzy Hash: AD3273B3F5161447DF1CCA6ECC922EDB2E36FD821871E813DE80AE3345EA79E9454684
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 3a9c9f5395dbdcb4626e82820b376a20c7e32561f895b52bb09c534990b299cb
                                                                                                            • Instruction ID: e4a57b700e34f04f10233b4547bbc523c80f3c7b743e53882227d59f0d492375
                                                                                                            • Opcode Fuzzy Hash: 3a9c9f5395dbdcb4626e82820b376a20c7e32561f895b52bb09c534990b299cb
                                                                                                            • Instruction Fuzzy Hash: 6B625AB1E00205DBDB16CF99C5847ADBBB1BF48309F2881A9DC64AF242D775D94ACF90
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3553957221.000000007F5A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 7F5A0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_7f5a0000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 4ae0bc7da4daf42cb7dd2ccaf3ed764511ab6115a11b282037d05a21980b2fe9
                                                                                                            • Instruction ID: c126a75dfb8f1e936d93d3a3b6d280e4b0ce2f42f68e56548bed33f1373bbd85
                                                                                                            • Opcode Fuzzy Hash: 4ae0bc7da4daf42cb7dd2ccaf3ed764511ab6115a11b282037d05a21980b2fe9
                                                                                                            • Instruction Fuzzy Hash: 12F166B2E002106BF3048D29DC84B9B7A9BEBC4324F6A863DEE0E677C5D5765D1287D1
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 157005189a0b79073f2a6471fda368ce7040346b24c23a8facd3e4425d97c23e
                                                                                                            • Instruction ID: 9502dd087c247011fcf834dee454908d82f5f2fe8cfd6ec0cc3107d223ece442
                                                                                                            • Opcode Fuzzy Hash: 157005189a0b79073f2a6471fda368ce7040346b24c23a8facd3e4425d97c23e
                                                                                                            • Instruction Fuzzy Hash: 3EF18F3A9092928FDB158E3CC4913EDBF62AFE7310F1846A6C49597387D3B8D905C7A0
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: c2deecbe3ee60a011d5856fdee5848cba5150375c33bcb85bf53e5887f2a007a
                                                                                                            • Instruction ID: 25910bc93db4fb99b3706c687d0c25f062537a2e73e9be3507c74bb696fff99d
                                                                                                            • Opcode Fuzzy Hash: c2deecbe3ee60a011d5856fdee5848cba5150375c33bcb85bf53e5887f2a007a
                                                                                                            • Instruction Fuzzy Hash: CFE11372E1022A9FCB05CFA8D8816ADFBF1FF88310F1942A9D855B7340D670AD45CBA0
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: d47f9fcafd0f2a9037f6dc50320954361fda6c5561af363a2318e7d104d0e1db
                                                                                                            • Instruction ID: e908a21985911f79f42276a4261bd924629670d1a245cf359a19c9120cadc31c
                                                                                                            • Opcode Fuzzy Hash: d47f9fcafd0f2a9037f6dc50320954361fda6c5561af363a2318e7d104d0e1db
                                                                                                            • Instruction Fuzzy Hash: 70C1C9B0900B0E8FCB74CFE8C5946BABBF5BF4B304F144619DA969B692C331A945CB11
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast
                                                                                                            • String ID:
                                                                                                            • API String ID: 1452528299-0
                                                                                                            • Opcode ID: 5557a5b447a7e3add44bd49d1e77c30da2a1c5eec5368febcf9f777a98da3850
                                                                                                            • Instruction ID: df339f67432f25bbf3ba1e2a2781e294ed38081423317688d4ca6081f0e3b400
                                                                                                            • Opcode Fuzzy Hash: 5557a5b447a7e3add44bd49d1e77c30da2a1c5eec5368febcf9f777a98da3850
                                                                                                            • Instruction Fuzzy Hash: 6AB115355007069BCB389B64CC92BFBB3E8FF55308F54456DEA86C6681EE74E986CB10
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3553957221.000000007F5A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 7F5A0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_7f5a0000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 37871e876a0709476e21d6355c9596110cb6e566f0dc8a76eccda1d0de5faa80
                                                                                                            • Instruction ID: b6a6e085e93fcc4015bf65d9d48e96d572ee4628668e2780e5671de4c7548e55
                                                                                                            • Opcode Fuzzy Hash: 37871e876a0709476e21d6355c9596110cb6e566f0dc8a76eccda1d0de5faa80
                                                                                                            • Instruction Fuzzy Hash: 6891B9B3B142055BF3088D29DCC0BAB7B9BEBD4324F25823DD94A5B3C4E5761C228791
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: ee3f7b13948713fc05010b50662c4ce3fdda74f4e130956dee37b10c8a19110a
                                                                                                            • Instruction ID: abc9bfe8d42fa38192db2a096677176f4ac6fd848457f35a539b152713d6985f
                                                                                                            • Opcode Fuzzy Hash: ee3f7b13948713fc05010b50662c4ce3fdda74f4e130956dee37b10c8a19110a
                                                                                                            • Instruction Fuzzy Hash: F3A13BB9A056069FDB14CF69D440769FBE1FF4A314B28C56AE829CB311E731EE11CB80
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: ec0285caa0e15a39a280ea05994e11302f65cd081bf085db4419cdb56dc1662d
                                                                                                            • Instruction ID: a59efee24b59e0e4df094cdf32e739ecc42519f67da5934d983c7d575efa7913
                                                                                                            • Opcode Fuzzy Hash: ec0285caa0e15a39a280ea05994e11302f65cd081bf085db4419cdb56dc1662d
                                                                                                            • Instruction Fuzzy Hash: AF8104B5E002868FDB118F68D8D17FEBBF8EB2A300F444169D9549B793CB359909C7A0
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 24d872cb12409e63d79b5a5825687b94122ab3084bd8c518075bf89503609aa9
                                                                                                            • Instruction ID: 42d92bede77ea8803b5fce8ddabfb2a2093e33ed7e5e6340f9ac435f5ea5fe6c
                                                                                                            • Opcode Fuzzy Hash: 24d872cb12409e63d79b5a5825687b94122ab3084bd8c518075bf89503609aa9
                                                                                                            • Instruction Fuzzy Hash: 546123316241658FE718CF1EFCD0C267F62A38A3113854619EA81CB695C739F966DBE0
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 46680d0314554fd398ed7fd020ff60bee8df1d437ae882661bd78aeb1168d151
                                                                                                            • Instruction ID: 0cfa2e960daff54f3af09338c8d2dd65047d9a2520ee6d702d92d38ee4986bae
                                                                                                            • Opcode Fuzzy Hash: 46680d0314554fd398ed7fd020ff60bee8df1d437ae882661bd78aeb1168d151
                                                                                                            • Instruction Fuzzy Hash: CF518F72E0011AAFDF14CF98C941AEEBBF6FF89304F198459E915AB201D734AA40DB91
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                                            • Instruction ID: 92bc1e173671fb7fd787530486469d29a367d4b5758a5343820300fe84fbf35b
                                                                                                            • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                                            • Instruction Fuzzy Hash: D9112B7726809143DEA8873DD8B46BBA7D5FFC532072C437AD4594BB58E122E945BA00
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3553957221.000000007F5A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 7F5A0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_7f5a0000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 2ddb511bfe9e772207caf9189944069cd9798f1b243b634550cda5e5aeacc398
                                                                                                            • Instruction ID: aa1c7ac8d0ebde425359986f1cc1f67bc2e7ce176ec905b13d58ad9f36a3a0bc
                                                                                                            • Opcode Fuzzy Hash: 2ddb511bfe9e772207caf9189944069cd9798f1b243b634550cda5e5aeacc398
                                                                                                            • Instruction Fuzzy Hash:
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(?,7591E010,?), ref: 00146650
                                                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00146660
                                                                                                            • GetModuleHandleA.KERNEL32(?), ref: 00146778
                                                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00146782
                                                                                                            • OpenProcess.KERNEL32(00000040,00000000,?), ref: 0014678E
                                                                                                            • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000), ref: 001467FD
                                                                                                            • CloseHandle.KERNEL32(?), ref: 00146830
                                                                                                            • CloseHandle.KERNEL32(?), ref: 00146856
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00146876
                                                                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,?), ref: 00146A18
                                                                                                            • ResetEvent.KERNEL32(00000000), ref: 00146A21
                                                                                                            • CreateThread.KERNEL32(00000000,00000000,00146B50,?,00000000,00000000), ref: 00146A45
                                                                                                            • WaitForSingleObject.KERNEL32(00000000,00000064), ref: 00146A51
                                                                                                            • RtlUnicodeStringToAnsiString.NTDLL(?,?,00000001), ref: 00146A97
                                                                                                            • CloseHandle.KERNEL32(?), ref: 00146AD8
                                                                                                            • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000001), ref: 00146AE4
                                                                                                            • CloseHandle.KERNEL32(?), ref: 00146B03
                                                                                                            • TerminateThread.KERNEL32(?,00000000), ref: 00146B31
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Handle$Close$Process$AddressCreateCurrentEventModuleProcStringThread$AnsiObjectOpenResetSingleTerminateUnicodeWait
                                                                                                            • String ID: 4oST$4oST$@!29$File$|@]
                                                                                                            • API String ID: 3681783469-1165558708
                                                                                                            • Opcode ID: 56400270fae1aeb02848b5dd9a8f9938bbe19ced7e33c1a00387010a8ce74e06
                                                                                                            • Instruction ID: 4a08547701bc4352d787bf713e47cd3543d08f91bcb8459c5c773aa9081d5c1e
                                                                                                            • Opcode Fuzzy Hash: 56400270fae1aeb02848b5dd9a8f9938bbe19ced7e33c1a00387010a8ce74e06
                                                                                                            • Instruction Fuzzy Hash: E122C0B4D002599FDB25CF98D981BEEBBB1BF08314F244199E909B7351D7306A81CFA6
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • RtlDecodePointer.NTDLL(?), ref: 000B79EC
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: DecodePointer
                                                                                                            • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                                                            • API String ID: 3527080286-3064271455
                                                                                                            • Opcode ID: ea11668c9c2cf7007fa8d83ab26951b4763aaffe27ae808d6b3e5f2b2191ef4d
                                                                                                            • Instruction ID: fe1fd3b547c19174a643445ed7a727bc1e02766a004bd1865f8bd33b7b62c385
                                                                                                            • Opcode Fuzzy Hash: ea11668c9c2cf7007fa8d83ab26951b4763aaffe27ae808d6b3e5f2b2191ef4d
                                                                                                            • Instruction Fuzzy Hash: 6151B07090860ACBCF648FA8D94CAED7FF4FF85310F554184D485AB264CBB48A65CF56
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • _ValidateLocalCookies.LIBCMT ref: 000972F7
                                                                                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 000972FF
                                                                                                            • _ValidateLocalCookies.LIBCMT ref: 00097388
                                                                                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 000973B3
                                                                                                            • _ValidateLocalCookies.LIBCMT ref: 00097408
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                            • String ID: csm$W
                                                                                                            • API String ID: 1170836740-4264767586
                                                                                                            • Opcode ID: 55445d0f5d6d7e2a5f5bd640b0b48ae3935079d10e67d39075ce413ee18dbefc
                                                                                                            • Instruction ID: d525fbca9654b7866d59438a9395abbe7e16abe6020aaba4f6df78f952a3b9ef
                                                                                                            • Opcode Fuzzy Hash: 55445d0f5d6d7e2a5f5bd640b0b48ae3935079d10e67d39075ce413ee18dbefc
                                                                                                            • Instruction Fuzzy Hash: 5A41AF35A24209ABCF20DF68C885ADEBBE5AF45314F14C155FC1C9B392D771EA01EB91
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _strrchr
                                                                                                            • String ID:
                                                                                                            • API String ID: 3213747228-0
                                                                                                            • Opcode ID: 88e4da6258101c5fc24b34185784eb547dfa0330ad300027970d950eece25734
                                                                                                            • Instruction ID: 513a81706ba9079000e8ac1fbd1f2d5c0b24137e1ce3ca203ba930ed99968838
                                                                                                            • Opcode Fuzzy Hash: 88e4da6258101c5fc24b34185784eb547dfa0330ad300027970d950eece25734
                                                                                                            • Instruction Fuzzy Hash: FCB10372A04355AFDB21CFA8CC81BEE7BE5EF56310F188155E904AF283EB749941C7A0
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • FreeLibrary.KERNEL32(00000000,?,000AB47F,?,?,00000000,00000001,?,?,000AB6A9,00000022,FlsSetValue,001BEB88,001BEB90,00000001), ref: 000AB431
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FreeLibrary
                                                                                                            • String ID: api-ms-$ext-ms-
                                                                                                            • API String ID: 3664257935-537541572
                                                                                                            • Opcode ID: 89b7fd357e28f6f36e43ffc4b93881a4a718b251f938dd2ecb3ec259b58aa7d3
                                                                                                            • Instruction ID: 7dcba9c66c2ca53fb795e4625455be986b2604278bbe46cc93d3db6875b7513a
                                                                                                            • Opcode Fuzzy Hash: 89b7fd357e28f6f36e43ffc4b93881a4a718b251f938dd2ecb3ec259b58aa7d3
                                                                                                            • Instruction Fuzzy Hash: 3821E732A41211ABCB319BF5EC41A9E77D8DF47760F140221F905AB693DB30EE40C6D0
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • GetLastError.KERNEL32(?,00000000), ref: 00133F83
                                                                                                            • 6D1B7CF0.RSTRTMGR(?,00000000,?), ref: 00134000
                                                                                                            • SetLastError.KERNEL32(00000000), ref: 001340AE
                                                                                                            • CopyFileA.KERNEL32(?,?,00000000), ref: 001340D5
                                                                                                            • GetLastError.KERNEL32(?,?,00000000), ref: 001340E3
                                                                                                            • CopyFileA.KERNEL32(?,?,00000000), ref: 001340F7
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$CopyFile
                                                                                                            • String ID:
                                                                                                            • API String ID: 936320341-0
                                                                                                            • Opcode ID: 2d3caf735e3771916fa4aa27ec6c6a046de343fe34f439ebaaf1c5a7149b84e3
                                                                                                            • Instruction ID: 7633d46bba6f616548af3255b2b7a72ca11538c7df83fe2a10d2fd4a5cc321e3
                                                                                                            • Opcode Fuzzy Hash: 2d3caf735e3771916fa4aa27ec6c6a046de343fe34f439ebaaf1c5a7149b84e3
                                                                                                            • Instruction Fuzzy Hash: 9251AF72D01219ABDB21DFA4CC45BEEBBB8EF08320F10426AE914B3290D7756E45CB91
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 0007A09D
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 0007A0BF
                                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 0007A0E7
                                                                                                            • __Getctype.LIBCPMT ref: 0007A1C5
                                                                                                            • std::_Facet_Register.LIBCPMT ref: 0007A1F9
                                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 0007A223
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                                                                                            • String ID:
                                                                                                            • API String ID: 1102183713-0
                                                                                                            • Opcode ID: 2ae86ed1a812b691771102ea707580e711075bd34309d3885b3d7268a93dc7b9
                                                                                                            • Instruction ID: 34de7b258e2275ebd2c1d4b661223919f365fb6861d881b9ef86c50c6ed9a0aa
                                                                                                            • Opcode Fuzzy Hash: 2ae86ed1a812b691771102ea707580e711075bd34309d3885b3d7268a93dc7b9
                                                                                                            • Instruction Fuzzy Hash: 9C518BB0D01249DFDB10CF98C98579EBBF0BB51714F14815DE849AB382D778AA44CBD2
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(?), ref: 00146C7E
                                                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00146C8A
                                                                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,?), ref: 00146E05
                                                                                                            • SetEvent.KERNEL32(00000000), ref: 00146E0C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Event$AddressCreateHandleModuleProc
                                                                                                            • String ID: 4oST
                                                                                                            • API String ID: 2341598627-3759581069
                                                                                                            • Opcode ID: 1d0a4e14968bb6de89185265769a7d4cd2457ca7acb64b0da5ded1848adf64e5
                                                                                                            • Instruction ID: 1822a394adf80b1913473d18c4796918d1bd67bc113e978beefe0b13d1cd447d
                                                                                                            • Opcode Fuzzy Hash: 1d0a4e14968bb6de89185265769a7d4cd2457ca7acb64b0da5ded1848adf64e5
                                                                                                            • Instruction Fuzzy Hash: E1819AB85083829FC304CF59C480A5BFBE1AF98780F50491EF99587361D770EA8ACF96
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,21FC8FDF,?,?,00000000,001AE6D5,000000FF,?,000A35FF,?,?,000A35D3,00000016), ref: 000A3658
                                                                                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 000A366A
                                                                                                            • FreeLibrary.KERNEL32(00000000,?,00000000,001AE6D5,000000FF,?,000A35FF,?,?,000A35D3,00000016), ref: 000A368C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                            • String ID: CorExitProcess$mscoree.dll
                                                                                                            • API String ID: 4061214504-1276376045
                                                                                                            • Opcode ID: 2d2d6f89a974527dc8b2b49416340ceef976135419259196c522ff469a4ed56b
                                                                                                            • Instruction ID: 99971693b39cfa3960c29ac6ffd4d7dc33259b35f567e7a4b6a56e0e0425167c
                                                                                                            • Opcode Fuzzy Hash: 2d2d6f89a974527dc8b2b49416340ceef976135419259196c522ff469a4ed56b
                                                                                                            • Instruction Fuzzy Hash: 1E01D631A44659FFCB158F94DC09BAEBBF8FF04B14F404629F812E26D0DBB49A40CA90
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 0007C45A
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 0007C47C
                                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 0007C4A4
                                                                                                            • std::_Facet_Register.LIBCPMT ref: 0007C59A
                                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 0007C5C4
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                                                                            • String ID:
                                                                                                            • API String ID: 459529453-0
                                                                                                            • Opcode ID: 85f0172595599487112cfd142512ab865eeb2e5bae8e4d65f1001f1768a3ddf2
                                                                                                            • Instruction ID: e794ef0d79fcd4fae4942ff8135093b097ea4bc2a6cd85876dde2dab957f184e
                                                                                                            • Opcode Fuzzy Hash: 85f0172595599487112cfd142512ab865eeb2e5bae8e4d65f1001f1768a3ddf2
                                                                                                            • Instruction Fuzzy Hash: FC51ADB0900254DBEB21DF98C954BAEBBF0FF10354F24815DE849AB381D779AA44CBD1
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 00092BCC
                                                                                                            • RtlAcquireSRWLockExclusive.NTDLL(00000008), ref: 00092BEB
                                                                                                            • RtlAcquireSRWLockExclusive.NTDLL(00000008), ref: 00092C19
                                                                                                            • RtlTryAcquireSRWLockExclusive.NTDLL(00000008), ref: 00092C74
                                                                                                            • RtlTryAcquireSRWLockExclusive.NTDLL(00000008), ref: 00092C8B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AcquireExclusiveLock$CurrentThread
                                                                                                            • String ID:
                                                                                                            • API String ID: 66001078-0
                                                                                                            • Opcode ID: d249828358eb0b5c692f5c639f340335360bd7ea305d8ab9e748820944580baa
                                                                                                            • Instruction ID: c1dce24c387f39263eb2542ef8970910cf4b3b5d78b90457b0766357d9fea9b3
                                                                                                            • Opcode Fuzzy Hash: d249828358eb0b5c692f5c639f340335360bd7ea305d8ab9e748820944580baa
                                                                                                            • Instruction Fuzzy Hash: 7E416CB190060AEFCF20DF65D4959AEB3F4FF08350B604A29E45AD7A41D730F984EB61
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • CopyFileA.KERNEL32(?,?,00000000), ref: 00133DD0
                                                                                                              • Part of subcall function 00133F50: GetLastError.KERNEL32(?,00000000), ref: 00133F83
                                                                                                              • Part of subcall function 00133F50: 6D1B7CF0.RSTRTMGR(?,00000000,?), ref: 00134000
                                                                                                            • std::_Throw_Cpp_error.LIBCPMT ref: 00133F34
                                                                                                            • std::_Throw_Cpp_error.LIBCPMT ref: 00133F45
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Cpp_errorThrow_std::_$CopyErrorFileLast
                                                                                                            • String ID: 4oST
                                                                                                            • API String ID: 1723067277-3759581069
                                                                                                            • Opcode ID: 0a7d920167be588a84ce598297174bdaf7c0f847ac785c820fd264eba158a396
                                                                                                            • Instruction ID: b375b1c16f87b0d08f2805cdf1cbd5de6e4db00e5f9310383e63e50820992e1c
                                                                                                            • Opcode Fuzzy Hash: 0a7d920167be588a84ce598297174bdaf7c0f847ac785c820fd264eba158a396
                                                                                                            • Instruction Fuzzy Hash: 9CD17AB0D01289DFDB14CFA8C9417EEFBB1AF55314F244299D4197B282DB345B89CBA2
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0006499F
                                                                                                              • Part of subcall function 000951EB: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,76A923A0,?,00091CF9,?,001D69D8,76A923A0,?,76A923A0,-001E6880), ref: 0009524B
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ExceptionIos_base_dtorRaisestd::ios_base::_
                                                                                                            • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                            • API String ID: 1903096808-1866435925
                                                                                                            • Opcode ID: 1581e80587e6b8daa44fe69852b18e7d128d5b536740a4d7fa55f5c0ee0d5a76
                                                                                                            • Instruction ID: 630eb75fff6ceee5490e18e8366e05f9f7d90fd857c6e2eb1598794a1e9f93a0
                                                                                                            • Opcode Fuzzy Hash: 1581e80587e6b8daa44fe69852b18e7d128d5b536740a4d7fa55f5c0ee0d5a76
                                                                                                            • Instruction Fuzzy Hash: C51102B29446447BCB20DE58CC03FEA73D8AB05710F044629FE59972C2EB75A904C7A2
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • GetConsoleOutputCP.KERNEL32(21FC8FDF,00000000,00000000,?), ref: 000A8EF2
                                                                                                              • Part of subcall function 000AEC43: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,000AA854,?,00000000,-00000008), ref: 000AECA4
                                                                                                            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 000A9144
                                                                                                            • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 000A918A
                                                                                                            • GetLastError.KERNEL32 ref: 000A922D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                                            • String ID:
                                                                                                            • API String ID: 2112829910-0
                                                                                                            • Opcode ID: 7636d94ad3751d862b8bec33b8594fdba9396ac79f869ed5ebaff3d6bb18cb94
                                                                                                            • Instruction ID: e65a84546c438df29d0ce4c915c220f1d0148db60e61f9c0599b5dff6435180d
                                                                                                            • Opcode Fuzzy Hash: 7636d94ad3751d862b8bec33b8594fdba9396ac79f869ed5ebaff3d6bb18cb94
                                                                                                            • Instruction Fuzzy Hash: 17D16A75E04249AFCF15CFE8D884AEDBBF9FF0A314F24452AE41AEB251D630A941CB50
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • WideCharToMultiByte.KERNEL32(?,00000400,?,?,?,?,00000000,00000000,?,?,?,0007A856,00000000,?,?,00000000), ref: 00091F19
                                                                                                            • GetLastError.KERNEL32(?,0007A856,00000000,?,?,00000000,00000000,?,?), ref: 00091F25
                                                                                                            • WideCharToMultiByte.KERNEL32(?,00000000,?,?,?,?,00000000,00000000,?,0007A856,00000000,?,?,00000000,00000000,?), ref: 00091F4B
                                                                                                            • GetLastError.KERNEL32(?,0007A856,00000000,?,?,00000000,00000000,?,?), ref: 00091F57
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharErrorLastMultiWide
                                                                                                            • String ID:
                                                                                                            • API String ID: 203985260-0
                                                                                                            • Opcode ID: 60783e63372a670c30338fd533e5b0dadff9c602bf226e6b8126a1a5cda0dd8f
                                                                                                            • Instruction ID: eb292b1822ec88d08f5fbeb204d5ab1d0faf500ba8d64f0bf44ce67ec928d354
                                                                                                            • Opcode Fuzzy Hash: 60783e63372a670c30338fd533e5b0dadff9c602bf226e6b8126a1a5cda0dd8f
                                                                                                            • Instruction Fuzzy Hash: 3C01FF32B0415EBB8F221E56DC09C9F3E6AEBD97A0F104124FE1555220C7318862A7A1
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • __EH_prolog3.LIBCMT ref: 00092720
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 0009272B
                                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00092799
                                                                                                              • Part of subcall function 0009287C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00092894
                                                                                                            • std::locale::_Setgloballocale.LIBCPMT ref: 00092746
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                                                                                            • String ID:
                                                                                                            • API String ID: 677527491-0
                                                                                                            • Opcode ID: 0cf837a08eb5abca7119e37ff271119d2697ce39ad6460f2457ab0f529b1eb01
                                                                                                            • Instruction ID: af1a3f3e5131a7cf412afe0f3badfa2483e1c722315e78c91d4da8b6074a0c23
                                                                                                            • Opcode Fuzzy Hash: 0cf837a08eb5abca7119e37ff271119d2697ce39ad6460f2457ab0f529b1eb01
                                                                                                            • Instruction Fuzzy Hash: AA01F735A00610ABCF05EB70C8455BD77B1FF84780F184019E80117392CF749E82EBC2
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • WriteConsoleW.KERNEL32(?,?,?,00000000,?,?,000B3DBC,?,00000001,?,?,?,000A9281,?,00000000,00000000), ref: 000B6D39
                                                                                                            • GetLastError.KERNEL32(?,000B3DBC,?,00000001,?,?,?,000A9281,?,00000000,00000000,?,?,?,000A985B,?), ref: 000B6D45
                                                                                                              • Part of subcall function 000B6D0B: CloseHandle.KERNEL32(FFFFFFFE,000B6D55,?,000B3DBC,?,00000001,?,?,?,000A9281,?,00000000,00000000,?,?), ref: 000B6D1B
                                                                                                            • ___initconout.LIBCMT ref: 000B6D55
                                                                                                              • Part of subcall function 000B6CCD: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,000B6CFC,000B3DA9,?,?,000A9281,?,00000000,00000000,?), ref: 000B6CE0
                                                                                                            • WriteConsoleW.KERNEL32(?,?,?,00000000,?,000B3DBC,?,00000001,?,?,?,000A9281,?,00000000,00000000,?), ref: 000B6D6A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                                            • String ID:
                                                                                                            • API String ID: 2744216297-0
                                                                                                            • Opcode ID: a56d710da464ab100bb9bb1615bbde86284fa107a316080c16d3824b2640f475
                                                                                                            • Instruction ID: 1a9aac75b2ba5e26ee5251fa4822f73e6871f3d01d1dd28eeb0fcc1db662cce4
                                                                                                            • Opcode Fuzzy Hash: a56d710da464ab100bb9bb1615bbde86284fa107a316080c16d3824b2640f475
                                                                                                            • Instruction Fuzzy Hash: FFF0A536940158BBCF622FE5DC18EDA3F6AFF483A1F454514FA1C95621C7368CA0DB92
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • ___std_exception_destroy.LIBVCRUNTIME ref: 00066587
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ___std_exception_destroy
                                                                                                            • String ID: ", "$: "
                                                                                                            • API String ID: 4194217158-747220369
                                                                                                            • Opcode ID: 9b62463a2143d1fd51a1965e28bbf1b06b7db7c24634945cd93ddf542bcc2661
                                                                                                            • Instruction ID: 9e25e1b0b00c3235ec14422d906351c6be277f9c4a1fb2fc4f07f68e45efe45c
                                                                                                            • Opcode Fuzzy Hash: 9b62463a2143d1fd51a1965e28bbf1b06b7db7c24634945cd93ddf542bcc2661
                                                                                                            • Instruction Fuzzy Hash: D2D1D570E00605DFCB24DFA8C845AAEBBF6FF85310F10462DE46697382DB75AA44DB91
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • ___std_exception_destroy.LIBVCRUNTIME ref: 0006750C
                                                                                                            • ___std_exception_destroy.LIBVCRUNTIME ref: 00067522
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ___std_exception_destroy
                                                                                                            • String ID: [json.exception.
                                                                                                            • API String ID: 4194217158-791563284
                                                                                                            • Opcode ID: f1f31d44331ae9b7e86522e1cd75bd5e0cbe79977b052ad2bf7fee1a4f61d993
                                                                                                            • Instruction ID: eb2d69fce2e65a98b44901c15b9bb31cb159ecf7d35a02702b361052006b407a
                                                                                                            • Opcode Fuzzy Hash: f1f31d44331ae9b7e86522e1cd75bd5e0cbe79977b052ad2bf7fee1a4f61d993
                                                                                                            • Instruction Fuzzy Hash: 6251F3B0D007489FDB10DF68C905BDEFBB4EF11314F148259E854A7382E7B89A44CBA1
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0006499F
                                                                                                              • Part of subcall function 000951EB: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,76A923A0,?,00091CF9,?,001D69D8,76A923A0,?,76A923A0,-001E6880), ref: 0009524B
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ExceptionIos_base_dtorRaisestd::ios_base::_
                                                                                                            • String ID: ios_base::badbit set$ios_base::failbit set
                                                                                                            • API String ID: 1903096808-1240500531
                                                                                                            • Opcode ID: f7c8c209da374ba653db1ae404c5c9c1f586fb3ec65ffd9acf2d94bba4fef6dd
                                                                                                            • Instruction ID: c634b1d276a4a7a516962b84aa772b5d1a77462d51b8fa16823e1f93a16fcbab
                                                                                                            • Opcode Fuzzy Hash: f7c8c209da374ba653db1ae404c5c9c1f586fb3ec65ffd9acf2d94bba4fef6dd
                                                                                                            • Instruction Fuzzy Hash: 814101B1904248AFCB04DF58CD46BEEBBF9EF05710F148219F554A7282EB759A04CBA1
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00064061
                                                                                                            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 000640C4
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000000.00000002.3549484223.0000000000061000.00000040.00000001.01000000.00000003.sdmp, Offset: 00060000, based on PE: true
                                                                                                            • Associated: 00000000.00000002.3549401683.0000000000060000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549484223.00000000001F2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.00000000001FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000201000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3549870958.0000000000204000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000207000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000337000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.0000000000351000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000003E0000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.00000000006F8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            • Associated: 00000000.00000002.3550003524.000000000099D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_0_2_60000_SecuriteInfo.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                                                                            • String ID: bad locale name
                                                                                                            • API String ID: 3988782225-1405518554
                                                                                                            • Opcode ID: 6050fa3594c86a3b61a08b22c750337a3da9e590cba0ce7a2b3291378b673159
                                                                                                            • Instruction ID: f8130170e486289950fd9ea67a731cc0d11a353a1c9dc2ffdcc8e5d40fb01f25
                                                                                                            • Opcode Fuzzy Hash: 6050fa3594c86a3b61a08b22c750337a3da9e590cba0ce7a2b3291378b673159
                                                                                                            • Instruction Fuzzy Hash: 7B11D370905B84EED721CF68C50478BBFF4AF15714F148A8DD09597B82D3B59A04C791
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Execution Graph

                                                                                                            Execution Coverage:4.7%
                                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                                            Signature Coverage:0%
                                                                                                            Total number of Nodes:1915
                                                                                                            Total number of Limit Nodes:34
                                                                                                            execution_graph 15241 f94eb0 15242 f9527c 15241->15242 15245 f94eee std::ios_base::_Ios_base_dtor __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 15241->15245 15243 f94f37 setsockopt recv WSAGetLastError 15243->15242 15243->15245 15245->15243 15246 f95267 Sleep 15245->15246 15248 f951c5 recv 15245->15248 15249 f9525f Sleep 15245->15249 15254 f95291 15245->15254 15256 f95086 setsockopt recv 15245->15256 15257 ee8dc0 43 API calls 15245->15257 15261 f95940 WSAStartup 15245->15261 15274 ee8dc0 15245->15274 15283 ee63b0 15245->15283 15288 f952a0 15245->15288 15347 f03059 15245->15347 15350 ed9280 15245->15350 15246->15242 15246->15245 15248->15249 15249->15246 15251 f94fdd recv 15251->15245 15252 f94ffe recv 15251->15252 15252->15245 15360 f08c60 15254->15360 15256->15245 15257->15256 15262 f95a46 15261->15262 15263 f95978 15261->15263 15262->15245 15263->15262 15264 f959ae getaddrinfo 15263->15264 15265 f95a40 WSACleanup 15264->15265 15266 f959f6 15264->15266 15265->15262 15267 f95a54 FreeAddrInfoW 15266->15267 15268 f95a04 socket 15266->15268 15267->15265 15269 f95a60 15267->15269 15268->15265 15270 f95a1a connect 15268->15270 15269->15245 15271 f95a2c closesocket 15270->15271 15272 f95a50 15270->15272 15271->15268 15273 f95a36 FreeAddrInfoW 15271->15273 15272->15267 15273->15265 15276 ee8de2 std::locale::_Setgloballocale 15274->15276 15277 ee8e11 15274->15277 15275 ee8ef8 15276->15251 15277->15275 15365 ed32d0 15277->15365 15279 ee8e66 std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 15280 ee8ecb std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 15279->15280 15379 ed2fe0 15279->15379 15280->15251 15282 ee8eb8 15282->15251 15285 ee63d8 15283->15285 15284 ee63e7 15284->15245 15285->15284 15286 ed32d0 std::_Throw_Cpp_error 43 API calls 15285->15286 15287 ee642a std::locale::_Locimp::_Locimp 15286->15287 15287->15245 15289 f9531c 15288->15289 15290 f952ee 15288->15290 15292 f9533e 15289->15292 15293 f95324 15289->15293 15291 ed2cf0 std::_Throw_Cpp_error 43 API calls 15290->15291 15294 f95300 15291->15294 15296 f95360 15292->15296 15297 f95346 15292->15297 15693 ee6290 15293->15693 15300 ed9280 46 API calls 15294->15300 15298 f95368 15296->15298 15299 f95385 15296->15299 15301 ee6290 43 API calls 15297->15301 15304 ee6290 43 API calls 15298->15304 15327 f95314 15298->15327 15302 f953ab 15299->15302 15303 f9538d 15299->15303 15300->15327 15301->15327 15306 f953cb 15302->15306 15307 f95670 15302->15307 15302->15327 15697 f112a7 15303->15697 15304->15327 15656 ed5400 15306->15656 15308 f95678 15307->15308 15309 f956cb 15307->15309 15734 eeb430 15308->15734 15312 f956d3 15309->15312 15313 f95726 15309->15313 15314 eeb430 56 API calls 15312->15314 15315 f9572e 15313->15315 15316 f95781 15313->15316 15314->15327 15317 eeb430 56 API calls 15315->15317 15318 f95789 15316->15318 15319 f957dc 15316->15319 15317->15327 15321 eeb430 56 API calls 15318->15321 15322 f95834 15319->15322 15323 f957e4 15319->15323 15321->15327 15322->15327 15741 f28af0 15322->15741 15325 eeb430 56 API calls 15323->15325 15325->15327 15327->15245 15329 f953f0 15330 f954bb 15329->15330 15343 f95629 15329->15343 15666 ed2cf0 15329->15666 15670 eeace0 15329->15670 15673 ed2d30 15330->15673 15334 f954f0 15335 f95562 GetCurrentProcess 15334->15335 15338 f95595 15334->15338 15336 ee63b0 std::_Throw_Cpp_error 43 API calls 15335->15336 15337 f9557e 15336->15337 15703 f9c630 VirtualAllocEx WriteProcessMemory 15337->15703 15690 f09810 15338->15690 15341 f9558d 15341->15343 15731 f02b9a 15343->15731 17742 f0360d 15347->17742 15351 ee63b0 std::_Throw_Cpp_error 43 API calls 15350->15351 15352 ed92d4 15351->15352 15353 ee8dc0 43 API calls 15352->15353 15354 ed9523 std::locale::_Locimp::_Locimp 15352->15354 15353->15354 15355 ed95f0 GetModuleHandleA GetProcAddress WSASend 15354->15355 15356 ed96e2 std::ios_base::_Ios_base_dtor 15354->15356 15355->15354 15355->15356 15357 ed975d std::ios_base::_Ios_base_dtor 15356->15357 15358 f08c60 std::_Throw_Cpp_error 41 API calls 15356->15358 15357->15245 15359 ed979c 15358->15359 15359->15245 15361 f08b9c ___std_exception_copy 41 API calls 15360->15361 15362 f08c6f 15361->15362 15363 f08c7d __Getctype 11 API calls 15362->15363 15364 f08c7c 15363->15364 15366 ed3306 15365->15366 15367 ed32e2 15365->15367 15370 ed3318 15366->15370 15373 f03662 std::_Facet_Register 43 API calls 15366->15373 15368 ed331f 15367->15368 15369 ed32e9 15367->15369 15395 ed2b50 15368->15395 15384 f03662 15369->15384 15370->15279 15374 ed3310 15373->15374 15374->15279 15375 ed32ef 15376 f08c60 std::_Throw_Cpp_error 41 API calls 15375->15376 15377 ed32f8 15375->15377 15378 ed3329 15376->15378 15377->15279 15380 ed3007 15379->15380 15381 ed3017 std::ios_base::_Ios_base_dtor 15379->15381 15380->15381 15382 f08c60 std::_Throw_Cpp_error 41 API calls 15380->15382 15381->15282 15383 ed3036 15382->15383 15387 f03667 15384->15387 15386 f03681 15386->15375 15387->15386 15389 ed2b50 Concurrency::cancel_current_task 15387->15389 15401 f123dc 15387->15401 15419 f15a79 15387->15419 15390 f0368d 15389->15390 15408 f051eb 15389->15408 15390->15390 15392 ed2b6c 15411 f04b05 15392->15411 15396 ed2b5e Concurrency::cancel_current_task 15395->15396 15397 f051eb Concurrency::cancel_current_task RaiseException 15396->15397 15398 ed2b6c 15397->15398 15399 f04b05 ___std_exception_copy 42 API calls 15398->15399 15400 ed2bac 15399->15400 15400->15375 15406 f1b086 __Getctype 15401->15406 15402 f1b0c4 15422 f116ef 15402->15422 15404 f1b0af RtlAllocateHeap 15405 f1b0c2 15404->15405 15404->15406 15405->15387 15406->15402 15406->15404 15407 f15a79 std::_Facet_Register 2 API calls 15406->15407 15407->15406 15409 f05232 RaiseException 15408->15409 15410 f05205 15408->15410 15409->15392 15410->15409 15412 f04b12 15411->15412 15418 ed2bac 15411->15418 15413 f123dc ___std_exception_copy 15 API calls 15412->15413 15412->15418 15414 f04b2f 15413->15414 15415 f04b3f 15414->15415 15546 f19995 15414->15546 15555 f11c86 15415->15555 15418->15375 15645 f15aa5 15419->15645 15425 f19f85 GetLastError 15422->15425 15424 f116f4 15424->15405 15426 f19f9b 15425->15426 15429 f19fa1 15425->15429 15448 f1b64e 15426->15448 15445 f19fa5 SetLastError 15429->15445 15453 f1b68d 15429->15453 15434 f19feb 15437 f1b68d __Getctype 6 API calls 15434->15437 15435 f19fda 15436 f1b68d __Getctype 6 API calls 15435->15436 15438 f19fe8 15436->15438 15439 f19ff7 15437->15439 15465 f1b00c 15438->15465 15440 f1a012 15439->15440 15441 f19ffb 15439->15441 15471 f19c60 15440->15471 15442 f1b68d __Getctype 6 API calls 15441->15442 15442->15438 15445->15424 15447 f1b00c ___std_exception_destroy 12 API calls 15447->15445 15476 f1b43b 15448->15476 15450 f1b66a 15451 f1b673 15450->15451 15452 f1b685 TlsGetValue 15450->15452 15451->15429 15454 f1b43b std::locale::_Setgloballocale 5 API calls 15453->15454 15455 f1b6a9 15454->15455 15456 f19fbd 15455->15456 15457 f1b6c7 TlsSetValue 15455->15457 15456->15445 15458 f1a64c 15456->15458 15463 f1a659 __Getctype 15458->15463 15459 f1a699 15461 f116ef ___std_exception_copy 13 API calls 15459->15461 15460 f1a684 RtlAllocateHeap 15462 f19fd2 15460->15462 15460->15463 15461->15462 15462->15434 15462->15435 15463->15459 15463->15460 15464 f15a79 std::_Facet_Register 2 API calls 15463->15464 15464->15463 15466 f1b041 15465->15466 15467 f1b017 HeapFree 15465->15467 15466->15445 15467->15466 15468 f1b02c GetLastError 15467->15468 15469 f1b039 ___std_exception_destroy 15468->15469 15470 f116ef ___std_exception_copy 12 API calls 15469->15470 15470->15466 15490 f19af4 15471->15490 15477 f1b46b 15476->15477 15481 f1b467 std::locale::_Setgloballocale 15476->15481 15477->15481 15482 f1b370 15477->15482 15480 f1b485 GetProcAddress 15480->15481 15481->15450 15488 f1b381 std::locale::_Setgloballocale 15482->15488 15483 f1b417 15483->15480 15483->15481 15484 f1b39f LoadLibraryExW 15485 f1b3ba GetLastError 15484->15485 15486 f1b41e 15484->15486 15485->15488 15486->15483 15487 f1b430 FreeLibrary 15486->15487 15487->15483 15488->15483 15488->15484 15489 f1b3ed LoadLibraryExW 15488->15489 15489->15486 15489->15488 15491 f19b00 std::_Locinfo::_Locinfo_ctor 15490->15491 15504 f1423b RtlEnterCriticalSection 15491->15504 15493 f19b0a 15505 f19b3a 15493->15505 15496 f19c06 15497 f19c12 std::_Locinfo::_Locinfo_ctor 15496->15497 15509 f1423b RtlEnterCriticalSection 15497->15509 15499 f19c1c 15510 f19de7 15499->15510 15501 f19c34 15514 f19c54 15501->15514 15504->15493 15508 f14283 RtlLeaveCriticalSection 15505->15508 15507 f19b28 15507->15496 15508->15507 15509->15499 15511 f19df6 __Getctype 15510->15511 15513 f19e1d __Getctype 15510->15513 15511->15513 15517 f22134 15511->15517 15513->15501 15545 f14283 RtlLeaveCriticalSection 15514->15545 15516 f19c42 15516->15447 15518 f221b4 15517->15518 15520 f2214a 15517->15520 15521 f1b00c ___std_exception_destroy 14 API calls 15518->15521 15544 f22202 15518->15544 15519 f222a5 __Getctype 14 API calls 15530 f22210 15519->15530 15520->15518 15522 f2217d 15520->15522 15526 f1b00c ___std_exception_destroy 14 API calls 15520->15526 15523 f221d6 15521->15523 15532 f1b00c ___std_exception_destroy 14 API calls 15522->15532 15543 f2219f 15522->15543 15524 f1b00c ___std_exception_destroy 14 API calls 15523->15524 15527 f221e9 15524->15527 15525 f1b00c ___std_exception_destroy 14 API calls 15528 f221a9 15525->15528 15531 f22172 15526->15531 15533 f1b00c ___std_exception_destroy 14 API calls 15527->15533 15534 f1b00c ___std_exception_destroy 14 API calls 15528->15534 15529 f22270 15535 f1b00c ___std_exception_destroy 14 API calls 15529->15535 15530->15529 15542 f1b00c 14 API calls ___std_exception_destroy 15530->15542 15536 f21438 __Getctype 14 API calls 15531->15536 15537 f22194 15532->15537 15538 f221f7 15533->15538 15534->15518 15539 f22276 15535->15539 15536->15522 15540 f21897 __Getctype 14 API calls 15537->15540 15541 f1b00c ___std_exception_destroy 14 API calls 15538->15541 15539->15513 15540->15543 15541->15544 15542->15530 15543->15525 15544->15519 15545->15516 15547 f199a3 15546->15547 15549 f199b1 15546->15549 15547->15549 15553 f199c9 15547->15553 15548 f116ef ___std_exception_copy 14 API calls 15550 f199b9 15548->15550 15549->15548 15558 f08c50 15550->15558 15552 f199c3 15552->15415 15553->15552 15554 f116ef ___std_exception_copy 14 API calls 15553->15554 15554->15550 15556 f1b00c ___std_exception_destroy 14 API calls 15555->15556 15557 f11c9e 15556->15557 15557->15418 15561 f08b9c 15558->15561 15562 f08bae ___std_exception_copy 15561->15562 15567 f08bd3 15562->15567 15564 f08bc6 15578 f0898c 15564->15578 15568 f08be3 15567->15568 15569 f08bea 15567->15569 15584 f089f1 GetLastError 15568->15584 15575 f08bf8 15569->15575 15588 f089c8 15569->15588 15572 f08c1f 15572->15575 15591 f08c7d IsProcessorFeaturePresent 15572->15591 15574 f08c4f 15576 f08b9c ___std_exception_copy 41 API calls 15574->15576 15575->15564 15577 f08c5c 15576->15577 15577->15564 15579 f08998 15578->15579 15580 f089af 15579->15580 15623 f08a37 15579->15623 15582 f08a37 ___std_exception_copy 41 API calls 15580->15582 15583 f089c2 15580->15583 15582->15583 15583->15552 15585 f08a0a 15584->15585 15595 f1a036 15585->15595 15589 f089d3 GetLastError SetLastError 15588->15589 15590 f089ec 15588->15590 15589->15572 15590->15572 15592 f08c89 15591->15592 15617 f08a54 15592->15617 15596 f1a04f 15595->15596 15597 f1a049 15595->15597 15598 f1b68d __Getctype 6 API calls 15596->15598 15615 f08a22 SetLastError 15596->15615 15599 f1b64e __Getctype 6 API calls 15597->15599 15600 f1a069 15598->15600 15599->15596 15601 f1a64c __Getctype 14 API calls 15600->15601 15600->15615 15602 f1a079 15601->15602 15603 f1a081 15602->15603 15604 f1a096 15602->15604 15605 f1b68d __Getctype 6 API calls 15603->15605 15606 f1b68d __Getctype 6 API calls 15604->15606 15607 f1a08d 15605->15607 15608 f1a0a2 15606->15608 15613 f1b00c ___std_exception_destroy 14 API calls 15607->15613 15609 f1a0b5 15608->15609 15610 f1a0a6 15608->15610 15612 f19c60 __Getctype 14 API calls 15609->15612 15611 f1b68d __Getctype 6 API calls 15610->15611 15611->15607 15614 f1a0c0 15612->15614 15613->15615 15616 f1b00c ___std_exception_destroy 14 API calls 15614->15616 15615->15569 15616->15615 15618 f08a70 std::locale::_Setgloballocale 15617->15618 15619 f08a9c IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15618->15619 15620 f08b6d std::locale::_Setgloballocale 15619->15620 15621 f03d67 _ValidateLocalCookies 5 API calls 15620->15621 15622 f08b8b GetCurrentProcess TerminateProcess 15621->15622 15622->15574 15624 f08a41 15623->15624 15625 f08a4a 15623->15625 15626 f089f1 ___std_exception_copy 16 API calls 15624->15626 15625->15580 15627 f08a46 15626->15627 15627->15625 15630 f141b6 15627->15630 15631 f1f60e std::locale::_Setgloballocale RtlEnterCriticalSection RtlLeaveCriticalSection 15630->15631 15632 f141bb 15631->15632 15633 f141c6 15632->15633 15634 f1f653 std::locale::_Setgloballocale 40 API calls 15632->15634 15635 f141d0 IsProcessorFeaturePresent 15633->15635 15636 f141ef 15633->15636 15634->15633 15638 f141dc 15635->15638 15637 f136d2 std::locale::_Setgloballocale 21 API calls 15636->15637 15641 f141f9 15637->15641 15639 f08a54 std::locale::_Setgloballocale 8 API calls 15638->15639 15639->15636 15640 f1b7e6 std::locale::_Setgloballocale 6 API calls 15640->15641 15641->15640 15642 f1422e 15641->15642 15643 f08a53 15641->15643 15644 f14252 __Getctype RtlDeleteCriticalSection 15642->15644 15644->15643 15646 f15ab1 std::_Locinfo::_Locinfo_ctor 15645->15646 15651 f1423b RtlEnterCriticalSection 15646->15651 15648 f15abc std::locale::_Setgloballocale 15652 f15af3 15648->15652 15651->15648 15655 f14283 RtlLeaveCriticalSection 15652->15655 15654 f15a84 15654->15387 15655->15654 15746 f02b89 15656->15746 15659 ed5410 15660 ed5419 15659->15660 15662 f02524 std::_Throw_Cpp_error 79 API calls 15659->15662 15660->15329 15663 ed5430 15662->15663 15757 f0952c 15663->15757 15667 ed2d13 15666->15667 15667->15667 15668 ed3040 std::_Throw_Cpp_error 43 API calls 15667->15668 15669 ed2d25 15668->15669 15669->15329 15671 eead10 15670->15671 15671->15671 16319 eefbf0 15671->16319 15674 ed3040 std::_Throw_Cpp_error 43 API calls 15673->15674 15675 ed2d55 15674->15675 15676 fa3670 15675->15676 15677 fa3708 15676->15677 15680 fa3711 std::locale::_Setgloballocale 15676->15680 16328 eee4b0 15677->16328 15681 fa3903 15680->15681 15688 fa38ff 15680->15688 16351 fc1ae0 15680->16351 16362 ef4160 15680->16362 15684 f08c60 std::_Throw_Cpp_error 41 API calls 15681->15684 15685 fa3930 std::ios_base::_Ios_base_dtor 15681->15685 15686 fa397e 15684->15686 15685->15334 15687 f03059 __Xtime_get_ticks 2 API calls 15686->15687 15689 fa3986 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 15687->15689 15688->15681 16432 ee6130 15688->16432 15689->15334 16528 f0974e 15690->16528 15694 ee629d 15693->15694 15695 ee62b1 15693->15695 15696 ee6130 43 API calls 15694->15696 15695->15327 15696->15695 15698 f112ba ___std_exception_copy 15697->15698 16579 f0d695 15698->16579 15700 f112d4 15701 f0898c ___std_exception_copy 41 API calls 15700->15701 15702 f112e1 15701->15702 15702->15327 15704 f9c70a VirtualAllocEx 15703->15704 15705 f9c6cd 15703->15705 15707 f9c77f std::locale::_Setgloballocale 15704->15707 15706 f9c6d3 WriteProcessMemory 15705->15706 15706->15706 15708 f9c707 15706->15708 16795 eeab20 15707->16795 15708->15704 15711 ee8f00 std::_Throw_Cpp_error 43 API calls 15712 f9c82f 15711->15712 16800 ed3440 15712->16800 15715 f9c91d 15716 f9c93b std::ios_base::_Ios_base_dtor 15715->15716 15717 f08c60 std::_Throw_Cpp_error 41 API calls 15715->15717 15716->15341 15718 f9c97e 15717->15718 15718->15341 15719 f11618 15720 f1162b ___std_exception_copy 15719->15720 17057 f113fa 15720->17057 15722 f11640 15723 f0898c ___std_exception_copy 41 API calls 15722->15723 15724 f1164d 15723->15724 15725 f0d098 15724->15725 15726 f0d0ab ___std_exception_copy 15725->15726 17227 f0cf73 15726->17227 15728 f0d0b7 15729 f0898c ___std_exception_copy 41 API calls 15728->15729 15730 f0d0c3 15729->15730 15730->15343 15732 f02bb4 15731->15732 15733 f02ba6 RtlReleaseSRWLockExclusive 15731->15733 15732->15327 15733->15732 17319 ee7ef0 15734->17319 15737 eeb48d 17338 ef2100 15737->17338 15740 eeb503 15740->15327 17711 f28ba0 15741->17711 15743 f28b21 std::locale::_Locimp::_Locimp 15744 ed3040 std::_Throw_Cpp_error 43 API calls 15743->15744 15745 f28b6c 15744->15745 15745->15327 15763 f02bb8 GetCurrentThreadId 15746->15763 15749 f02524 15750 f0253a std::_Throw_Cpp_error 15749->15750 15789 f024d7 15750->15789 15758 f0953f ___std_exception_copy 15757->15758 16293 f093cb 15758->16293 15760 f0954e 15761 f0898c ___std_exception_copy 41 API calls 15760->15761 15762 ed5450 15761->15762 15762->15329 15764 f02c01 15763->15764 15765 f02be2 15763->15765 15767 f02c21 15764->15767 15768 f02c0a 15764->15768 15766 f02be7 RtlAcquireSRWLockExclusive 15765->15766 15774 f02bf7 15765->15774 15766->15774 15770 f02c80 15767->15770 15777 f02c39 15767->15777 15769 f02c15 RtlAcquireSRWLockExclusive 15768->15769 15768->15774 15769->15774 15772 f02c87 RtlTryAcquireSRWLockExclusive 15770->15772 15770->15774 15772->15774 15773 ed5409 15773->15659 15773->15749 15781 f03d67 15774->15781 15776 f02c70 RtlTryAcquireSRWLockExclusive 15776->15774 15776->15777 15777->15774 15777->15776 15778 f0301b 15777->15778 15779 f03059 __Xtime_get_ticks 2 API calls 15778->15779 15780 f03026 __aulldiv __aullrem 15779->15780 15780->15777 15782 f03d70 IsProcessorFeaturePresent 15781->15782 15783 f03d6f 15781->15783 15785 f0454a 15782->15785 15783->15773 15788 f0450d SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 15785->15788 15787 f0462d 15787->15773 15788->15787 15790 f024e3 __EH_prolog3_GS 15789->15790 15791 ed2cf0 std::_Throw_Cpp_error 43 API calls 15790->15791 15792 f024f7 15791->15792 15810 ed36e0 15792->15810 15794 f0250c 15824 f03f5d 15794->15824 15811 ee63b0 std::_Throw_Cpp_error 43 API calls 15810->15811 15812 ed3731 15811->15812 15813 ed375a 15812->15813 15827 ee8f00 15812->15827 15815 ee8f00 std::_Throw_Cpp_error 43 API calls 15813->15815 15816 ed378a 15815->15816 15817 f04b05 ___std_exception_copy 42 API calls 15816->15817 15818 ed381e 15817->15818 15819 ed385f std::ios_base::_Ios_base_dtor 15818->15819 15820 f08c60 std::_Throw_Cpp_error 41 API calls 15818->15820 15819->15794 15821 ed38b0 15820->15821 15836 f04b68 15821->15836 15823 ed38f5 std::ios_base::_Ios_base_dtor 15823->15794 15825 f03d67 _ValidateLocalCookies 5 API calls 15824->15825 15826 f03f67 15825->15826 15826->15826 15828 ee8f22 std::locale::_Locimp::_Locimp 15827->15828 15829 ee8f4f 15827->15829 15828->15813 15830 ed32d0 std::_Throw_Cpp_error 43 API calls 15829->15830 15831 ee902f std::ios_base::_Ios_base_dtor 15829->15831 15832 ee8fa4 std::locale::_Locimp::_Locimp 15830->15832 15831->15813 15833 ee9002 std::locale::_Locimp::_Locimp 15832->15833 15834 ed2fe0 std::_Throw_Cpp_error 41 API calls 15832->15834 15833->15813 15835 ee8fef 15834->15835 15835->15813 15837 f04b75 15836->15837 15838 f04b7c 15836->15838 15839 f11c86 ___std_exception_destroy 14 API calls 15837->15839 15838->15823 15839->15838 16294 f093d7 std::_Locinfo::_Locinfo_ctor 16293->16294 16295 f093e0 16294->16295 16296 f09404 16294->16296 16297 f08bd3 ___std_exception_copy 41 API calls 16295->16297 16307 f11240 RtlEnterCriticalSection 16296->16307 16306 f093f9 16297->16306 16299 f0940d 16300 f09422 16299->16300 16308 f1a1db 16299->16308 16302 f0948e 16300->16302 16303 f094bf 16300->16303 16304 f08bd3 ___std_exception_copy 41 API calls 16302->16304 16315 f094f7 16303->16315 16304->16306 16306->15760 16307->16299 16309 f1a1e7 16308->16309 16310 f1a1fc 16308->16310 16311 f116ef ___std_exception_copy 14 API calls 16309->16311 16310->16300 16312 f1a1ec 16311->16312 16313 f08c50 ___std_exception_copy 41 API calls 16312->16313 16314 f1a1f7 16313->16314 16314->16300 16318 f11254 RtlLeaveCriticalSection 16315->16318 16317 f094fd 16317->16306 16318->16317 16321 eefc8d 16319->16321 16323 eefc12 std::locale::_Locimp::_Locimp 16319->16323 16320 eefd5e 16321->16320 16322 ed32d0 std::_Throw_Cpp_error 43 API calls 16321->16322 16324 eefce1 std::locale::_Locimp::_Locimp 16322->16324 16325 eefd3a std::locale::_Locimp::_Locimp 16324->16325 16326 ed2fe0 std::_Throw_Cpp_error 41 API calls 16324->16326 16327 eefd27 16326->16327 16329 eee528 16328->16329 16330 eee4c2 16328->16330 16443 ed3330 16329->16443 16331 eee4ca 16330->16331 16332 eee4f9 16330->16332 16334 eee52d 16331->16334 16335 eee4d1 16331->16335 16336 eee516 16332->16336 16339 f03662 std::_Facet_Register 43 API calls 16332->16339 16337 ed2b50 Concurrency::cancel_current_task 43 API calls 16334->16337 16338 f03662 std::_Facet_Register 43 API calls 16335->16338 16336->15680 16340 eee4d7 16337->16340 16338->16340 16341 eee503 16339->16341 16342 f08c60 std::_Throw_Cpp_error 41 API calls 16340->16342 16343 eee4e0 16340->16343 16341->15680 16344 eee537 16342->16344 16343->15680 16446 ee6ad0 16344->16446 16346 eee574 16347 ed4900 std::_Throw_Cpp_error 43 API calls 16346->16347 16348 eee5fb 16347->16348 16349 eee613 16348->16349 16450 ee9b60 16348->16450 16349->15680 16352 fc1ae7 16351->16352 16353 fc1aec 16351->16353 16352->15680 16354 f123dc ___std_exception_copy 15 API calls 16353->16354 16360 fc1b2f 16353->16360 16354->16360 16355 fc1b42 16355->15680 16356 fc1bf7 16356->15680 16357 f11c86 ___std_exception_destroy 14 API calls 16358 fc1be7 16357->16358 16358->15680 16359 fc1ba1 16359->16356 16359->16357 16360->16355 16360->16359 16361 f11c86 ___std_exception_destroy 14 API calls 16360->16361 16361->16359 16363 ef4288 16362->16363 16364 ef4195 16362->16364 16366 ed3330 43 API calls 16363->16366 16365 ef41b1 16364->16365 16367 ef4202 16364->16367 16368 ef41f2 16364->16368 16370 f03662 std::_Facet_Register 43 API calls 16365->16370 16369 ef428d 16366->16369 16374 f03662 std::_Facet_Register 43 API calls 16367->16374 16379 ef41cf std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 16367->16379 16368->16365 16368->16369 16371 ed2b50 Concurrency::cancel_current_task 43 API calls 16369->16371 16372 ef41c4 16370->16372 16373 ef4292 16371->16373 16372->16373 16372->16379 16375 f08c60 std::_Throw_Cpp_error 41 API calls 16373->16375 16374->16379 16376 ef4297 16375->16376 16377 ef42fa 16376->16377 16378 ef43e9 16376->16378 16496 ef6ff0 16377->16496 16380 ed3330 43 API calls 16378->16380 16491 ef77d0 16379->16491 16381 ef43ee 16380->16381 16383 ef445a 16381->16383 16384 ef4549 16381->16384 16389 ef6ff0 43 API calls 16383->16389 16387 ed3330 43 API calls 16384->16387 16386 ef4336 16504 ef7830 16386->16504 16395 ef454e 16387->16395 16388 ef425e 16388->15680 16391 ef4496 16389->16391 16390 ef470b 16393 ed3330 43 API calls 16390->16393 16394 ee63b0 std::_Throw_Cpp_error 43 API calls 16391->16394 16392 ef4706 16396 ed2b50 Concurrency::cancel_current_task 43 API calls 16392->16396 16417 ef46af 16393->16417 16408 ef44c4 16394->16408 16395->16390 16395->16392 16398 ef45ee 16395->16398 16399 ef4615 16395->16399 16396->16390 16397 f08c60 std::_Throw_Cpp_error 41 API calls 16400 ef4715 16397->16400 16398->16392 16401 ef45f9 16398->16401 16404 f03662 std::_Facet_Register 43 API calls 16399->16404 16416 ef45ff 16399->16416 16519 eed010 16400->16519 16405 f03662 std::_Facet_Register 43 API calls 16401->16405 16404->16416 16405->16416 16406 ef43b0 16406->15680 16410 ef7830 41 API calls 16408->16410 16412 ef4510 16410->16412 16411 ef472f 16413 f051eb Concurrency::cancel_current_task RaiseException 16411->16413 16412->15680 16414 ef4738 16413->16414 16415 ef4798 16414->16415 16419 ef477f 16414->16419 16420 ef475b 16414->16420 16418 ed2b50 Concurrency::cancel_current_task 43 API calls 16415->16418 16416->16417 16421 ef46d1 std::ios_base::_Ios_base_dtor 16416->16421 16509 f01f8c 16416->16509 16417->16397 16417->16421 16422 ef4768 16418->16422 16424 ef4791 16419->16424 16425 f03662 std::_Facet_Register 43 API calls 16419->16425 16420->16415 16423 ef4762 16420->16423 16421->15680 16427 f08c60 std::_Throw_Cpp_error 41 API calls 16422->16427 16431 ef4771 16422->16431 16428 f03662 std::_Facet_Register 43 API calls 16423->16428 16424->15680 16429 ef4789 16425->16429 16430 ef47a2 16427->16430 16428->16422 16429->15680 16431->15680 16433 ee6174 16432->16433 16435 ee6143 std::locale::_Locimp::_Locimp 16432->16435 16434 ee6180 16433->16434 16437 ee6200 16433->16437 16436 ed32d0 std::_Throw_Cpp_error 43 API calls 16434->16436 16435->15681 16440 ee61bf std::locale::_Locimp::_Locimp 16436->16440 16437->16437 16438 ee8f00 std::_Throw_Cpp_error 43 API calls 16437->16438 16439 ee6232 16438->16439 16439->15681 16441 ee61ed 16440->16441 16442 ed2fe0 std::_Throw_Cpp_error 41 API calls 16440->16442 16441->15681 16442->16441 16454 f01cda 16443->16454 16447 ee6b02 16446->16447 16449 ee6b1d 16447->16449 16480 ee50e0 16447->16480 16449->16346 16451 ee9bbb 16450->16451 16452 ee9b96 16450->16452 16451->16349 16452->16451 16488 ee88a0 16452->16488 16467 f01a8f 16454->16467 16457 f051eb Concurrency::cancel_current_task RaiseException 16458 f01cf9 16457->16458 16470 f01ae4 16458->16470 16461 f051eb Concurrency::cancel_current_task RaiseException 16462 f01d19 16461->16462 16473 f01b27 16462->16473 16465 f051eb Concurrency::cancel_current_task RaiseException 16466 f01d39 16465->16466 16477 ed34e0 16467->16477 16471 ed34e0 std::invalid_argument::invalid_argument 42 API calls 16470->16471 16472 f01af6 16471->16472 16472->16461 16474 f01b3b std::regex_error::regex_error 16473->16474 16475 ed34e0 std::invalid_argument::invalid_argument 42 API calls 16474->16475 16476 f01b44 16475->16476 16476->16465 16478 f04b05 ___std_exception_copy 42 API calls 16477->16478 16479 ed3522 16478->16479 16479->16457 16481 ee5117 16480->16481 16486 ee51b5 16480->16486 16482 ee6ad0 43 API calls 16481->16482 16483 ee5120 16482->16483 16484 ee519d 16483->16484 16487 ed4900 std::_Throw_Cpp_error 43 API calls 16483->16487 16485 ee9b60 43 API calls 16484->16485 16484->16486 16485->16486 16486->16449 16487->16484 16489 ed4900 std::_Throw_Cpp_error 43 API calls 16488->16489 16490 ee88bf 16489->16490 16490->16451 16492 ef77dc 16491->16492 16493 ef77f9 std::ios_base::_Ios_base_dtor 16491->16493 16492->16493 16494 f08c60 std::_Throw_Cpp_error 41 API calls 16492->16494 16493->16388 16495 ef7824 16494->16495 16497 ef703c 16496->16497 16498 ef6ff9 16496->16498 16497->16497 16498->16497 16499 f03662 std::_Facet_Register 43 API calls 16498->16499 16501 ef7013 16498->16501 16499->16501 16500 f03662 std::_Facet_Register 43 API calls 16502 ef7035 16500->16502 16501->16500 16503 ef701c 16501->16503 16502->16386 16503->16386 16505 ef7882 std::ios_base::_Ios_base_dtor 16504->16505 16506 ef783d 16504->16506 16505->16406 16506->16505 16507 f08c60 std::_Throw_Cpp_error 41 API calls 16506->16507 16508 ef78b6 16507->16508 16510 f01fa2 16509->16510 16511 f01f95 FindClose 16509->16511 16510->16416 16511->16510 16512 f01fa6 16511->16512 16513 f141b6 __Getctype 41 API calls 16512->16513 16514 f01fab 16513->16514 16515 f01f8c 41 API calls 16514->16515 16516 f01fba FindFirstFileExW 16515->16516 16517 f01fd5 16516->16517 16518 f01fd9 GetLastError 16516->16518 16517->16416 16518->16517 16520 eed02e 16519->16520 16521 eed01a 16519->16521 16523 ee9910 16520->16523 16521->16520 16522 f01f8c 44 API calls 16521->16522 16522->16521 16524 ee9938 std::ios_base::_Ios_base_dtor 16523->16524 16525 ee9928 16523->16525 16524->16411 16525->16524 16526 f08c60 std::_Throw_Cpp_error 41 API calls 16525->16526 16527 ee994d 16526->16527 16531 f0975a std::_Locinfo::_Locinfo_ctor 16528->16531 16529 f09761 16530 f116ef ___std_exception_copy 14 API calls 16529->16530 16532 f09766 16530->16532 16531->16529 16533 f09781 16531->16533 16534 f08c50 ___std_exception_copy 41 API calls 16532->16534 16535 f09793 16533->16535 16536 f09786 16533->16536 16539 f09771 16534->16539 16545 f1a8e1 16535->16545 16537 f116ef ___std_exception_copy 14 API calls 16536->16537 16537->16539 16539->15343 16539->15719 16541 f097b0 16553 f097ee 16541->16553 16542 f097a3 16543 f116ef ___std_exception_copy 14 API calls 16542->16543 16543->16539 16546 f1a8ed std::_Locinfo::_Locinfo_ctor 16545->16546 16557 f1423b RtlEnterCriticalSection 16546->16557 16548 f1a8fb 16558 f1a985 16548->16558 16555 f097f2 16553->16555 16578 f11254 RtlLeaveCriticalSection 16555->16578 16556 f09803 16556->16539 16557->16548 16565 f1a9a8 16558->16565 16559 f1aa00 16560 f1a64c __Getctype 14 API calls 16559->16560 16562 f1aa09 16560->16562 16563 f1b00c ___std_exception_destroy 14 API calls 16562->16563 16564 f1aa12 16563->16564 16566 f1b7e6 std::locale::_Setgloballocale 6 API calls 16564->16566 16570 f1a908 16564->16570 16565->16559 16565->16565 16565->16570 16574 f11240 RtlEnterCriticalSection 16565->16574 16575 f11254 RtlLeaveCriticalSection 16565->16575 16567 f1aa31 16566->16567 16576 f11240 RtlEnterCriticalSection 16567->16576 16571 f1a941 16570->16571 16577 f14283 RtlLeaveCriticalSection 16571->16577 16573 f0979c 16573->16541 16573->16542 16574->16565 16575->16565 16576->16570 16577->16573 16578->16556 16593 f0ce69 16579->16593 16581 f0d6d7 std::_Locinfo::_Locinfo_ctor 16581->15700 16582 f0d6ef 16588 f0d713 16582->16588 16600 f0e1c0 16582->16600 16583 f0d6a7 16583->16581 16583->16582 16584 f0d6bc 16583->16584 16585 f08bd3 ___std_exception_copy 41 API calls 16584->16585 16585->16581 16590 f0d737 16588->16590 16607 f0ce84 16588->16607 16589 f0d7bf 16591 f0ce12 41 API calls 16589->16591 16590->16589 16614 f0ce12 16590->16614 16591->16581 16594 f0ce81 16593->16594 16595 f0ce6e 16593->16595 16594->16583 16596 f116ef ___std_exception_copy 14 API calls 16595->16596 16597 f0ce73 16596->16597 16598 f08c50 ___std_exception_copy 41 API calls 16597->16598 16599 f0ce7e 16598->16599 16599->16583 16601 f08a37 ___std_exception_copy 41 API calls 16600->16601 16602 f0e1d0 16601->16602 16620 f1a14c 16602->16620 16608 f0ce90 16607->16608 16610 f0cea6 16607->16610 16609 f1453e __Getctype 41 API calls 16608->16609 16611 f0ce9b std::_Locinfo::_Locinfo_ctor 16609->16611 16613 f0ceb6 16610->16613 16764 f19a29 16610->16764 16611->16588 16613->16588 16615 f0ce23 16614->16615 16616 f0ce37 16614->16616 16615->16616 16617 f116ef ___std_exception_copy 14 API calls 16615->16617 16616->16589 16618 f0ce2c 16617->16618 16619 f08c50 ___std_exception_copy 41 API calls 16618->16619 16619->16616 16621 f1a163 16620->16621 16622 f0e1ed 16620->16622 16621->16622 16623 f22380 __Getctype 41 API calls 16621->16623 16624 f1a1aa 16622->16624 16623->16622 16625 f1a1c1 16624->16625 16627 f0e1fa 16624->16627 16625->16627 16628 f206ab 16625->16628 16627->16588 16629 f19e32 __Getctype 41 API calls 16628->16629 16630 f206b0 16629->16630 16633 f205c3 16630->16633 16632 f206bb 16632->16627 16634 f205cf std::_Locinfo::_Locinfo_ctor 16633->16634 16636 f205e9 16634->16636 16648 f1423b RtlEnterCriticalSection 16634->16648 16639 f141b6 __Getctype 41 API calls 16636->16639 16640 f205f0 16636->16640 16637 f20625 16649 f20642 16637->16649 16641 f20662 16639->16641 16640->16632 16643 f2069e 16641->16643 16652 f19eed 16641->16652 16642 f205f9 16642->16637 16644 f1b00c ___std_exception_destroy 14 API calls 16642->16644 16643->16632 16644->16637 16648->16642 16700 f14283 RtlLeaveCriticalSection 16649->16700 16651 f20649 16651->16636 16653 f19efe 16652->16653 16654 f19ef8 16652->16654 16655 f1b68d __Getctype 6 API calls 16653->16655 16674 f19f04 16653->16674 16656 f1b64e __Getctype 6 API calls 16654->16656 16657 f19f18 16655->16657 16656->16653 16658 f1a64c __Getctype 14 API calls 16657->16658 16657->16674 16660 f19f28 16658->16660 16659 f141b6 __Getctype 41 API calls 16661 f19f82 16659->16661 16662 f19f30 16660->16662 16663 f19f45 16660->16663 16665 f1b68d __Getctype 6 API calls 16662->16665 16664 f1b68d __Getctype 6 API calls 16663->16664 16666 f19f51 16664->16666 16672 f19f3c 16665->16672 16667 f19f55 16666->16667 16668 f19f64 16666->16668 16669 f1b68d __Getctype 6 API calls 16667->16669 16670 f19c60 __Getctype 14 API calls 16668->16670 16669->16672 16673 f19f6f 16670->16673 16671 f1b00c ___std_exception_destroy 14 API calls 16671->16674 16672->16671 16675 f1b00c ___std_exception_destroy 14 API calls 16673->16675 16674->16659 16676 f19f09 16674->16676 16675->16676 16677 f2046e 16676->16677 16678 f205c3 std::_Locinfo::_Locinfo_ctor 51 API calls 16677->16678 16679 f20498 16678->16679 16701 f201f5 16679->16701 16682 f204b1 16682->16643 16685 f204ca 16687 f1b00c ___std_exception_destroy 14 API calls 16685->16687 16686 f204d8 16715 f206be 16686->16715 16687->16682 16690 f20510 16691 f116ef ___std_exception_copy 14 API calls 16690->16691 16692 f20515 16691->16692 16694 f1b00c ___std_exception_destroy 14 API calls 16692->16694 16693 f2052b std::_Locinfo::_Locinfo_ctor 16695 f1b00c ___std_exception_destroy 14 API calls 16693->16695 16698 f20557 16693->16698 16694->16682 16695->16698 16697 f1b00c ___std_exception_destroy 14 API calls 16697->16682 16699 f205a0 16698->16699 16726 f200e7 16698->16726 16699->16697 16700->16651 16734 f0959e 16701->16734 16704 f20216 GetOEMCP 16707 f2023f 16704->16707 16705 f20228 16706 f2022d GetACP 16705->16706 16705->16707 16706->16707 16707->16682 16708 f1b086 16707->16708 16709 f1b0c4 16708->16709 16714 f1b094 __Getctype 16708->16714 16710 f116ef ___std_exception_copy 14 API calls 16709->16710 16712 f1b0c2 16710->16712 16711 f1b0af RtlAllocateHeap 16711->16712 16711->16714 16712->16685 16712->16686 16713 f15a79 std::_Facet_Register 2 API calls 16713->16714 16714->16709 16714->16711 16714->16713 16716 f201f5 std::_Locinfo::_Locinfo_ctor 49 API calls 16715->16716 16717 f206de 16716->16717 16718 f20736 std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 16717->16718 16720 f2071b IsValidCodePage 16717->16720 16725 f207e3 std::_Locinfo::_Locinfo_ctor 16717->16725 16742 f202c9 16718->16742 16719 f03d67 _ValidateLocalCookies 5 API calls 16721 f20505 16719->16721 16722 f2072d 16720->16722 16720->16725 16721->16690 16721->16693 16722->16718 16723 f20756 GetCPInfo 16722->16723 16723->16718 16723->16725 16725->16719 16727 f200f3 std::_Locinfo::_Locinfo_ctor 16726->16727 16753 f1423b RtlEnterCriticalSection 16727->16753 16729 f200fd 16754 f20134 16729->16754 16735 f095bc 16734->16735 16736 f095b5 16734->16736 16735->16736 16737 f19e32 __Getctype 41 API calls 16735->16737 16736->16704 16736->16705 16738 f095dd 16737->16738 16739 f1a11f __Getctype 41 API calls 16738->16739 16740 f095f3 16739->16740 16741 f1a17d std::_Locinfo::_Locinfo_ctor 51 API calls 16740->16741 16741->16736 16743 f202f1 GetCPInfo 16742->16743 16744 f203ba 16742->16744 16743->16744 16745 f20309 16743->16745 16747 f03d67 _ValidateLocalCookies 5 API calls 16744->16747 16746 f1f43b std::_Locinfo::_Locinfo_ctor 50 API calls 16745->16746 16749 f20371 16746->16749 16748 f2046c 16747->16748 16748->16725 16750 f1a898 std::_Locinfo::_Locinfo_ctor 50 API calls 16749->16750 16751 f20392 16750->16751 16752 f1a898 std::_Locinfo::_Locinfo_ctor 50 API calls 16751->16752 16752->16744 16753->16729 16755 f0cedb std::_Locinfo::_Locinfo_ctor 41 API calls 16754->16755 16756 f20156 16755->16756 16757 f0cedb std::_Locinfo::_Locinfo_ctor 41 API calls 16756->16757 16758 f20175 16757->16758 16759 f1b00c ___std_exception_destroy 14 API calls 16758->16759 16760 f2010a 16758->16760 16759->16760 16761 f20128 16760->16761 16762 f14283 std::_Lockit::~_Lockit RtlLeaveCriticalSection 16761->16762 16763 f20116 16762->16763 16763->16699 16765 f0959e std::_Locinfo::_Locinfo_ctor 51 API calls 16764->16765 16766 f19a46 16765->16766 16768 f19a56 16766->16768 16771 f1f43b 16766->16771 16769 f03d67 _ValidateLocalCookies 5 API calls 16768->16769 16770 f19af2 16769->16770 16770->16613 16772 f0959e std::_Locinfo::_Locinfo_ctor 50 API calls 16771->16772 16773 f1f45b 16772->16773 16786 f1b16c 16773->16786 16775 f1f50f 16789 f03265 16775->16789 16776 f1f488 16776->16775 16779 f1b086 std::_Locinfo::_Locinfo_ctor 15 API calls 16776->16779 16781 f1f517 16776->16781 16782 f1f4ad std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 16776->16782 16777 f03d67 _ValidateLocalCookies 5 API calls 16780 f1f53a 16777->16780 16779->16782 16780->16768 16781->16777 16782->16775 16783 f1b16c std::_Locinfo::_Locinfo_ctor MultiByteToWideChar 16782->16783 16784 f1f4f6 16783->16784 16784->16775 16785 f1f4fd GetStringTypeW 16784->16785 16785->16775 16793 f1b0d4 16786->16793 16790 f03280 16789->16790 16791 f0326f 16789->16791 16790->16781 16791->16790 16792 f11c86 ___std_exception_destroy 14 API calls 16791->16792 16792->16790 16794 f1b0e5 MultiByteToWideChar 16793->16794 16794->16776 16797 eeab55 16795->16797 16796 eeaba3 16797->16796 16804 eee8a0 16797->16804 16799 eeab83 16799->15711 16801 ed3459 16800->16801 16808 f10dc7 16801->16808 16805 eee8ce 16804->16805 16807 eee8f8 std::locale::_Locimp::_Locimp 16804->16807 16806 ed32d0 std::_Throw_Cpp_error 43 API calls 16805->16806 16806->16807 16807->16799 16809 f10ddb ___std_exception_copy 16808->16809 16814 f0e555 16809->16814 16812 f0898c ___std_exception_copy 41 API calls 16813 ed3467 WriteProcessMemory WriteProcessMemory CreateRemoteThread WaitForSingleObject 16812->16813 16813->15715 16813->15716 16815 f0e581 16814->16815 16816 f0e5a4 16814->16816 16817 f08bd3 ___std_exception_copy 41 API calls 16815->16817 16816->16815 16820 f0e5ac 16816->16820 16818 f0e599 16817->16818 16819 f03d67 _ValidateLocalCookies 5 API calls 16818->16819 16821 f0e6c7 16819->16821 16825 f0fa97 16820->16825 16821->16812 16843 f10afd 16825->16843 16828 f0fabc 16829 f08bd3 ___std_exception_copy 41 API calls 16828->16829 16830 f0e62d 16829->16830 16840 f0f27d 16830->16840 16833 f0e1c0 std::_Locinfo::_Locinfo_ctor 51 API calls 16835 f0fae4 std::_Locinfo::_Locinfo_ctor 16833->16835 16835->16830 16835->16833 16836 f0fbc0 16835->16836 16847 f0f48b 16835->16847 16850 f0fec4 16835->16850 16884 f1035f 16835->16884 16837 f08bd3 ___std_exception_copy 41 API calls 16836->16837 16838 f0fbda 16837->16838 16839 f08bd3 ___std_exception_copy 41 API calls 16838->16839 16839->16830 16841 f1b00c ___std_exception_destroy 14 API calls 16840->16841 16842 f0f28d 16841->16842 16842->16818 16844 f0fab1 16843->16844 16845 f10b08 16843->16845 16844->16828 16844->16830 16844->16835 16846 f08bd3 ___std_exception_copy 41 API calls 16845->16846 16846->16844 16913 f0e832 16847->16913 16849 f0f4c6 16849->16835 16851 f0fee2 16850->16851 16852 f0fecb 16850->16852 16853 f0ff21 16851->16853 16854 f08bd3 ___std_exception_copy 41 API calls 16851->16854 16852->16853 16855 f103e4 16852->16855 16856 f10384 16852->16856 16853->16835 16859 f0ff16 16854->16859 16857 f103e9 16855->16857 16858 f1041d 16855->16858 16860 f1040a 16856->16860 16861 f1038a 16856->16861 16862 f10416 16857->16862 16863 f103eb 16857->16863 16864 f10422 16858->16864 16865 f1043a 16858->16865 16859->16835 16948 f0ebec 16860->16948 16870 f103db 16861->16870 16871 f1038f 16861->16871 16955 f10a20 16862->16955 16873 f103fa 16863->16873 16875 f1039e 16863->16875 16864->16860 16864->16870 16882 f103b5 16864->16882 16959 f10a3d 16865->16959 16883 f10443 16870->16883 16937 f0ed79 16870->16937 16874 f103c8 16871->16874 16871->16875 16871->16882 16873->16860 16877 f103fe 16873->16877 16874->16883 16933 f10906 16874->16933 16875->16883 16923 f10775 16875->16923 16877->16883 16944 f1099b 16877->16944 16878 f03d67 _ValidateLocalCookies 5 API calls 16880 f106bc 16878->16880 16880->16835 16882->16883 16962 f1c5ac 16882->16962 16883->16878 16885 f103e4 16884->16885 16886 f10384 16884->16886 16887 f103e9 16885->16887 16888 f1041d 16885->16888 16889 f1040a 16886->16889 16890 f1038a 16886->16890 16891 f10416 16887->16891 16892 f103eb 16887->16892 16893 f10422 16888->16893 16894 f1043a 16888->16894 16897 f0ebec 42 API calls 16889->16897 16900 f103db 16890->16900 16901 f1038f 16890->16901 16898 f10a20 42 API calls 16891->16898 16895 f1039e 16892->16895 16902 f103fa 16892->16902 16893->16889 16893->16900 16911 f103b5 16893->16911 16896 f10a3d 42 API calls 16894->16896 16899 f10775 53 API calls 16895->16899 16912 f10443 16895->16912 16896->16911 16897->16911 16898->16911 16899->16911 16904 f0ed79 42 API calls 16900->16904 16900->16912 16901->16895 16903 f103c8 16901->16903 16901->16911 16902->16889 16905 f103fe 16902->16905 16906 f10906 52 API calls 16903->16906 16903->16912 16904->16911 16908 f1099b 41 API calls 16905->16908 16905->16912 16906->16911 16907 f03d67 _ValidateLocalCookies 5 API calls 16909 f106bc 16907->16909 16908->16911 16909->16835 16910 f1c5ac 52 API calls 16910->16911 16911->16910 16911->16912 16912->16907 16914 f0ce69 std::_Locinfo::_Locinfo_ctor 41 API calls 16913->16914 16915 f0e844 16914->16915 16916 f0e859 16915->16916 16919 f0e88c 16915->16919 16922 f0e874 std::_Locinfo::_Locinfo_ctor 16915->16922 16917 f08bd3 ___std_exception_copy 41 API calls 16916->16917 16917->16922 16918 f0e923 16920 f0ce12 41 API calls 16918->16920 16919->16918 16921 f0ce12 41 API calls 16919->16921 16920->16922 16921->16918 16922->16849 16924 f1078f 16923->16924 16972 f0e780 16924->16972 16926 f107ce 16983 f1c42b 16926->16983 16929 f0e1c0 std::_Locinfo::_Locinfo_ctor 51 API calls 16930 f10885 16929->16930 16931 f0e1c0 std::_Locinfo::_Locinfo_ctor 51 API calls 16930->16931 16932 f108b8 16930->16932 16931->16932 16932->16882 16932->16932 16935 f10921 16933->16935 16934 f10957 16934->16882 16935->16934 16936 f1c5ac 52 API calls 16935->16936 16936->16934 16938 f0ed8e 16937->16938 16939 f0edb0 16938->16939 16941 f0edd7 16938->16941 16940 f08bd3 ___std_exception_copy 41 API calls 16939->16940 16943 f0edcd 16940->16943 16942 f0e780 15 API calls 16941->16942 16941->16943 16942->16943 16943->16882 16946 f109b1 16944->16946 16945 f08bd3 ___std_exception_copy 41 API calls 16947 f109d2 16945->16947 16946->16945 16946->16947 16947->16882 16949 f0ec01 16948->16949 16950 f0ec4a 16949->16950 16951 f0ec23 16949->16951 16953 f0e780 15 API calls 16950->16953 16954 f0ec40 16950->16954 16952 f08bd3 ___std_exception_copy 41 API calls 16951->16952 16952->16954 16953->16954 16954->16882 16956 f10a2c 16955->16956 17047 f0ea5f 16956->17047 16958 f10a3c 16958->16882 16960 f0ed79 42 API calls 16959->16960 16961 f10a52 16960->16961 16961->16882 16963 f1c5c1 16962->16963 16964 f1c602 16963->16964 16966 f0e1c0 std::_Locinfo::_Locinfo_ctor 51 API calls 16963->16966 16967 f1c5c5 std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 16963->16967 16971 f1c5ee std::locale::_Setgloballocale 16963->16971 16964->16967 16964->16971 17054 f1ec43 16964->17054 16965 f08bd3 ___std_exception_copy 41 API calls 16965->16967 16966->16964 16967->16882 16969 f1c6bd 16969->16967 16970 f1c6d3 GetLastError 16969->16970 16970->16967 16970->16971 16971->16965 16971->16967 16973 f0e7a7 16972->16973 16974 f0e795 16972->16974 16973->16974 16975 f1b086 std::_Locinfo::_Locinfo_ctor 15 API calls 16973->16975 16974->16926 16976 f0e7cb 16975->16976 16977 f0e7d3 16976->16977 16978 f0e7de 16976->16978 16979 f1b00c ___std_exception_destroy 14 API calls 16977->16979 17002 f0f297 16978->17002 16979->16974 16982 f1b00c ___std_exception_destroy 14 API calls 16982->16974 16984 f1c460 16983->16984 16986 f1c43c 16983->16986 16984->16986 16987 f1c493 16984->16987 16985 f08bd3 ___std_exception_copy 41 API calls 16999 f10861 16985->16999 16986->16985 16988 f1c4cc 16987->16988 16991 f1c4fb 16987->16991 17005 f1c2cf 16988->17005 16989 f1c524 16992 f1c551 16989->16992 16993 f1c58b 16989->16993 16990 f1c529 17013 f1bb58 16990->17013 16991->16989 16991->16990 16996 f1c571 16992->16996 16997 f1c556 16992->16997 17040 f1be85 16993->17040 17033 f1c07c 16996->17033 17023 f1c200 16997->17023 16999->16929 16999->16930 17003 f1b00c ___std_exception_destroy 14 API calls 17002->17003 17004 f0e7e9 17003->17004 17004->16982 17006 f1c2e5 17005->17006 17007 f1c2f0 17005->17007 17006->16999 17008 f19995 ___std_exception_copy 41 API calls 17007->17008 17009 f1c34b 17008->17009 17010 f1c355 17009->17010 17011 f08c7d __Getctype 11 API calls 17009->17011 17010->16999 17012 f1c363 17011->17012 17014 f1bb6b 17013->17014 17015 f1bb7a 17014->17015 17016 f1bb9c 17014->17016 17018 f08bd3 ___std_exception_copy 41 API calls 17015->17018 17017 f1bbb1 17016->17017 17020 f1bc04 17016->17020 17019 f1be85 53 API calls 17017->17019 17022 f1bb92 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z std::locale::_Setgloballocale __allrem _strrchr 17018->17022 17019->17022 17021 f0e1c0 std::_Locinfo::_Locinfo_ctor 51 API calls 17020->17021 17020->17022 17021->17022 17022->16999 17024 f247ad 43 API calls 17023->17024 17025 f1c230 17024->17025 17026 f246b3 41 API calls 17025->17026 17027 f1c26e 17026->17027 17028 f1c2ae 17027->17028 17030 f1c275 17027->17030 17031 f1c287 17027->17031 17029 f1bf29 51 API calls 17028->17029 17029->17030 17030->16999 17032 f1c112 51 API calls 17031->17032 17032->17030 17034 f247ad 43 API calls 17033->17034 17035 f1c0ab 17034->17035 17036 f246b3 41 API calls 17035->17036 17037 f1c0ec 17036->17037 17038 f1c0f3 17037->17038 17039 f1c112 51 API calls 17037->17039 17038->16999 17039->17038 17041 f247ad 43 API calls 17040->17041 17042 f1beaf 17041->17042 17043 f246b3 41 API calls 17042->17043 17044 f1befd 17043->17044 17045 f1bf29 51 API calls 17044->17045 17046 f1bf04 17044->17046 17045->17046 17046->16999 17048 f0ea74 17047->17048 17049 f0eabd 17048->17049 17050 f0ea96 17048->17050 17052 f0e780 15 API calls 17049->17052 17053 f0eab3 17049->17053 17051 f08bd3 ___std_exception_copy 41 API calls 17050->17051 17051->17053 17052->17053 17053->16958 17056 f1ec56 std::_Locinfo::_Locinfo_ctor 17054->17056 17055 f1ec94 WideCharToMultiByte 17055->16969 17056->17055 17058 f11430 17057->17058 17059 f11408 17057->17059 17058->15722 17059->17058 17060 f11415 17059->17060 17061 f11437 17059->17061 17063 f08bd3 ___std_exception_copy 41 API calls 17060->17063 17065 f11353 17061->17065 17063->17058 17066 f1135f std::_Locinfo::_Locinfo_ctor 17065->17066 17073 f11240 RtlEnterCriticalSection 17066->17073 17068 f1136d 17074 f113ae 17068->17074 17073->17068 17084 f1c89c 17074->17084 17081 f113a2 17226 f11254 RtlLeaveCriticalSection 17081->17226 17083 f1138b 17083->15722 17104 f1c85e 17084->17104 17086 f113c6 17091 f11471 17086->17091 17087 f1c8ad 17087->17086 17088 f1b086 std::_Locinfo::_Locinfo_ctor 15 API calls 17087->17088 17089 f1c906 17088->17089 17090 f1b00c ___std_exception_destroy 14 API calls 17089->17090 17090->17086 17094 f11483 17091->17094 17095 f113e4 17091->17095 17092 f11491 17093 f08bd3 ___std_exception_copy 41 API calls 17092->17093 17093->17095 17094->17092 17094->17095 17098 f114c7 std::locale::_Locimp::_Locimp 17094->17098 17100 f1c947 17095->17100 17097 f1a1db 41 API calls 17097->17098 17098->17095 17098->17097 17120 f09a81 17098->17120 17126 f19668 17098->17126 17101 f1137a 17100->17101 17102 f1c952 17100->17102 17101->17081 17102->17101 17103 f09a81 74 API calls 17102->17103 17103->17101 17105 f1c86a 17104->17105 17106 f1c894 17105->17106 17107 f1a1db 41 API calls 17105->17107 17106->17087 17108 f1c885 17107->17108 17111 f23bd1 17108->17111 17110 f1c88b 17110->17087 17112 f23beb 17111->17112 17113 f23bde 17111->17113 17116 f23bf7 17112->17116 17117 f116ef ___std_exception_copy 14 API calls 17112->17117 17114 f116ef ___std_exception_copy 14 API calls 17113->17114 17115 f23be3 17114->17115 17115->17110 17116->17110 17118 f23c18 17117->17118 17119 f08c50 ___std_exception_copy 41 API calls 17118->17119 17119->17115 17121 f09a9a 17120->17121 17125 f09ac1 17120->17125 17122 f1a1db 41 API calls 17121->17122 17121->17125 17123 f09ab6 17122->17123 17124 f19668 74 API calls 17123->17124 17124->17125 17125->17098 17127 f19674 std::_Locinfo::_Locinfo_ctor 17126->17127 17128 f1967c 17127->17128 17129 f196b5 17127->17129 17131 f196fb 17127->17131 17128->17098 17130 f08bd3 ___std_exception_copy 41 API calls 17129->17130 17130->17128 17137 f1e6b2 RtlEnterCriticalSection 17131->17137 17133 f19701 17134 f1971f 17133->17134 17138 f19779 17133->17138 17166 f19771 17134->17166 17137->17133 17141 f197a1 17138->17141 17165 f197c4 17138->17165 17139 f197a5 17140 f08bd3 ___std_exception_copy 41 API calls 17139->17140 17140->17165 17141->17139 17142 f19800 17141->17142 17143 f1981e 17142->17143 17176 f1262d 17142->17176 17169 f192be 17143->17169 17147 f19836 17151 f19865 17147->17151 17152 f1983e 17147->17152 17148 f1987d 17149 f19891 17148->17149 17150 f198e6 WriteFile 17148->17150 17153 f198d2 17149->17153 17154 f19899 17149->17154 17155 f19908 GetLastError 17150->17155 17150->17165 17184 f18e8f GetConsoleOutputCP 17151->17184 17152->17165 17179 f19256 17152->17179 17212 f1933b 17153->17212 17157 f198be 17154->17157 17158 f1989e 17154->17158 17155->17165 17204 f194ff 17157->17204 17161 f198a7 17158->17161 17158->17165 17197 f19416 17161->17197 17163 f19878 17163->17165 17165->17134 17225 f1e767 RtlLeaveCriticalSection 17166->17225 17168 f19777 17168->17128 17170 f23bd1 41 API calls 17169->17170 17172 f192d0 17170->17172 17171 f19334 17171->17147 17171->17148 17172->17171 17173 f192fe 17172->17173 17174 f0e1c0 std::_Locinfo::_Locinfo_ctor 51 API calls 17172->17174 17173->17171 17175 f19318 GetConsoleMode 17173->17175 17174->17173 17175->17171 17219 f1250c 17176->17219 17178 f12646 17178->17143 17181 f19278 17179->17181 17183 f192ad 17179->17183 17180 f192af GetLastError 17180->17183 17181->17180 17182 f23d9e CreateFileW CloseHandle WriteConsoleW GetLastError WriteConsoleW 17181->17182 17181->17183 17182->17181 17183->17165 17185 f18f01 17184->17185 17189 f18f08 std::locale::_Locimp::_Locimp 17184->17189 17186 f0e1c0 std::_Locinfo::_Locinfo_ctor 51 API calls 17185->17186 17186->17189 17187 f03d67 _ValidateLocalCookies 5 API calls 17188 f1924f 17187->17188 17188->17163 17190 f1c716 51 API calls 17189->17190 17191 f191be 17189->17191 17192 f1ec43 std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 17189->17192 17193 f19137 WriteFile 17189->17193 17195 f23c96 5 API calls std::_Locinfo::_Locinfo_ctor 17189->17195 17196 f19175 WriteFile 17189->17196 17190->17189 17191->17187 17191->17191 17192->17189 17193->17189 17194 f1922d GetLastError 17193->17194 17194->17191 17195->17189 17196->17189 17196->17194 17198 f19425 17197->17198 17199 f194e4 17198->17199 17201 f1949a WriteFile 17198->17201 17200 f03d67 _ValidateLocalCookies 5 API calls 17199->17200 17203 f194fd 17200->17203 17201->17198 17202 f194e6 GetLastError 17201->17202 17202->17199 17203->17165 17206 f1950e 17204->17206 17205 f03d67 _ValidateLocalCookies 5 API calls 17207 f1962f 17205->17207 17208 f1ec43 std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 17206->17208 17209 f19618 GetLastError 17206->17209 17210 f195cd WriteFile 17206->17210 17211 f19616 17206->17211 17207->17163 17208->17206 17209->17211 17210->17206 17210->17209 17211->17205 17215 f1934a 17212->17215 17213 f03d67 _ValidateLocalCookies 5 API calls 17214 f19414 17213->17214 17214->17163 17216 f193ba WriteFile 17215->17216 17218 f193fb 17215->17218 17216->17215 17217 f193fd GetLastError 17216->17217 17217->17218 17218->17213 17220 f1e92e 41 API calls 17219->17220 17221 f1251e 17220->17221 17222 f1253a SetFilePointerEx 17221->17222 17224 f12526 17221->17224 17223 f12552 GetLastError 17222->17223 17222->17224 17223->17224 17224->17178 17225->17168 17226->17083 17228 f0cf7f std::_Locinfo::_Locinfo_ctor 17227->17228 17229 f0cf89 17228->17229 17230 f0cfac 17228->17230 17231 f08bd3 ___std_exception_copy 41 API calls 17229->17231 17237 f0cfa4 17230->17237 17238 f11240 RtlEnterCriticalSection 17230->17238 17231->17237 17233 f0cfca 17239 f0d00a 17233->17239 17235 f0cfd7 17253 f0d002 17235->17253 17237->15728 17238->17233 17240 f0d017 17239->17240 17241 f0d03a 17239->17241 17242 f08bd3 ___std_exception_copy 41 API calls 17240->17242 17243 f09a81 74 API calls 17241->17243 17244 f0d032 17241->17244 17242->17244 17245 f0d052 17243->17245 17244->17235 17256 f1b046 17245->17256 17248 f1a1db 41 API calls 17249 f0d066 17248->17249 17260 f18d1c 17249->17260 17252 f1b00c ___std_exception_destroy 14 API calls 17252->17244 17318 f11254 RtlLeaveCriticalSection 17253->17318 17255 f0d008 17255->17237 17257 f0d05a 17256->17257 17258 f1b05d 17256->17258 17257->17248 17258->17257 17259 f1b00c ___std_exception_destroy 14 API calls 17258->17259 17259->17257 17261 f18d45 17260->17261 17266 f0d06d 17260->17266 17262 f18d94 17261->17262 17264 f18d6c 17261->17264 17263 f08bd3 ___std_exception_copy 41 API calls 17262->17263 17263->17266 17267 f18c8b 17264->17267 17266->17244 17266->17252 17268 f18c97 std::_Locinfo::_Locinfo_ctor 17267->17268 17275 f1e6b2 RtlEnterCriticalSection 17268->17275 17270 f18ca5 17271 f18cd6 17270->17271 17276 f18def 17270->17276 17289 f18d10 17271->17289 17275->17270 17292 f1e92e 17276->17292 17278 f18e05 17305 f1e89d 17278->17305 17280 f18dff 17280->17278 17281 f1e92e 41 API calls 17280->17281 17288 f18e37 17280->17288 17283 f18e2e 17281->17283 17282 f1e92e 41 API calls 17284 f18e43 FindCloseChangeNotification 17282->17284 17286 f1e92e 41 API calls 17283->17286 17284->17278 17285 f18e4f GetLastError 17284->17285 17285->17278 17286->17288 17287 f18e5d 17287->17271 17288->17278 17288->17282 17317 f1e767 RtlLeaveCriticalSection 17289->17317 17291 f18cf9 17291->17266 17293 f1e950 17292->17293 17294 f1e93b 17292->17294 17297 f116dc 14 API calls 17293->17297 17299 f1e975 17293->17299 17314 f116dc 17294->17314 17300 f1e980 17297->17300 17298 f116ef ___std_exception_copy 14 API calls 17302 f1e948 17298->17302 17299->17280 17301 f116ef ___std_exception_copy 14 API calls 17300->17301 17303 f1e988 17301->17303 17302->17280 17304 f08c50 ___std_exception_copy 41 API calls 17303->17304 17304->17302 17306 f1e913 17305->17306 17307 f1e8ac 17305->17307 17308 f116ef ___std_exception_copy 14 API calls 17306->17308 17307->17306 17311 f1e8d6 17307->17311 17309 f1e918 17308->17309 17310 f116dc 14 API calls 17309->17310 17312 f1e903 17310->17312 17311->17312 17313 f1e8fd SetStdHandle 17311->17313 17312->17287 17313->17312 17315 f19f85 std::locale::_Setgloballocale 14 API calls 17314->17315 17316 f116e1 17315->17316 17316->17298 17317->17291 17318->17255 17320 ee7f1d 17319->17320 17321 ee8034 17319->17321 17322 ee7f7c 17320->17322 17323 ee7fcb 17320->17323 17324 ee7f2b 17320->17324 17325 ee7f24 17320->17325 17326 ee7f83 17320->17326 17331 ed2cf0 std::_Throw_Cpp_error 43 API calls 17321->17331 17332 ee7f29 17321->17332 17405 eecf80 17322->17405 17323->15737 17330 f03662 std::_Facet_Register 43 API calls 17324->17330 17400 eec3a0 17325->17400 17328 f03662 std::_Facet_Register 43 API calls 17326->17328 17328->17332 17330->17332 17333 ee804f 17331->17333 17332->15737 17410 ed7f90 17333->17410 17335 ee8062 17336 f051eb Concurrency::cancel_current_task RaiseException 17335->17336 17337 ee8073 17336->17337 17340 ef215f 17338->17340 17467 f1132b 17340->17467 17343 eeb4f0 17344 eedb10 17343->17344 17345 eede3d 17344->17345 17346 eedb56 17344->17346 17348 eefd70 43 API calls 17345->17348 17519 eeebb0 17346->17519 17350 eede87 17348->17350 17349 eedba4 17352 eefd70 43 API calls 17349->17352 17351 eeeda0 56 API calls 17350->17351 17396 eedf4f std::ios_base::_Ios_base_dtor 17350->17396 17354 eedee2 17351->17354 17355 eedbc1 17352->17355 17353 eede38 std::ios_base::_Ios_base_dtor 17353->15740 17357 ed75c0 43 API calls 17354->17357 17399 eedcc3 std::ios_base::_Ios_base_dtor 17355->17399 17525 eeeda0 17355->17525 17356 ee7ef0 43 API calls 17360 eedfc7 17356->17360 17361 eedf06 17357->17361 17358 eedcec 17363 ee7ef0 43 API calls 17358->17363 17359 eedd82 17369 ee7ef0 43 API calls 17359->17369 17375 eedd9f 17359->17375 17360->17353 17364 f08c60 std::_Throw_Cpp_error 41 API calls 17360->17364 17365 eef440 56 API calls 17361->17365 17394 eedd01 17363->17394 17367 eee06f 17364->17367 17381 eedf1f 17365->17381 17366 eedc1c 17572 ed75c0 17366->17572 17621 ee90b0 17367->17621 17369->17375 17371 eee093 17374 ee90b0 42 API calls 17371->17374 17372 eedc40 17602 eef440 17372->17602 17378 eee0a1 17374->17378 17379 ee35b0 41 API calls 17375->17379 17377 eedc56 17377->17367 17382 eedc6b 17377->17382 17383 f051eb Concurrency::cancel_current_task RaiseException 17378->17383 17384 eedd6c 17379->17384 17380 f051eb Concurrency::cancel_current_task RaiseException 17385 eee08e 17380->17385 17381->17371 17386 ed7a20 14 API calls 17381->17386 17611 ed7a20 17382->17611 17387 eee0b2 17383->17387 17391 ee35b0 41 API calls 17384->17391 17388 f08c60 std::_Throw_Cpp_error 41 API calls 17385->17388 17386->17396 17389 f08c60 std::_Throw_Cpp_error 41 API calls 17387->17389 17388->17371 17393 eee0b7 17389->17393 17395 eede26 17391->17395 17616 ee35b0 17394->17616 17397 ee35b0 41 API calls 17395->17397 17396->17356 17396->17360 17396->17387 17397->17353 17398 eedc86 17398->17385 17398->17399 17399->17358 17399->17359 17401 f03662 std::_Facet_Register 43 API calls 17400->17401 17402 eec3c3 17401->17402 17403 f03662 std::_Facet_Register 43 API calls 17402->17403 17404 eec3ec 17403->17404 17404->17332 17406 f03662 std::_Facet_Register 43 API calls 17405->17406 17407 eecfb7 17406->17407 17408 ed3040 std::_Throw_Cpp_error 43 API calls 17407->17408 17409 eecfee 17408->17409 17409->17332 17421 ed7350 17410->17421 17412 ed8029 17439 eead80 17412->17439 17414 ed803d 17416 ed80df 17414->17416 17419 ed8076 std::ios_base::_Ios_base_dtor 17414->17419 17418 f08c60 std::_Throw_Cpp_error 41 API calls 17416->17418 17417 ed80aa 17417->17335 17420 ed80e4 17418->17420 17443 ed72b0 17419->17443 17420->17335 17446 ed4d70 17421->17446 17430 ee8f00 std::_Throw_Cpp_error 43 API calls 17431 ed73e6 17430->17431 17432 f08c60 std::_Throw_Cpp_error 41 API calls 17431->17432 17433 ed7476 std::ios_base::_Ios_base_dtor 17431->17433 17434 ed74c4 17432->17434 17433->17412 17435 f04b68 ___std_exception_destroy 14 API calls 17434->17435 17436 ed7511 17435->17436 17437 f04b68 ___std_exception_destroy 14 API calls 17436->17437 17438 ed7527 std::ios_base::_Ios_base_dtor 17437->17438 17438->17412 17440 eeadb4 17439->17440 17441 ee8f00 std::_Throw_Cpp_error 43 API calls 17440->17441 17442 eeadbf 17441->17442 17442->17414 17444 f04b05 ___std_exception_copy 42 API calls 17443->17444 17445 ed731a 17444->17445 17445->17417 17448 ed4da6 17446->17448 17447 ed4dd8 17450 eeac50 17447->17450 17448->17447 17449 ed3040 std::_Throw_Cpp_error 43 API calls 17448->17449 17449->17447 17452 eeac81 17450->17452 17451 eeacd3 17452->17451 17453 eee8a0 43 API calls 17452->17453 17454 ed73af 17453->17454 17455 eeabb0 17454->17455 17456 eeabe1 17455->17456 17456->17456 17457 ee8f00 std::_Throw_Cpp_error 43 API calls 17456->17457 17458 ed73c2 17457->17458 17459 eeae20 17458->17459 17462 eee710 17459->17462 17461 ed73d1 17461->17430 17463 eee753 17462->17463 17464 ed32d0 std::_Throw_Cpp_error 43 API calls 17463->17464 17465 eee758 std::locale::_Locimp::_Locimp 17463->17465 17466 eee843 std::locale::_Locimp::_Locimp 17464->17466 17465->17461 17466->17461 17468 f19e32 __Getctype 41 API calls 17467->17468 17469 f11336 17468->17469 17470 f1a11f __Getctype 41 API calls 17469->17470 17471 ef225f 17470->17471 17472 eefd70 17471->17472 17475 eefde4 17472->17475 17476 eefd84 17472->17476 17474 eeff6c 17474->17343 17481 eefe74 17475->17481 17508 ef01e0 17475->17508 17479 eefdc2 17476->17479 17486 ef9e20 17476->17486 17479->17475 17480 ef9e20 43 API calls 17479->17480 17483 eefe58 17479->17483 17480->17483 17481->17343 17482 eefecc 17482->17474 17485 ef9e20 43 API calls 17482->17485 17512 ef08f0 17482->17512 17483->17481 17504 ef1430 17483->17504 17485->17482 17487 ef9f76 17486->17487 17488 ef9e62 17486->17488 17489 ed3330 43 API calls 17487->17489 17490 ef9e7c 17488->17490 17491 ef9eca 17488->17491 17492 ef9eba 17488->17492 17493 ef9f7b 17489->17493 17494 f03662 std::_Facet_Register 43 API calls 17490->17494 17495 ef9e9a std::locale::_Locimp::_Locimp 17491->17495 17498 f03662 std::_Facet_Register 43 API calls 17491->17498 17492->17490 17492->17493 17496 ed2b50 Concurrency::cancel_current_task 43 API calls 17493->17496 17497 ef9e8f 17494->17497 17502 ef77d0 41 API calls 17495->17502 17499 ef9f80 17496->17499 17497->17495 17497->17499 17498->17495 17500 f08c60 std::_Throw_Cpp_error 41 API calls 17499->17500 17501 ef9f85 17500->17501 17503 ef9f47 17502->17503 17503->17479 17505 ef1443 17504->17505 17506 ef1471 17505->17506 17507 ef9e20 43 API calls 17505->17507 17506->17475 17507->17506 17510 ef01f0 17508->17510 17509 ef9e20 43 API calls 17509->17510 17510->17509 17511 ef0260 17510->17511 17511->17482 17513 ef1430 43 API calls 17512->17513 17516 ef08fc 17513->17516 17514 ef9e20 43 API calls 17518 ef0995 17514->17518 17515 ef090a 17515->17482 17516->17515 17517 ef9e20 43 API calls 17516->17517 17516->17518 17517->17516 17518->17514 17518->17515 17521 eeec6d 17519->17521 17520 ee7ef0 43 API calls 17522 eeec8d 17520->17522 17521->17520 17624 ef16c0 17522->17624 17524 eeecdf 17524->17349 17526 eeee46 17525->17526 17549 eeef1f std::ios_base::_Ios_base_dtor 17525->17549 17527 eef425 17526->17527 17530 eee8a0 43 API calls 17526->17530 17534 f08c60 std::_Throw_Cpp_error 41 API calls 17527->17534 17528 ee8f00 std::_Throw_Cpp_error 43 API calls 17529 eeef5b 17528->17529 17531 eeef6a 17529->17531 17539 eef191 17529->17539 17532 eeee79 17530->17532 17533 eef440 56 API calls 17531->17533 17535 ee8f00 std::_Throw_Cpp_error 43 API calls 17532->17535 17536 eeef79 17533->17536 17537 eef42f 17534->17537 17538 eeee93 17535->17538 17544 ed3040 std::_Throw_Cpp_error 43 API calls 17536->17544 17540 f08c60 std::_Throw_Cpp_error 41 API calls 17537->17540 17541 ee8f00 std::_Throw_Cpp_error 43 API calls 17538->17541 17539->17539 17545 ed3040 std::_Throw_Cpp_error 43 API calls 17539->17545 17542 eef434 17540->17542 17543 eeeee3 17541->17543 17546 f08c60 std::_Throw_Cpp_error 41 API calls 17542->17546 17543->17527 17543->17549 17547 eeefba 17544->17547 17548 eef1c9 17545->17548 17570 eef375 std::ios_base::_Ios_base_dtor 17546->17570 17550 ee8f00 std::_Throw_Cpp_error 43 API calls 17547->17550 17551 eefbf0 43 API calls 17548->17551 17549->17528 17553 eeefcd 17550->17553 17554 eef1e0 17551->17554 17552 f08c60 std::_Throw_Cpp_error 41 API calls 17555 eef43e 17552->17555 17556 eee710 43 API calls 17553->17556 17557 ee8f00 std::_Throw_Cpp_error 43 API calls 17554->17557 17558 eef019 17556->17558 17561 eef22f std::ios_base::_Ios_base_dtor 17557->17561 17559 ee8f00 std::_Throw_Cpp_error 43 API calls 17558->17559 17560 eef032 17559->17560 17562 ee8f00 std::_Throw_Cpp_error 43 API calls 17560->17562 17561->17542 17566 eef161 std::ios_base::_Ios_base_dtor 17561->17566 17564 eef081 std::ios_base::_Ios_base_dtor 17562->17564 17563 ed3040 std::_Throw_Cpp_error 43 API calls 17565 eef30c 17563->17565 17564->17537 17564->17566 17567 eefbf0 43 API calls 17565->17567 17566->17563 17571 eef3f2 std::ios_base::_Ios_base_dtor 17566->17571 17568 eef323 17567->17568 17569 ee8f00 std::_Throw_Cpp_error 43 API calls 17568->17569 17569->17570 17570->17552 17570->17571 17571->17366 17695 ed4e30 17572->17695 17575 ed4e30 43 API calls 17576 ed762b 17575->17576 17577 eeace0 43 API calls 17576->17577 17578 ed7640 17577->17578 17579 eeabb0 43 API calls 17578->17579 17580 ed7656 17579->17580 17581 eee710 43 API calls 17580->17581 17582 ed766d std::ios_base::_Ios_base_dtor 17581->17582 17583 ed7a09 17582->17583 17586 ed770a std::ios_base::_Ios_base_dtor 17582->17586 17584 f08c60 std::_Throw_Cpp_error 41 API calls 17583->17584 17585 ed7a0e 17584->17585 17587 f08c60 std::_Throw_Cpp_error 41 API calls 17585->17587 17589 ed7350 43 API calls 17586->17589 17588 ed7a13 17587->17588 17590 ed77a4 17589->17590 17591 ee8f00 std::_Throw_Cpp_error 43 API calls 17590->17591 17592 ed77b9 17591->17592 17593 eee710 43 API calls 17592->17593 17594 ed780c 17593->17594 17595 ee8f00 std::_Throw_Cpp_error 43 API calls 17594->17595 17596 ed7828 17595->17596 17597 eead80 43 API calls 17596->17597 17598 ed7879 std::ios_base::_Ios_base_dtor 17597->17598 17598->17585 17599 ed7975 std::ios_base::_Ios_base_dtor 17598->17599 17600 ed72b0 42 API calls 17599->17600 17601 ed79ca 17600->17601 17601->17372 17603 eef630 17602->17603 17609 eef4c9 std::ios_base::_Ios_base_dtor std::locale::_Locimp::_Locimp 17602->17609 17603->17377 17605 eef647 17606 f08c60 std::_Throw_Cpp_error 41 API calls 17605->17606 17610 eef651 17606->17610 17607 ee8f00 std::_Throw_Cpp_error 43 API calls 17607->17609 17608 ed32d0 std::_Throw_Cpp_error 43 API calls 17608->17609 17609->17603 17609->17605 17609->17607 17609->17608 17699 ed34a0 17609->17699 17610->17377 17612 f04b68 ___std_exception_destroy 14 API calls 17611->17612 17613 ed7a61 17612->17613 17614 f04b68 ___std_exception_destroy 14 API calls 17613->17614 17615 ed7a77 17614->17615 17615->17398 17617 ee35d1 17616->17617 17618 ee35f1 std::ios_base::_Ios_base_dtor 17616->17618 17617->17618 17619 f08c60 std::_Throw_Cpp_error 41 API calls 17617->17619 17618->17384 17620 ee3625 17619->17620 17620->17384 17706 ee6590 17621->17706 17627 ef17d0 17624->17627 17626 ef16da std::locale::_Setgloballocale 17626->17524 17628 ef1809 17627->17628 17634 ef1838 17627->17634 17629 ef1923 17628->17629 17632 ef181b 17628->17632 17644 ef1990 17629->17644 17632->17634 17635 ef9f90 17632->17635 17634->17626 17636 efa0a3 17635->17636 17637 ef9fc2 17635->17637 17638 ed3330 43 API calls 17636->17638 17656 efd180 17637->17656 17642 efa000 std::locale::_Locimp::_Locimp 17638->17642 17640 f08c60 std::_Throw_Cpp_error 41 API calls 17641 efa0ad 17640->17641 17642->17640 17643 efa05f std::ios_base::_Ios_base_dtor 17642->17643 17643->17634 17645 f01cda 43 API calls 17644->17645 17647 ef199a 17645->17647 17646 ef1928 17647->17646 17648 ed2cf0 std::_Throw_Cpp_error 43 API calls 17647->17648 17649 ef1a03 17648->17649 17650 eeace0 43 API calls 17649->17650 17651 ef1a18 17650->17651 17664 ed7cf0 17651->17664 17653 ef1a2d 17654 f051eb Concurrency::cancel_current_task RaiseException 17653->17654 17655 ef1a3e 17654->17655 17657 efd1c9 17656->17657 17658 efd189 17656->17658 17657->17657 17658->17657 17660 f03662 std::_Facet_Register 43 API calls 17658->17660 17662 efd1a0 17658->17662 17659 f03662 std::_Facet_Register 43 API calls 17661 efd1c2 17659->17661 17660->17662 17661->17642 17662->17659 17663 efd1a9 17662->17663 17663->17642 17665 ed7350 43 API calls 17664->17665 17666 ed7d80 17665->17666 17667 eead80 43 API calls 17666->17667 17668 ed7d94 17667->17668 17669 ed7dcd std::ios_base::_Ios_base_dtor 17668->17669 17671 ed7e33 17668->17671 17670 ed72b0 42 API calls 17669->17670 17672 ed7dfd 17670->17672 17673 f08c60 std::_Throw_Cpp_error 41 API calls 17671->17673 17672->17653 17674 ed7e38 17673->17674 17675 ed7350 43 API calls 17674->17675 17676 ed7ece 17675->17676 17677 eead80 43 API calls 17676->17677 17678 ed7ee2 17677->17678 17679 ed7f1b std::ios_base::_Ios_base_dtor 17678->17679 17681 ed7f81 17678->17681 17680 ed72b0 42 API calls 17679->17680 17682 ed7f4b 17680->17682 17683 f08c60 std::_Throw_Cpp_error 41 API calls 17681->17683 17682->17653 17684 ed7f86 17683->17684 17685 ed7350 43 API calls 17684->17685 17686 ed8029 17685->17686 17687 eead80 43 API calls 17686->17687 17688 ed803d 17687->17688 17689 ed8076 std::ios_base::_Ios_base_dtor 17688->17689 17691 ed80df 17688->17691 17690 ed72b0 42 API calls 17689->17690 17692 ed80aa 17690->17692 17693 f08c60 std::_Throw_Cpp_error 41 API calls 17691->17693 17692->17653 17694 ed80e4 17693->17694 17694->17653 17696 ed4e66 17695->17696 17697 ed4ea8 17696->17697 17698 ed3040 std::_Throw_Cpp_error 43 API calls 17696->17698 17697->17575 17698->17697 17702 ed3380 17699->17702 17703 ed3399 17702->17703 17704 f10dc7 54 API calls 17703->17704 17705 ed33a7 17704->17705 17705->17609 17707 f04b05 ___std_exception_copy 42 API calls 17706->17707 17708 ee65ce 17707->17708 17709 f04b05 ___std_exception_copy 42 API calls 17708->17709 17710 ee6601 17709->17710 17710->17380 17712 f28e07 17711->17712 17715 f28bf8 17711->17715 17712->15743 17714 f28d28 std::locale::_Setgloballocale 17714->17712 17716 ed3130 43 API calls 17714->17716 17715->17714 17718 f087a0 17715->17718 17727 ed3130 17715->17727 17716->17714 17719 f087d3 17718->17719 17723 f087b7 17718->17723 17720 f19e32 __Getctype 41 API calls 17719->17720 17721 f087d8 17720->17721 17722 f1a11f __Getctype 41 API calls 17721->17722 17724 f087e8 17722->17724 17723->17715 17724->17723 17725 f19a29 51 API calls 17724->17725 17726 f0881a 17725->17726 17726->17715 17728 ed316f 17727->17728 17729 ed32b3 17727->17729 17731 ed3189 17728->17731 17732 ed31d7 17728->17732 17733 ed31c7 17728->17733 17730 ed3330 43 API calls 17729->17730 17734 ed32b8 17730->17734 17735 f03662 std::_Facet_Register 43 API calls 17731->17735 17737 f03662 std::_Facet_Register 43 API calls 17732->17737 17740 ed319c std::locale::_Locimp::_Locimp 17732->17740 17733->17731 17733->17734 17736 ed2b50 Concurrency::cancel_current_task 43 API calls 17734->17736 17735->17740 17736->17740 17737->17740 17738 f08c60 std::_Throw_Cpp_error 41 API calls 17739 ed32c2 17738->17739 17740->17738 17741 ed326b std::ios_base::_Ios_base_dtor 17740->17741 17741->17715 17743 f03649 GetSystemTimeAsFileTime 17742->17743 17744 f0363d GetSystemTimePreciseAsFileTime 17742->17744 17745 f03067 17743->17745 17744->17745 17745->15245 15238 11ceb8c 15239 11ceb99 VirtualAlloc 15238->15239 18004 ef47b0 18005 ef48ed 18004->18005 18006 ef47ed 18004->18006 18007 ed3330 43 API calls 18005->18007 18010 ef4a30 43 API calls 18006->18010 18008 ef48f2 18007->18008 18009 ef4a23 18008->18009 18011 ef493d 18008->18011 18012 ed3330 43 API calls 18009->18012 18017 ef4827 18010->18017 18014 ef4a30 43 API calls 18011->18014 18013 ef4a28 18012->18013 18015 ef4977 18014->18015 18023 ee3d50 18015->18023 18018 eee1e0 41 API calls 18017->18018 18019 ef48b4 18018->18019 18020 ef499f 18021 eee1e0 41 API calls 18020->18021 18022 ef49ea 18021->18022 18024 ee3d8f 18023->18024 18025 ee3df7 std::locale::_Locimp::_Locimp 18023->18025 18024->18025 18026 ee3f1e 18024->18026 18027 ee3f7d 18024->18027 18028 ee3e69 18024->18028 18029 ee3d96 18024->18029 18025->18020 18095 ee7e80 18026->18095 18033 f03662 std::_Facet_Register 43 API calls 18027->18033 18031 f03662 std::_Facet_Register 43 API calls 18028->18031 18032 f03662 std::_Facet_Register 43 API calls 18029->18032 18034 ee3e73 18031->18034 18035 ee3da0 18032->18035 18036 ee3f8a 18033->18036 18034->18025 18056 efbf20 18034->18056 18037 f03662 std::_Facet_Register 43 API calls 18035->18037 18036->18025 18040 ee408e 18036->18040 18041 ee3fd3 18036->18041 18039 ee3dd2 18037->18039 18083 eff450 18039->18083 18043 ed3330 43 API calls 18040->18043 18044 ee3fdb 18041->18044 18045 ee4004 18041->18045 18047 ee4093 18043->18047 18044->18047 18048 ee3fe6 18044->18048 18046 f03662 std::_Facet_Register 43 API calls 18045->18046 18046->18025 18050 ed2b50 Concurrency::cancel_current_task 43 API calls 18047->18050 18049 f03662 std::_Facet_Register 43 API calls 18048->18049 18051 ee3fec 18049->18051 18050->18051 18051->18025 18053 f08c60 std::_Throw_Cpp_error 41 API calls 18051->18053 18052 ee3d50 105 API calls 18054 ee3eb1 18052->18054 18055 ee409d 18053->18055 18054->18025 18054->18052 18057 efbf9b 18056->18057 18058 efbf32 18056->18058 18059 ed3330 43 API calls 18057->18059 18060 efbf3d 18058->18060 18061 efbf6c 18058->18061 18062 efbfa0 18059->18062 18060->18062 18063 efbf44 18060->18063 18064 efbf89 18061->18064 18067 f03662 std::_Facet_Register 43 API calls 18061->18067 18065 ed2b50 Concurrency::cancel_current_task 43 API calls 18062->18065 18066 f03662 std::_Facet_Register 43 API calls 18063->18066 18064->18054 18068 efbf4a 18065->18068 18066->18068 18069 efbf76 18067->18069 18070 f08c60 std::_Throw_Cpp_error 41 API calls 18068->18070 18071 efbf53 18068->18071 18069->18054 18072 efbfaa 18070->18072 18071->18054 18073 efbffc 18072->18073 18074 efc067 18072->18074 18077 efc003 std::locale::_Locimp::_Locimp 18072->18077 18100 eefab0 18073->18100 18076 ed3330 43 API calls 18074->18076 18078 efc06c 18076->18078 18077->18054 18079 f03662 std::_Facet_Register 43 API calls 18078->18079 18080 efc09e 18079->18080 18081 ed3040 std::_Throw_Cpp_error 43 API calls 18080->18081 18082 efc0e2 18081->18082 18082->18054 18084 eff488 18083->18084 18094 eff52f 18083->18094 18085 f03662 std::_Facet_Register 43 API calls 18084->18085 18086 eff4aa 18085->18086 18087 ee63b0 std::_Throw_Cpp_error 43 API calls 18086->18087 18088 eff4c0 18087->18088 18089 ee3d50 105 API calls 18088->18089 18090 eff4d0 18089->18090 18091 eff450 105 API calls 18090->18091 18092 eff521 18091->18092 18093 eff450 105 API calls 18092->18093 18093->18094 18094->18025 18096 f03662 std::_Facet_Register 43 API calls 18095->18096 18097 ee7ea6 18096->18097 18098 ee63b0 std::_Throw_Cpp_error 43 API calls 18097->18098 18099 ee7ec5 18098->18099 18099->18025 18101 eefb2b 18100->18101 18102 eefac2 18100->18102 18105 ed2b50 Concurrency::cancel_current_task 43 API calls 18101->18105 18103 eefafc 18102->18103 18104 eefacd 18102->18104 18107 eefb19 18103->18107 18110 f03662 std::_Facet_Register 43 API calls 18103->18110 18104->18101 18106 eefad4 18104->18106 18108 eefada 18105->18108 18109 f03662 std::_Facet_Register 43 API calls 18106->18109 18107->18077 18111 f08c60 std::_Throw_Cpp_error 41 API calls 18108->18111 18113 eefae3 18108->18113 18109->18108 18112 eefb06 18110->18112 18115 eefb35 18111->18115 18112->18077 18113->18077 18114 eefb5b std::locale::_Setgloballocale 18114->18077 18115->18114 18118 ef9c70 18115->18118 18117 eefb7f 18117->18077 18119 ef9dc4 18118->18119 18124 ef9ca2 18118->18124 18120 ed3330 43 API calls 18119->18120 18135 ef9d04 std::locale::_Locimp::_Locimp 18120->18135 18121 ef9dbf 18122 ed2b50 Concurrency::cancel_current_task 43 API calls 18121->18122 18122->18119 18123 f08c60 std::_Throw_Cpp_error 41 API calls 18125 ef9dce 18123->18125 18124->18121 18126 ef9d1d 18124->18126 18127 ef9cf3 18124->18127 18137 ee9950 18125->18137 18130 f03662 std::_Facet_Register 43 API calls 18126->18130 18126->18135 18127->18121 18129 ef9cfe 18127->18129 18132 f03662 std::_Facet_Register 43 API calls 18129->18132 18130->18135 18131 ef9dd9 18133 f051eb Concurrency::cancel_current_task RaiseException 18131->18133 18132->18135 18134 ef9de2 18133->18134 18135->18123 18136 ef9d8f std::ios_base::_Ios_base_dtor 18135->18136 18136->18117 18138 ee9978 std::ios_base::_Ios_base_dtor 18137->18138 18139 ee9968 18137->18139 18138->18131 18139->18138 18140 f08c60 std::_Throw_Cpp_error 41 API calls 18139->18140 18141 ee998d 18140->18141 18142 ee9a4f 18141->18142 18149 f02b64 18141->18149 18142->18131 18148 ee9a04 18148->18131 18150 f02ae7 18149->18150 18151 ee99cc 18150->18151 18178 f09805 18150->18178 18151->18142 18157 ee83b0 18151->18157 18156 f0d098 79 API calls 18156->18151 18158 ee843c 18157->18158 18159 ee8463 18157->18159 18230 f111fa 18158->18230 18161 eec430 18159->18161 18162 f02460 std::_Lockit::_Lockit 7 API calls 18161->18162 18163 eec45f 18162->18163 18164 f02460 std::_Lockit::_Lockit 7 API calls 18163->18164 18168 eec4a9 std::_Throw_Cpp_error 18163->18168 18165 eec481 18164->18165 18170 f024b8 std::_Lockit::~_Lockit 2 API calls 18165->18170 18166 eec4f8 18167 f024b8 std::_Lockit::~_Lockit 2 API calls 18166->18167 18169 eec5c9 18167->18169 18168->18166 18171 f03662 std::_Facet_Register 43 API calls 18168->18171 18169->18148 18170->18168 18172 eec506 18171->18172 18173 ed4040 std::_Throw_Cpp_error 76 API calls 18172->18173 18174 eec536 18173->18174 18175 ed4100 std::_Throw_Cpp_error 74 API calls 18174->18175 18176 eec592 18175->18176 18177 f026e7 std::_Facet_Register 43 API calls 18176->18177 18177->18166 18179 f0974e std::_Locinfo::_Locinfo_ctor 18178->18179 18180 f09761 18179->18180 18183 f09781 18179->18183 18181 f116ef ___std_exception_copy 14 API calls 18180->18181 18182 f09766 18181->18182 18184 f08c50 ___std_exception_copy 41 API calls 18182->18184 18185 f09793 18183->18185 18186 f09786 18183->18186 18187 f02b33 18184->18187 18189 f1a8e1 17 API calls 18185->18189 18188 f116ef ___std_exception_copy 14 API calls 18186->18188 18187->18151 18195 f0d5e6 18187->18195 18188->18187 18190 f0979c 18189->18190 18191 f097b0 18190->18191 18192 f097a3 18190->18192 18194 f097ee RtlLeaveCriticalSection 18191->18194 18193 f116ef ___std_exception_copy 14 API calls 18192->18193 18193->18187 18194->18187 18196 f0d5f9 ___std_exception_copy 18195->18196 18201 f0d33d 18196->18201 18199 f0898c ___std_exception_copy 41 API calls 18200 f02b4e 18199->18200 18200->18151 18200->18156 18203 f0d349 std::_Locinfo::_Locinfo_ctor 18201->18203 18202 f0d34f 18204 f08bd3 ___std_exception_copy 41 API calls 18202->18204 18203->18202 18206 f0d392 18203->18206 18205 f0d36a 18204->18205 18205->18199 18212 f11240 RtlEnterCriticalSection 18206->18212 18208 f0d39e 18213 f0d4c0 18208->18213 18210 f0d3b4 18222 f0d3dd 18210->18222 18212->18208 18214 f0d4d3 18213->18214 18215 f0d4e6 18213->18215 18214->18210 18225 f0d3e7 18215->18225 18217 f0d597 18217->18210 18218 f09a81 74 API calls 18220 f0d537 18218->18220 18219 f0d509 18219->18217 18219->18218 18221 f1262d 43 API calls 18220->18221 18221->18217 18229 f11254 RtlLeaveCriticalSection 18222->18229 18224 f0d3e5 18224->18205 18226 f0d3f8 18225->18226 18228 f0d450 18225->18228 18227 f125ed 43 API calls 18226->18227 18226->18228 18227->18228 18228->18219 18229->18224 18231 f11206 18230->18231 18235 f1121b 18230->18235 18232 f116ef ___std_exception_copy 14 API calls 18231->18232 18233 f1120b 18232->18233 18234 f08c50 ___std_exception_copy 41 API calls 18233->18234 18236 f11216 18234->18236 18235->18159 18236->18159

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • setsockopt.WS2_32(000002DC,0000FFFF,00001006,?,00000008), ref: 00F94F56
                                                                                                            • recv.WS2_32(?,00000004,00000002), ref: 00F94F71
                                                                                                            • WSAGetLastError.WS2_32 ref: 00F94F75
                                                                                                            • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 00F94FF3
                                                                                                            • recv.WS2_32(00000000,0000000C,00000008), ref: 00F95014
                                                                                                            • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?), ref: 00F950B0
                                                                                                            • recv.WS2_32(00000000,?,00000008), ref: 00F950CB
                                                                                                              • Part of subcall function 00F95940: WSAStartup.WS2_32 ref: 00F9596A
                                                                                                              • Part of subcall function 00F95940: getaddrinfo.WS2_32(?,?,?, |), ref: 00F959EC
                                                                                                              • Part of subcall function 00F95940: socket.WS2_32(?,?,?), ref: 00F95A0D
                                                                                                              • Part of subcall function 00F95940: connect.WS2_32(00000000,01026B31,?), ref: 00F95A21
                                                                                                              • Part of subcall function 00F95940: closesocket.WS2_32(00000000), ref: 00F95A2D
                                                                                                              • Part of subcall function 00F95940: FreeAddrInfoW.WS2_32(?), ref: 00F95A3A
                                                                                                              • Part of subcall function 00F95940: WSACleanup.WS2_32 ref: 00F95A40
                                                                                                            • recv.WS2_32(?,00000004,00000008), ref: 00F951D3
                                                                                                            • __Xtime_get_ticks.LIBCPMT ref: 00F951DA
                                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F951E8
                                                                                                            • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 00F95261
                                                                                                            • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 00F95269
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: recv$Sleepsetsockopt$AddrCleanupErrorFreeInfoLastStartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectgetaddrinfosocket
                                                                                                            • String ID: |
                                                                                                            • API String ID: 3089209366-1327881656
                                                                                                            • Opcode ID: fad7286ff40069ccb4a10a7126c5e984344ef0d3dc4316e0999fe464bcf3cf48
                                                                                                            • Instruction ID: 6ee0878d08dfe24425b2504b10445b220ab5b62cd90539330f0ff5e9f0438d5b
                                                                                                            • Opcode Fuzzy Hash: fad7286ff40069ccb4a10a7126c5e984344ef0d3dc4316e0999fe464bcf3cf48
                                                                                                            • Instruction Fuzzy Hash: C8B18CB1D00308DFEF25DFA4CC49BAEBBB5BB45710F204219E494AB2D2D77A5984DB81
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 56 f95940-f95972 WSAStartup 57 f95978-f959a2 call fb77d0 * 2 56->57 58 f95a46-f95a4f 56->58 63 f959ae-f959f4 getaddrinfo 57->63 64 f959a4-f959a8 57->64 65 f95a40 WSACleanup 63->65 66 f959f6-f959fc 63->66 64->58 64->63 65->58 67 f959fe 66->67 68 f95a54-f95a5e FreeAddrInfoW 66->68 69 f95a04-f95a18 socket 67->69 68->65 70 f95a60-f95a68 68->70 69->65 71 f95a1a-f95a2a connect 69->71 72 f95a2c-f95a34 closesocket 71->72 73 f95a50 71->73 72->69 74 f95a36-f95a3a FreeAddrInfoW 72->74 73->68 74->65
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddrFreeInfo$CleanupStartupclosesocketconnectgetaddrinfosocket
                                                                                                            • String ID: |
                                                                                                            • API String ID: 448659506-1327881656
                                                                                                            • Opcode ID: 3f92dbbb1762c88d0249a46ef7e13eec5947024b36e0c5caa2ef293fc3734f8f
                                                                                                            • Instruction ID: 1b6d2f59a97e5231b2a506efa6c9ed691a97c5919bb6ee67363efa3fecd4bcea
                                                                                                            • Opcode Fuzzy Hash: 3f92dbbb1762c88d0249a46ef7e13eec5947024b36e0c5caa2ef293fc3734f8f
                                                                                                            • Instruction Fuzzy Hash: DA31F272A04700AFE7319F64DC84A6BBBE4FB85B34F20471DF8A593190D77998049B96
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 75 ed9280-ed92dd call ee63b0 78 ed9413-ed9521 call ed2df0 call fb77d0 75->78 79 ed92e3-ed92e9 75->79 95 ed9537-ed953f call ee8dc0 78->95 96 ed9523-ed9535 78->96 80 ed92f0-ed9313 79->80 82 ed9315-ed931f 80->82 83 ed9324-ed9331 80->83 85 ed9403-ed9406 82->85 86 ed9333-ed933d 83->86 87 ed9342-ed934f 83->87 89 ed9409-ed940d 85->89 86->85 90 ed9351-ed935b 87->90 91 ed9360-ed936d 87->91 89->78 89->80 90->85 93 ed936f-ed9379 91->93 94 ed937e-ed938b 91->94 93->85 97 ed938d-ed9397 94->97 98 ed9399-ed93a6 94->98 99 ed9544-ed9597 call fb77d0 * 2 95->99 96->99 97->85 101 ed93a8-ed93b2 98->101 102 ed93b4-ed93c1 98->102 112 ed9599-ed95c8 call fb77d0 call f05260 99->112 113 ed95cb-ed95e1 call fb77d0 99->113 101->85 104 ed93cf-ed93dc 102->104 105 ed93c3-ed93cd 102->105 107 ed93de-ed93e8 104->107 108 ed93ea-ed93f4 104->108 105->85 107->85 108->89 111 ed93f6-ed93ff 108->111 111->85 112->113 119 ed95e7-ed95ed 113->119 120 ed96e2 113->120 122 ed95f0-ed96ce GetModuleHandleA GetProcAddress WSASend 119->122 123 ed96e6-ed96f0 120->123 124 ed975f-ed9763 122->124 125 ed96d4-ed96dc 122->125 126 ed971e-ed973d 123->126 127 ed96f2-ed96fe 123->127 124->123 125->120 125->122 130 ed976f-ed9796 126->130 131 ed973f-ed974b 126->131 128 ed9714-ed971b call f038e3 127->128 129 ed9700-ed970e 127->129 128->126 129->128 132 ed9797-ed97fe call f08c60 call ed2df0 * 2 129->132 134 ed974d-ed975b 131->134 135 ed9765-ed976c call f038e3 131->135 134->132 137 ed975d 134->137 135->130 137->135
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(Ws2_32.dll,?,?,?,?,0101A4DC,00000000,76A923A0,-01056880), ref: 00ED96A6
                                                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00ED96B4
                                                                                                            • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,0101A4DC,00000000,76A923A0,-01056880), ref: 00ED96C9
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressHandleModuleProcSend
                                                                                                            • String ID: 4oST$4oST$Ws2_32.dll
                                                                                                            • API String ID: 2819740048-1839276265
                                                                                                            • Opcode ID: 2fc832f71983803c1597ec99cdc80afd3677883d924af9eaca6477891b20dd51
                                                                                                            • Instruction ID: c00b02764ee0d9cb96d8d50463cf236962bcc9d733b9e31f1c4b11f8cf2b7e13
                                                                                                            • Opcode Fuzzy Hash: 2fc832f71983803c1597ec99cdc80afd3677883d924af9eaca6477891b20dd51
                                                                                                            • Instruction Fuzzy Hash: 3A02CA70E04288DFDF25CFA4CC907ADBBB0EF55314F24428AE4897B686D7741986CB92
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 146 f18def-f18e03 call f1e92e 149 f18e05-f18e07 146->149 150 f18e09-f18e11 146->150 151 f18e57-f18e77 call f1e89d 149->151 152 f18e13-f18e1a 150->152 153 f18e1c-f18e1f 150->153 161 f18e89 151->161 162 f18e79-f18e87 call f116b8 151->162 152->153 155 f18e27-f18e3b call f1e92e * 2 152->155 156 f18e21-f18e25 153->156 157 f18e3d-f18e4d call f1e92e FindCloseChangeNotification 153->157 155->149 155->157 156->155 156->157 157->149 165 f18e4f-f18e55 GetLastError 157->165 167 f18e8b-f18e8e 161->167 162->167 165->151
                                                                                                            APIs
                                                                                                            • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,00F18CD6,00000000,?,01047178,0000000C,00F18D92,?,?,?), ref: 00F18E45
                                                                                                            • GetLastError.KERNEL32(?,00F18CD6,00000000,?,01047178,0000000C,00F18D92,?,?,?), ref: 00F18E4F
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ChangeCloseErrorFindLastNotification
                                                                                                            • String ID: P_~
                                                                                                            • API String ID: 1687624791-425978370
                                                                                                            • Opcode ID: 101f13fc55416583588492c7f093d342f4cef8cf76a55bb91e4d4b4b521208e5
                                                                                                            • Instruction ID: 5a9d035aee1f638bb5dd8549b51c6e42aeaca5887d08a464496c7f28bb4eb8eb
                                                                                                            • Opcode Fuzzy Hash: 101f13fc55416583588492c7f093d342f4cef8cf76a55bb91e4d4b4b521208e5
                                                                                                            • Instruction Fuzzy Hash: 6B110C33F041145AD73526B45E45BEE37498B827B4F29065DFD14971C2DF2A9CC2A390
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 229 f19779-f1979b 230 f197a1-f197a3 229->230 231 f1998e 229->231 232 f197a5-f197c4 call f08bd3 230->232 233 f197cf-f197f2 230->233 234 f19990-f19994 231->234 242 f197c7-f197ca 232->242 236 f197f4-f197f6 233->236 237 f197f8-f197fe 233->237 236->237 238 f19800-f19811 236->238 237->232 237->238 240 f19813-f19821 call f1262d 238->240 241 f19824-f19834 call f192be 238->241 240->241 247 f19836-f1983c 241->247 248 f1987d-f1988f 241->248 242->234 251 f19865-f1987b call f18e8f 247->251 252 f1983e-f19841 247->252 249 f19891-f19897 248->249 250 f198e6-f19906 WriteFile 248->250 253 f198d2-f198e4 call f1933b 249->253 254 f19899-f1989c 249->254 257 f19911 250->257 258 f19908-f1990e GetLastError 250->258 267 f1985e-f19860 251->267 255 f19843-f19846 252->255 256 f1984c-f1985b call f19256 252->256 279 f198b9-f198bc 253->279 262 f198be-f198d0 call f194ff 254->262 263 f1989e-f198a1 254->263 255->256 264 f19926-f19929 255->264 256->267 261 f19914-f1991f 257->261 258->257 268 f19921-f19924 261->268 269 f19989-f1998c 261->269 262->279 270 f1992c-f1992e 263->270 271 f198a7-f198b4 call f19416 263->271 264->270 267->261 268->264 269->234 275 f19930-f19935 270->275 276 f1995c-f19968 270->276 271->279 280 f19937-f19949 275->280 281 f1994e-f19957 call f116b8 275->281 282 f19972-f19984 276->282 283 f1996a-f19970 276->283 279->267 280->242 281->242 282->242 283->231 283->282
                                                                                                            APIs
                                                                                                              • Part of subcall function 00F18E8F: GetConsoleOutputCP.KERNEL32(20A5FAC5,00000000,00000000,?), ref: 00F18EF2
                                                                                                            • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00F198FE
                                                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00F19908
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ConsoleErrorFileLastOutputWrite
                                                                                                            • String ID:
                                                                                                            • API String ID: 2915228174-0
                                                                                                            • Opcode ID: a736ad410096c7d8c148a8f4fee489fab0a6424d52412cbf16ff1d4bb9145126
                                                                                                            • Instruction ID: 11ad37bc09ebfc4ef843081fde40d1adbb0840a4fd1834d1c3e73c2e45e1db2d
                                                                                                            • Opcode Fuzzy Hash: a736ad410096c7d8c148a8f4fee489fab0a6424d52412cbf16ff1d4bb9145126
                                                                                                            • Instruction Fuzzy Hash: EC61D772D08109AFDF11CFA8CC54AEEBFB9AF09324F540149E900A7246D7B6D981EBD0
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 286 f1250c-f12524 call f1e92e 289 f12526-f1252d 286->289 290 f1253a-f12550 SetFilePointerEx 286->290 291 f12534-f12538 289->291 292 f12552-f12563 GetLastError call f116b8 290->292 293 f12565-f1256f 290->293 295 f1258b-f1258e 291->295 292->291 293->291 294 f12571-f12586 293->294 294->295
                                                                                                            APIs
                                                                                                            • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,00F12616,?,?,?,?,?), ref: 00F12548
                                                                                                            • GetLastError.KERNEL32(?,?,?,?,00F12616,?,?,?,?,?,00000000,?,00000000), ref: 00F12555
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorFileLastPointer
                                                                                                            • String ID:
                                                                                                            • API String ID: 2976181284-0
                                                                                                            • Opcode ID: c1a0e914533cbc966826e82253559f34e8c2e50a54baea17ca8e78d7fc351676
                                                                                                            • Instruction ID: 407e71170334591e41142adc7349e33f424622507591fbb80fb4aae04bacbd84
                                                                                                            • Opcode Fuzzy Hash: c1a0e914533cbc966826e82253559f34e8c2e50a54baea17ca8e78d7fc351676
                                                                                                            • Instruction Fuzzy Hash: 2201D633A10115AFCF158F99DC959DE3F2AEB85330B280208F8119B291EA76ED91DB90
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 298 ed32d0-ed32e0 299 ed3306-ed3308 298->299 300 ed32e2-ed32e7 298->300 303 ed3318-ed331e 299->303 304 ed330a-ed3317 call f03662 299->304 301 ed331f call ed2b50 300->301 302 ed32e9-ed32ea call f03662 300->302 309 ed3324-ed3329 call f08c60 301->309 310 ed32ef-ed32f6 302->310 310->309 312 ed32f8-ed3305 310->312
                                                                                                            APIs
                                                                                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00ED331F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Concurrency::cancel_current_task
                                                                                                            • String ID:
                                                                                                            • API String ID: 118556049-0
                                                                                                            • Opcode ID: 88e0f75f83d5f9e69285ef2088a1dfdc1055322beeb667a90db4e8c6ac7f301f
                                                                                                            • Instruction ID: 211cd79f7811f6e27f274889e89f75c2ec154982147514a45b85b482f2ad571e
                                                                                                            • Opcode Fuzzy Hash: 88e0f75f83d5f9e69285ef2088a1dfdc1055322beeb667a90db4e8c6ac7f301f
                                                                                                            • Instruction Fuzzy Hash: D6F024321001049BCB146F74D9158E9B3E8EF243A1710093BE89CE7392EB2ADA529781
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 314 f1a64c-f1a657 315 f1a665-f1a66b 314->315 316 f1a659-f1a663 314->316 318 f1a684-f1a695 RtlAllocateHeap 315->318 319 f1a66d-f1a66e 315->319 316->315 317 f1a699-f1a6a4 call f116ef 316->317 325 f1a6a6-f1a6a8 317->325 321 f1a670-f1a677 call f18270 318->321 322 f1a697 318->322 319->318 321->317 327 f1a679-f1a682 call f15a79 321->327 322->325 327->317 327->318
                                                                                                            APIs
                                                                                                            • RtlAllocateHeap.NTDLL(00000008,?,00000001), ref: 00F1A68D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AllocateHeap
                                                                                                            • String ID:
                                                                                                            • API String ID: 1279760036-0
                                                                                                            • Opcode ID: 49d3068747d3414ebef74c10cc64a00f7e67ace3a6d440b451d5f6f106f1df09
                                                                                                            • Instruction ID: afcb2587f01a3efd73c6f10dbb9e1f0333317dc83463465c310e65931464a0a4
                                                                                                            • Opcode Fuzzy Hash: 49d3068747d3414ebef74c10cc64a00f7e67ace3a6d440b451d5f6f106f1df09
                                                                                                            • Instruction Fuzzy Hash: DAF0E937A026216F9B325E629C05BDB3748AF41770B1D4111F808DB190DE39DC80B6E2
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 330 f1b086-f1b092 331 f1b0c4-f1b0cf call f116ef 330->331 332 f1b094-f1b096 330->332 339 f1b0d1-f1b0d3 331->339 334 f1b098-f1b099 332->334 335 f1b0af-f1b0c0 RtlAllocateHeap 332->335 334->335 336 f1b0c2 335->336 337 f1b09b-f1b0a2 call f18270 335->337 336->339 337->331 342 f1b0a4-f1b0ad call f15a79 337->342 342->331 342->335
                                                                                                            APIs
                                                                                                            • RtlAllocateHeap.NTDLL(00000000,00000001,?), ref: 00F1B0B8
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AllocateHeap
                                                                                                            • String ID:
                                                                                                            • API String ID: 1279760036-0
                                                                                                            • Opcode ID: cd077b5b0217d9e91daf39d34ee34c3aa6702ff7cf1baa4aa5a9caad7227e7be
                                                                                                            • Instruction ID: 4f36a11fa896d002bfbf2c9827f2a7ad140a570b3dbcb770fd812caa962c7e0f
                                                                                                            • Opcode Fuzzy Hash: cd077b5b0217d9e91daf39d34ee34c3aa6702ff7cf1baa4aa5a9caad7227e7be
                                                                                                            • Instruction Fuzzy Hash: 8DE03032601611EAEA312A759C047DB3649AF457B0B150161FE65970C1DF298CC0B2E1
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 380 11ceb8c-11ceb97 381 11ceb99-11ceb9e 380->381 382 11ceba0-11ceba3 380->382 383 11cebaa-11cebbe VirtualAlloc 381->383 382->383 384 11ceba5 382->384 384->383
                                                                                                            APIs
                                                                                                            • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 011CEBB7
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmp, Offset: 01077000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AllocVirtual
                                                                                                            • String ID:
                                                                                                            • API String ID: 4275171209-0
                                                                                                            • Opcode ID: 4047af8941ca93394774f1f7c66d6b6e33ffd6915764e1227402051d9074d677
                                                                                                            • Instruction ID: fc7b595d79e10628012d624b7ea43d260e4e4a5437d3d4e2d03403be97166e43
                                                                                                            • Opcode Fuzzy Hash: 4047af8941ca93394774f1f7c66d6b6e33ffd6915764e1227402051d9074d677
                                                                                                            • Instruction Fuzzy Hash: E9E0E2B6310208ABDF24CE8CD889BAB379DEB98A11F108415FA0AD7209C234E8508775
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • VirtualAllocEx.KERNEL32(00000000,00000000,?,00003000,00000040), ref: 00F9C6A1
                                                                                                            • WriteProcessMemory.KERNEL32(00000000,00000000,?,?,00000000), ref: 00F9C6BD
                                                                                                            • WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 00F9C6F2
                                                                                                            • VirtualAllocEx.KERNEL32(?,00000000,00001000,00003000,00000040), ref: 00F9C71B
                                                                                                            • WriteProcessMemory.KERNEL32(?,00000000,?,00000218,00000000), ref: 00F9C8BF
                                                                                                            • WriteProcessMemory.KERNEL32(?,00000218,00F9C990,-00000010,00000000), ref: 00F9C8E1
                                                                                                            • CreateRemoteThread.KERNEL32(?,00000000,00000000,00000218,00000000,00000000,00000000), ref: 00F9C8F4
                                                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00F9C8FD
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MemoryProcessWrite$AllocVirtual$CreateObjectRemoteSingleThreadWait
                                                                                                            • String ID: |$%s|%s$131$4oST
                                                                                                            • API String ID: 2137838514-3610217710
                                                                                                            • Opcode ID: 861dfe84e5a2469447c112ee7da6f8290a1ef8b59b62192f7aaf1d746a0320df
                                                                                                            • Instruction ID: 5b861f30042639bc8c30da544ac5cf4529b05617526bbe125ad9cecc75398c55
                                                                                                            • Opcode Fuzzy Hash: 861dfe84e5a2469447c112ee7da6f8290a1ef8b59b62192f7aaf1d746a0320df
                                                                                                            • Instruction Fuzzy Hash: 6DB18BB0D00208DFDB24CFA8CC85BAEBBB5FF48300F104259E549AB285D775A945DFA5
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002,00000000,?,?,?,00F235F3,?,?), ref: 00F2337A
                                                                                                            • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002,00000000,?,?,?,00F235F3,?,?), ref: 00F233A3
                                                                                                            • GetACP.KERNEL32(?,?,00F235F3,?,?), ref: 00F233B8
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: InfoLocale
                                                                                                            • String ID: ACP$OCP
                                                                                                            • API String ID: 2299586839-711371036
                                                                                                            • Opcode ID: 82a74d017eaf5cc65b39651922fb16b592f111ab93bea56e51182788fd2304ca
                                                                                                            • Instruction ID: abe0171176a089999ff17370d760a9f4ed9c8068b1b0c2a23e17862ed5f3ba2a
                                                                                                            • Opcode Fuzzy Hash: 82a74d017eaf5cc65b39651922fb16b592f111ab93bea56e51182788fd2304ca
                                                                                                            • Instruction Fuzzy Hash: 962195B2A00125EAD734CF19E905B9A73A6BB50B60B568464E945D7104EF3ADF40E350
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                              • Part of subcall function 00F19E32: GetLastError.KERNEL32(00000000,?,00F1F819), ref: 00F19E36
                                                                                                              • Part of subcall function 00F19E32: SetLastError.KERNEL32(00000000,00000000,00000001,00000007,000000FF), ref: 00F19ED8
                                                                                                            • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 00F235C5
                                                                                                            • IsValidCodePage.KERNEL32(?), ref: 00F23603
                                                                                                            • IsValidLocale.KERNEL32(?,00000001), ref: 00F23616
                                                                                                            • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00F2365E
                                                                                                            • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 00F23679
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                                            • String ID:
                                                                                                            • API String ID: 415426439-0
                                                                                                            • Opcode ID: 592856bc77bf46aaa8e97d1dd4a018bda346aa48a382079a159b49215a162029
                                                                                                            • Instruction ID: 69d2f6936431864b97926680b6b1ab4d4b2e8c8026d2dcf317bd00300415d3c7
                                                                                                            • Opcode Fuzzy Hash: 592856bc77bf46aaa8e97d1dd4a018bda346aa48a382079a159b49215a162029
                                                                                                            • Instruction Fuzzy Hash: 7F5162B1E00226ABDB20DFA5EC46EBA77B8AF08710F180469E504E7140DB79DB44AB61
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                              • Part of subcall function 00F19E32: GetLastError.KERNEL32(00000000,?,00F1F819), ref: 00F19E36
                                                                                                              • Part of subcall function 00F19E32: SetLastError.KERNEL32(00000000,00000000,00000001,00000007,000000FF), ref: 00F19ED8
                                                                                                            • GetACP.KERNEL32(?,?,?,?,?,?,00F172F0,?,?,?,?,?,-00000050,?,?,?), ref: 00F22C07
                                                                                                            • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00F172F0,?,?,?,?,?,-00000050,?,?), ref: 00F22C3E
                                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00F22DA1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$CodeInfoLocalePageValid
                                                                                                            • String ID: utf8
                                                                                                            • API String ID: 607553120-905460609
                                                                                                            • Opcode ID: 2c407024d4af695ea9e6f10c907f0e1b455eb99f04ba3f96162332132f6fb1f7
                                                                                                            • Instruction ID: 0b84c8fda85aaa1207f92cd817fb120d2bb13be7ed772373492de91cb7bc9fe9
                                                                                                            • Opcode Fuzzy Hash: 2c407024d4af695ea9e6f10c907f0e1b455eb99f04ba3f96162332132f6fb1f7
                                                                                                            • Instruction Fuzzy Hash: 44711C35A00326BADB74AF74EC82FBA73A8EF44720F544429F945D7181EB78E940E760
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: d832fe2a0f42001a57c9b2c34ab75cd1b9a187cae735d2738bff895b2773b599
                                                                                                            • Instruction ID: 965086ac0b38eed6816fbb937855bed4742130407901d10d9f4492370dff099b
                                                                                                            • Opcode Fuzzy Hash: d832fe2a0f42001a57c9b2c34ab75cd1b9a187cae735d2738bff895b2773b599
                                                                                                            • Instruction Fuzzy Hash: CD023C71E012199BDF14CFA9D9806AEFBF1FF48324F248269D919E7381D731A941EB90
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • RtlDecodePointer.NTDLL(?), ref: 00F279EC
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: DecodePointer
                                                                                                            • String ID: `-$acos$asin$exp$log$log10$pow$sqrt
                                                                                                            • API String ID: 3527080286-3258016019
                                                                                                            • Opcode ID: 5a862ee733c03b4010c3982e89660a5e0798c18e3d394bcc389eadaa6c7573e5
                                                                                                            • Instruction ID: 6f722c76beedb477189669f4bc2885495fb00a2fe7510cc17da0cff0f048cdf9
                                                                                                            • Opcode Fuzzy Hash: 5a862ee733c03b4010c3982e89660a5e0798c18e3d394bcc389eadaa6c7573e5
                                                                                                            • Instruction Fuzzy Hash: 0A51B071D0872ACBCF14BF68F8482ADBBB0FB85320F544184D481A7268CB798A65AF55
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00EEA09D
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00EEA0BF
                                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00EEA0E7
                                                                                                            • __Getctype.LIBCPMT ref: 00EEA1C5
                                                                                                            • std::_Facet_Register.LIBCPMT ref: 00EEA1F9
                                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00EEA223
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                                                                                            • String ID: PD$PG$E
                                                                                                            • API String ID: 1102183713-3756609794
                                                                                                            • Opcode ID: 9c2df188ab95fe905e8478ea0bcac27bc05840f87d17991198edfb1d1c3545a5
                                                                                                            • Instruction ID: deacb9ea31fb4b4d0c4d80f0ca52f41c151ccdbb139181dbd23e1733bd06b164
                                                                                                            • Opcode Fuzzy Hash: 9c2df188ab95fe905e8478ea0bcac27bc05840f87d17991198edfb1d1c3545a5
                                                                                                            • Instruction Fuzzy Hash: 29519BB0D01349DBCB21CF58C9457AEBBB4BB14314F18816DD885AB381D779AE44DBD2
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • _ValidateLocalCookies.LIBCMT ref: 00F072F7
                                                                                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 00F072FF
                                                                                                            • _ValidateLocalCookies.LIBCMT ref: 00F07388
                                                                                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 00F073B3
                                                                                                            • _ValidateLocalCookies.LIBCMT ref: 00F07408
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                            • String ID: `-$csm
                                                                                                            • API String ID: 1170836740-3034041616
                                                                                                            • Opcode ID: 1674b9b339ccec35e5dfa253cd5e11a6545cc6ec2ecdbe389fe01fc7b4baf0e5
                                                                                                            • Instruction ID: 13a367bd49ec94ec1951c238fc14eb3a30a9df9c450c99411aa1e5c9522df07e
                                                                                                            • Opcode Fuzzy Hash: 1674b9b339ccec35e5dfa253cd5e11a6545cc6ec2ecdbe389fe01fc7b4baf0e5
                                                                                                            • Instruction Fuzzy Hash: 4541A334E04309DBCF20EF68CC85A9EBBA5AF44324F148195EC189B392D775E915FB91
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00EEC45A
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00EEC47C
                                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00EEC4A4
                                                                                                            • std::_Facet_Register.LIBCPMT ref: 00EEC59A
                                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00EEC5C4
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                                                                            • String ID: E$PD
                                                                                                            • API String ID: 459529453-4195941332
                                                                                                            • Opcode ID: 98f2a2c7fbb4d011e879129468f07a2768d533663204f8835094bd7f025ac2e5
                                                                                                            • Instruction ID: 442b3aad8534b6fe10fdb1ab922b330f06c10957af4453e6269a3eab4c7b1fbc
                                                                                                            • Opcode Fuzzy Hash: 98f2a2c7fbb4d011e879129468f07a2768d533663204f8835094bd7f025ac2e5
                                                                                                            • Instruction Fuzzy Hash: 6D5193B0900299DFDB21DF98C954BAEBBF0FB00314F248159E4556B381D77AAA06DBD1
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _strrchr
                                                                                                            • String ID:
                                                                                                            • API String ID: 3213747228-0
                                                                                                            • Opcode ID: 88e4da6258101c5fc24b34185784eb547dfa0330ad300027970d950eece25734
                                                                                                            • Instruction ID: 8292fd284351b9f5d5e1086bc22a14787f10cc715afcb5b2d426583c4b6c667e
                                                                                                            • Opcode Fuzzy Hash: 88e4da6258101c5fc24b34185784eb547dfa0330ad300027970d950eece25734
                                                                                                            • Instruction Fuzzy Hash: 98B14632E00365DFDB258F24CC82BEEBBA5EF59360F144155E904AF282D774D981E7A0
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • FreeLibrary.KERNEL32(00000000,?,00F1B47F,?,?,00000000,00000001,?,?,00F1B6A9,00000022,FlsSetValue,0102EB88,0102EB90,00000001), ref: 00F1B431
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FreeLibrary
                                                                                                            • String ID: api-ms-$ext-ms-
                                                                                                            • API String ID: 3664257935-537541572
                                                                                                            • Opcode ID: 06bb89a81a6c1e979f2647cce99ef22564dc967ab0f0d7e88c0554fce6907eab
                                                                                                            • Instruction ID: 4d1a72a608376819229a9a5759beee0f76497438d3c627c42544506fe3b8aab3
                                                                                                            • Opcode Fuzzy Hash: 06bb89a81a6c1e979f2647cce99ef22564dc967ab0f0d7e88c0554fce6907eab
                                                                                                            • Instruction Fuzzy Hash: BD21D232E41221EBCB31DF65DC41ADB3758DB41770F244224E855A7286DB35ED90E7D0
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,20A5FAC5,?,?,00000000,0101E6D5,000000FF,?,00F135FF,?,?,00F135D3,00000016), ref: 00F13658
                                                                                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00F1366A
                                                                                                            • FreeLibrary.KERNEL32(00000000,?,00000000,0101E6D5,000000FF,?,00F135FF,?,?,00F135D3,00000016), ref: 00F1368C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                            • String ID: CorExitProcess$`-$mscoree.dll
                                                                                                            • API String ID: 4061214504-1261224117
                                                                                                            • Opcode ID: 17d530b21b348772e8e68526ae3a2405fc4fcf4dbaeb4836c140ce7510d07034
                                                                                                            • Instruction ID: dbd225b1bebb7d3e8372a11e60a64b3363f0d2961e77b92a066493a44535c0f1
                                                                                                            • Opcode Fuzzy Hash: 17d530b21b348772e8e68526ae3a2405fc4fcf4dbaeb4836c140ce7510d07034
                                                                                                            • Instruction Fuzzy Hash: 0401DB31A44729FFCB218F55DC09FAEB7B8FB04B64F104529F851A2694DBB99E00CB40
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: 191.96.150.225$4oST$4oST$4oST
                                                                                                            • API String ID: 0-2793144940
                                                                                                            • Opcode ID: d78431c4f173b46f3c3ba5b787b69808896c4e00d65c1ac2ec14d1bb3b853307
                                                                                                            • Instruction ID: e7027a46aa1f5d3a43d52d64bf40110e3e820eaac5e416926e4f903c8553f4e3
                                                                                                            • Opcode Fuzzy Hash: d78431c4f173b46f3c3ba5b787b69808896c4e00d65c1ac2ec14d1bb3b853307
                                                                                                            • Instruction Fuzzy Hash: 6002F170D04288DEEF15DFA8C9457DEBBB0AB14304F648099E8457B382D7B55E88DBA2
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • __EH_prolog3.LIBCMT ref: 00F02720
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00F0272B
                                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00F02799
                                                                                                              • Part of subcall function 00F0287C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00F02894
                                                                                                            • std::locale::_Setgloballocale.LIBCPMT ref: 00F02746
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                                                                                            • String ID: `-
                                                                                                            • API String ID: 677527491-2038111592
                                                                                                            • Opcode ID: a9150a04b1540db7bbfa24661fca4c91e4e8d09dbbfefc9513da4f47a721a7ea
                                                                                                            • Instruction ID: d0126d4e08999580690f8b9970cf09734ba60641ebbe245d06c2a1c6c5183f4d
                                                                                                            • Opcode Fuzzy Hash: a9150a04b1540db7bbfa24661fca4c91e4e8d09dbbfefc9513da4f47a721a7ea
                                                                                                            • Instruction Fuzzy Hash: 2D01BC79A00221DBC71AEB20D84957E77A5FF84750B18804AE845573C6CFBCAA02FB91
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 00F02BCC
                                                                                                            • RtlAcquireSRWLockExclusive.NTDLL(00000008), ref: 00F02BEB
                                                                                                            • RtlAcquireSRWLockExclusive.NTDLL(00000008), ref: 00F02C19
                                                                                                            • RtlTryAcquireSRWLockExclusive.NTDLL(00000008), ref: 00F02C74
                                                                                                            • RtlTryAcquireSRWLockExclusive.NTDLL(00000008), ref: 00F02C8B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AcquireExclusiveLock$CurrentThread
                                                                                                            • String ID:
                                                                                                            • API String ID: 66001078-0
                                                                                                            • Opcode ID: bda4bc55ecc271cce9c22c3261cd455c453a1c79d1bfb27d879d50a840e6589e
                                                                                                            • Instruction ID: 26fff1fa150eda82dfa4a96f56ed89eaee9e107b56dd628967e1ce3d7393b778
                                                                                                            • Opcode Fuzzy Hash: bda4bc55ecc271cce9c22c3261cd455c453a1c79d1bfb27d879d50a840e6589e
                                                                                                            • Instruction Fuzzy Hash: 66413C31A0060ADBEB61CF69C58896EB3B8FF09370B608929D446D7680D735E984FB71
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • ___std_exception_destroy.LIBVCRUNTIME ref: 00ED750C
                                                                                                            • ___std_exception_destroy.LIBVCRUNTIME ref: 00ED7522
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ___std_exception_destroy
                                                                                                            • String ID: )$[json.exception.
                                                                                                            • API String ID: 4194217158-1768919221
                                                                                                            • Opcode ID: bc67657c03e45bef553fa49a0b1686069d411c669a4a5ff101fa639903057645
                                                                                                            • Instruction ID: 9544c63f198ff8ddb406a4da1cfffb7d29a0c210cb79a55dc377874d00996986
                                                                                                            • Opcode Fuzzy Hash: bc67657c03e45bef553fa49a0b1686069d411c669a4a5ff101fa639903057645
                                                                                                            • Instruction Fuzzy Hash: 6A51DFB1D04688DFDB00DFA8C905B9EBBF4EF51314F14426DE850AB382E7B85A44D7A1
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00ED499F
                                                                                                              • Part of subcall function 00F051EB: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,76A923A0,?,00F01CF9,?,010469D8,76A923A0,?,76A923A0,-01056880), ref: 00F0524B
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ExceptionIos_base_dtorRaisestd::ios_base::_
                                                                                                            • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                            • API String ID: 1903096808-1866435925
                                                                                                            • Opcode ID: 70392d6e5e0c9c9ad2c6c52a4f1463cdb4ec05ad5c66c235a1f7da3a7e39e9d1
                                                                                                            • Instruction ID: 90caeb077ad6baf0ab23b9a98f579622d2de92f28fb51d477fa6cbc31d59b16f
                                                                                                            • Opcode Fuzzy Hash: 70392d6e5e0c9c9ad2c6c52a4f1463cdb4ec05ad5c66c235a1f7da3a7e39e9d1
                                                                                                            • Instruction Fuzzy Hash: EF1159B29046446BCB10DF5DCC02B96739CE744710F04461AF998A73C1EB35A901D792
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • GetConsoleOutputCP.KERNEL32(20A5FAC5,00000000,00000000,?), ref: 00F18EF2
                                                                                                              • Part of subcall function 00F1EC43: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00F1A854,?,00000000,-00000008), ref: 00F1ECA4
                                                                                                            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00F19144
                                                                                                            • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00F1918A
                                                                                                            • GetLastError.KERNEL32 ref: 00F1922D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                                            • String ID:
                                                                                                            • API String ID: 2112829910-0
                                                                                                            • Opcode ID: e932309d9084d4854d4d9455985d1f467b889794c82efe5f262fa3ab53693b85
                                                                                                            • Instruction ID: 20b43516eaff8c362dd043f5227dfc3649131f47e9b07f3ba657bd2270b53b90
                                                                                                            • Opcode Fuzzy Hash: e932309d9084d4854d4d9455985d1f467b889794c82efe5f262fa3ab53693b85
                                                                                                            • Instruction Fuzzy Hash: 53D19E75D04248AFCF15CFA8C894AEDBBB5FF09310F24456AE45AEB341D770A982DB90
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • WriteConsoleW.KERNEL32(?,?,?,00000000,?,?,00F23DBC,?,00000001,?,?,?,00F19281,?,00000000,00000000), ref: 00F26D39
                                                                                                            • GetLastError.KERNEL32(?,00F23DBC,?,00000001,?,?,?,00F19281,?,00000000,00000000,?,?,?,00F1985B,?), ref: 00F26D45
                                                                                                              • Part of subcall function 00F26D0B: CloseHandle.KERNEL32(FFFFFFFE,00F26D55,?,00F23DBC,?,00000001,?,?,?,00F19281,?,00000000,00000000,?,?), ref: 00F26D1B
                                                                                                            • ___initconout.LIBCMT ref: 00F26D55
                                                                                                              • Part of subcall function 00F26CCD: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00F26CFC,00F23DA9,?,?,00F19281,?,00000000,00000000,?), ref: 00F26CE0
                                                                                                            • WriteConsoleW.KERNEL32(?,?,?,00000000,?,00F23DBC,?,00000001,?,?,?,00F19281,?,00000000,00000000,?), ref: 00F26D6A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                                            • String ID:
                                                                                                            • API String ID: 2744216297-0
                                                                                                            • Opcode ID: a0f206abd5ceafdc87b7dc2b229ca4b9420c3302b91b56fe9b638eb50be51c6a
                                                                                                            • Instruction ID: 3a82a8ffe762f2f7baecbf4788d4fbf284e58c6e0228861067fa4e0c52f170e9
                                                                                                            • Opcode Fuzzy Hash: a0f206abd5ceafdc87b7dc2b229ca4b9420c3302b91b56fe9b638eb50be51c6a
                                                                                                            • Instruction Fuzzy Hash: 80F01C36640128FBCF332F91EC09A8A3F66EF083B1B104410FA4886520DA3B8C20EB91
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • ___std_exception_copy.LIBVCRUNTIME ref: 00ED3819
                                                                                                            • ___std_exception_destroy.LIBVCRUNTIME ref: 00ED38F0
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ___std_exception_copy___std_exception_destroy
                                                                                                            • String ID: )
                                                                                                            • API String ID: 2970364248-2934624886
                                                                                                            • Opcode ID: 690992b9fb7fc030c413dd110f1592885bfeed35f2f022f262cd3408bb90ecc9
                                                                                                            • Instruction ID: a645ee4dc1952db3092bcdd9601d6ca00439c0f5d8580dc55351a859b45b2cd5
                                                                                                            • Opcode Fuzzy Hash: 690992b9fb7fc030c413dd110f1592885bfeed35f2f022f262cd3408bb90ecc9
                                                                                                            • Instruction Fuzzy Hash: 9B6189B1C00258DFDB14CF98C844B9EFBB4FF18324F14825AE854AB682D7B95A44DBA1
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00ED499F
                                                                                                              • Part of subcall function 00F051EB: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,76A923A0,?,00F01CF9,?,010469D8,76A923A0,?,76A923A0,-01056880), ref: 00F0524B
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ExceptionIos_base_dtorRaisestd::ios_base::_
                                                                                                            • String ID: ios_base::badbit set$ios_base::failbit set
                                                                                                            • API String ID: 1903096808-1240500531
                                                                                                            • Opcode ID: b30f2f758f312465200f7dfc3edf6df6abfd946130e97f4d5d38bf436c9a2dee
                                                                                                            • Instruction ID: f1016421078fa87aebf298ce0fc182b9d53d5c1721b6ae68ffea73f2932dbdc4
                                                                                                            • Opcode Fuzzy Hash: b30f2f758f312465200f7dfc3edf6df6abfd946130e97f4d5d38bf436c9a2dee
                                                                                                            • Instruction Fuzzy Hash: E04101B1900248AFCB04DF58CC46BAEBBF8EB45710F14825EF454AB3C1DB759A01DBA1
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00ED4061
                                                                                                            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00ED40C4
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                                                                            • String ID: bad locale name
                                                                                                            • API String ID: 3988782225-1405518554
                                                                                                            • Opcode ID: a4323d80c2f3f878d8607007f3c8d0273f474ab8a97b616f079a961b875ad446
                                                                                                            • Instruction ID: 03393dcda8d14f95586f437f9f0c73e478f8acca2f641cbce3370ee6c7b4e0c3
                                                                                                            • Opcode Fuzzy Hash: a4323d80c2f3f878d8607007f3c8d0273f474ab8a97b616f079a961b875ad446
                                                                                                            • Instruction Fuzzy Hash: 3511D370805B84DED321CF68C90474BFFF4AF15714F14869DD09597B81D3B99A04D7A2
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • ___std_exception_copy.LIBVCRUNTIME ref: 00EE65C9
                                                                                                            • ___std_exception_copy.LIBVCRUNTIME ref: 00EE65FC
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ___std_exception_copy
                                                                                                            • String ID: )
                                                                                                            • API String ID: 2659868963-2934624886
                                                                                                            • Opcode ID: 814757037e5f316fe91600d1ef4577688e506ef0c6d66e8de91419e7252f90d5
                                                                                                            • Instruction ID: c3297941a8f8a9d42346c601b1068b77b4a50fdfc63bfab80b5ecac96ef49866
                                                                                                            • Opcode Fuzzy Hash: 814757037e5f316fe91600d1ef4577688e506ef0c6d66e8de91419e7252f90d5
                                                                                                            • Instruction Fuzzy Hash: B51130B5900758EFCB15CF99C980B86FBF8FF49720F10876AE9549BA41E774A540CBA0
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • ___std_exception_destroy.LIBVCRUNTIME ref: 00ED7A5C
                                                                                                            • ___std_exception_destroy.LIBVCRUNTIME ref: 00ED7A72
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ___std_exception_destroy
                                                                                                            • String ID: )
                                                                                                            • API String ID: 4194217158-2934624886
                                                                                                            • Opcode ID: 1f99f551c34034b1f3218ab23cae7dfd7684354d85880b8ee9bf81f168cb77f8
                                                                                                            • Instruction ID: 367f46a82ea203d57119bbff54ca0261c53fa8e0e00526900dcad18e8e68e5f4
                                                                                                            • Opcode Fuzzy Hash: 1f99f551c34034b1f3218ab23cae7dfd7684354d85880b8ee9bf81f168cb77f8
                                                                                                            • Instruction Fuzzy Hash: 97F06DB1805758EFC710DF98C90178DBBF8EB05B24F50066AE864A3780D77966048BA1
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • GetSystemTimePreciseAsFileTime.KERNEL32(?,00F03067,?,?,?,?,00F951DF), ref: 00F03645
                                                                                                            • GetSystemTimeAsFileTime.KERNEL32(?,20A5FAC5,00000000,?,0101E6F2,000000FF,?,00F03067,?,?,?,?,00F951DF), ref: 00F03649
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Time$FileSystem$Precise
                                                                                                            • String ID: `-
                                                                                                            • API String ID: 743729956-2038111592
                                                                                                            • Opcode ID: e408632424cae917eb82a7aaa64d2c77d78a76ca8d5cccae0efe7ceba3780cb6
                                                                                                            • Instruction ID: dd412f006dbc54d6c2dd8197b1f0f2c4cf77b5851c1838746c249d93f524b7b9
                                                                                                            • Opcode Fuzzy Hash: e408632424cae917eb82a7aaa64d2c77d78a76ca8d5cccae0efe7ceba3780cb6
                                                                                                            • Instruction Fuzzy Hash: BCF0E532A04664EFC7228F54E800F5EB7A8FB08F60F10412AE812D7784CB7AA900DF80
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • InitializeCriticalSectionAndSpinCount.KERNEL32(00000016,00000001,00F089C2,00000001,00000016,00F08BD1,?,?,?,?,?,00000000), ref: 00F1B826
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000006.00000002.3550635218.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000006.00000002.3550601085.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3550635218.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551098666.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000006.00000002.3551206124.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_6_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CountCriticalInitializeSectionSpin
                                                                                                            • String ID: InitializeCriticalSectionEx$`-
                                                                                                            • API String ID: 2593887523-2357131798
                                                                                                            • Opcode ID: 4bac6ec2d35737975f50f0c4d152465a7e01afdb46711eb89938686d23307b29
                                                                                                            • Instruction ID: 75df097798edd60650b3bbbc97edb11a6f3aff24193b1abb626c6bbced84df7f
                                                                                                            • Opcode Fuzzy Hash: 4bac6ec2d35737975f50f0c4d152465a7e01afdb46711eb89938686d23307b29
                                                                                                            • Instruction Fuzzy Hash: 25E09232681228FBCB312E51DC05EEE7F16EF08B70F008024F9195A521CBB65862FBD0
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Execution Graph

                                                                                                            Execution Coverage:4.5%
                                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                                            Signature Coverage:0%
                                                                                                            Total number of Nodes:1915
                                                                                                            Total number of Limit Nodes:34
                                                                                                            execution_graph 15211 f94eb0 15212 f9527c 15211->15212 15227 f94eee std::ios_base::_Ios_base_dtor __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 15211->15227 15213 f94f37 setsockopt recv WSAGetLastError 15213->15212 15213->15227 15215 f95267 Sleep 15215->15212 15215->15227 15217 f951c5 recv 15218 f9525f Sleep 15217->15218 15218->15215 15220 f94fdd recv 15221 f94ffe recv 15220->15221 15220->15227 15221->15227 15223 f95291 15330 f08c60 15223->15330 15225 f95086 setsockopt recv 15225->15227 15226 ee8dc0 43 API calls 15226->15225 15227->15213 15227->15215 15227->15217 15227->15218 15227->15223 15227->15225 15227->15226 15231 f95940 WSAStartup 15227->15231 15244 ee8dc0 15227->15244 15253 ee63b0 15227->15253 15258 f952a0 15227->15258 15317 f03059 15227->15317 15320 ed9280 15227->15320 15232 f95a46 15231->15232 15233 f95978 15231->15233 15232->15227 15233->15232 15234 f959ae getaddrinfo 15233->15234 15235 f95a40 WSACleanup 15234->15235 15236 f959f6 15234->15236 15235->15232 15237 f95a54 FreeAddrInfoW 15236->15237 15238 f95a04 socket 15236->15238 15237->15235 15239 f95a60 15237->15239 15238->15235 15240 f95a1a connect 15238->15240 15239->15227 15241 f95a2c closesocket 15240->15241 15242 f95a50 15240->15242 15241->15238 15243 f95a36 FreeAddrInfoW 15241->15243 15242->15237 15243->15235 15246 ee8de2 std::locale::_Setgloballocale 15244->15246 15247 ee8e11 15244->15247 15245 ee8ef8 15246->15220 15247->15245 15335 ed32d0 15247->15335 15249 ee8e66 std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 15250 ee8ecb std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 15249->15250 15349 ed2fe0 15249->15349 15250->15220 15252 ee8eb8 15252->15220 15255 ee63d8 15253->15255 15254 ee63e7 15254->15227 15255->15254 15256 ed32d0 std::_Throw_Cpp_error 43 API calls 15255->15256 15257 ee642a std::locale::_Locimp::_Locimp 15256->15257 15257->15227 15259 f9531c 15258->15259 15260 f952ee 15258->15260 15262 f9533e 15259->15262 15263 f95324 15259->15263 15261 ed2cf0 std::_Throw_Cpp_error 43 API calls 15260->15261 15264 f95300 15261->15264 15266 f95360 15262->15266 15267 f95346 15262->15267 15663 ee6290 15263->15663 15270 ed9280 46 API calls 15264->15270 15269 f95385 15266->15269 15271 f95368 15266->15271 15268 ee6290 43 API calls 15267->15268 15297 f95314 15268->15297 15272 f953ab 15269->15272 15273 f9538d 15269->15273 15270->15297 15274 ee6290 43 API calls 15271->15274 15271->15297 15276 f953cb 15272->15276 15277 f95670 15272->15277 15272->15297 15667 f112a7 15273->15667 15274->15297 15626 ed5400 15276->15626 15278 f95678 15277->15278 15279 f956cb 15277->15279 15704 eeb430 15278->15704 15282 f956d3 15279->15282 15283 f95726 15279->15283 15286 eeb430 56 API calls 15282->15286 15284 f9572e 15283->15284 15285 f95781 15283->15285 15287 eeb430 56 API calls 15284->15287 15288 f95789 15285->15288 15289 f957dc 15285->15289 15286->15297 15287->15297 15292 eeb430 56 API calls 15288->15292 15293 f95834 15289->15293 15294 f957e4 15289->15294 15292->15297 15293->15297 15711 f28af0 15293->15711 15295 eeb430 56 API calls 15294->15295 15295->15297 15297->15227 15299 f953f0 15300 f954bb 15299->15300 15313 f95629 15299->15313 15636 ed2cf0 15299->15636 15640 eeace0 15299->15640 15643 ed2d30 15300->15643 15304 f954f0 15305 f95562 GetCurrentProcess 15304->15305 15308 f95595 15304->15308 15306 ee63b0 std::_Throw_Cpp_error 43 API calls 15305->15306 15307 f9557e 15306->15307 15673 f9c630 VirtualAllocEx WriteProcessMemory 15307->15673 15660 f09810 15308->15660 15311 f9558d 15311->15313 15701 f02b9a 15313->15701 17712 f0360d 15317->17712 15321 ee63b0 std::_Throw_Cpp_error 43 API calls 15320->15321 15322 ed92d4 15321->15322 15323 ee8dc0 43 API calls 15322->15323 15324 ed9523 std::locale::_Locimp::_Locimp 15322->15324 15323->15324 15325 ed95f0 GetModuleHandleA GetProcAddress WSASend 15324->15325 15326 ed96e2 std::ios_base::_Ios_base_dtor 15324->15326 15325->15324 15325->15326 15327 ed975d std::ios_base::_Ios_base_dtor 15326->15327 15328 f08c60 std::_Throw_Cpp_error 41 API calls 15326->15328 15327->15227 15329 ed979c 15328->15329 15329->15227 15331 f08b9c ___std_exception_copy 41 API calls 15330->15331 15332 f08c6f 15331->15332 15333 f08c7d __Getctype 11 API calls 15332->15333 15334 f08c7c 15333->15334 15336 ed3306 15335->15336 15337 ed32e2 15335->15337 15340 ed3318 15336->15340 15343 f03662 std::_Facet_Register 43 API calls 15336->15343 15338 ed331f 15337->15338 15339 ed32e9 15337->15339 15365 ed2b50 15338->15365 15354 f03662 15339->15354 15340->15249 15345 ed3310 15343->15345 15344 ed32ef 15346 f08c60 std::_Throw_Cpp_error 41 API calls 15344->15346 15347 ed32f8 15344->15347 15345->15249 15348 ed3329 15346->15348 15347->15249 15350 ed3007 15349->15350 15351 ed3017 std::ios_base::_Ios_base_dtor 15349->15351 15350->15351 15352 f08c60 std::_Throw_Cpp_error 41 API calls 15350->15352 15351->15252 15353 ed3036 15352->15353 15356 f03667 15354->15356 15357 f03681 15356->15357 15360 ed2b50 Concurrency::cancel_current_task 15356->15360 15371 f123dc 15356->15371 15389 f15a79 15356->15389 15357->15344 15359 f0368d 15359->15359 15360->15359 15378 f051eb 15360->15378 15362 ed2b6c 15381 f04b05 15362->15381 15366 ed2b5e Concurrency::cancel_current_task 15365->15366 15367 f051eb Concurrency::cancel_current_task RaiseException 15366->15367 15368 ed2b6c 15367->15368 15369 f04b05 ___std_exception_copy 42 API calls 15368->15369 15370 ed2bac 15369->15370 15370->15344 15376 f1b086 __Getctype 15371->15376 15372 f1b0c4 15392 f116ef 15372->15392 15374 f1b0af RtlAllocateHeap 15375 f1b0c2 15374->15375 15374->15376 15375->15356 15376->15372 15376->15374 15377 f15a79 std::_Facet_Register 2 API calls 15376->15377 15377->15376 15379 f05232 RaiseException 15378->15379 15380 f05205 15378->15380 15379->15362 15380->15379 15382 f04b12 15381->15382 15388 ed2bac 15381->15388 15383 f123dc ___std_exception_copy 15 API calls 15382->15383 15382->15388 15384 f04b2f 15383->15384 15387 f04b3f 15384->15387 15516 f19995 15384->15516 15525 f11c86 15387->15525 15388->15344 15615 f15aa5 15389->15615 15395 f19f85 GetLastError 15392->15395 15394 f116f4 15394->15375 15396 f19fa1 15395->15396 15397 f19f9b 15395->15397 15401 f19fa5 SetLastError 15396->15401 15423 f1b68d 15396->15423 15418 f1b64e 15397->15418 15401->15394 15405 f19feb 15408 f1b68d __Getctype 6 API calls 15405->15408 15406 f19fda 15407 f1b68d __Getctype 6 API calls 15406->15407 15409 f19fe8 15407->15409 15410 f19ff7 15408->15410 15435 f1b00c 15409->15435 15411 f1a012 15410->15411 15412 f19ffb 15410->15412 15441 f19c60 15411->15441 15414 f1b68d __Getctype 6 API calls 15412->15414 15414->15409 15417 f1b00c ___std_exception_destroy 12 API calls 15417->15401 15446 f1b43b 15418->15446 15420 f1b66a 15421 f1b673 15420->15421 15422 f1b685 TlsGetValue 15420->15422 15421->15396 15424 f1b43b std::locale::_Setgloballocale 5 API calls 15423->15424 15425 f1b6a9 15424->15425 15426 f19fbd 15425->15426 15427 f1b6c7 TlsSetValue 15425->15427 15426->15401 15428 f1a64c 15426->15428 15433 f1a659 __Getctype 15428->15433 15429 f1a699 15432 f116ef ___std_exception_copy 13 API calls 15429->15432 15430 f1a684 RtlAllocateHeap 15431 f19fd2 15430->15431 15430->15433 15431->15405 15431->15406 15432->15431 15433->15429 15433->15430 15434 f15a79 std::_Facet_Register 2 API calls 15433->15434 15434->15433 15436 f1b041 15435->15436 15437 f1b017 HeapFree 15435->15437 15436->15401 15437->15436 15438 f1b02c GetLastError 15437->15438 15439 f1b039 ___std_exception_destroy 15438->15439 15440 f116ef ___std_exception_copy 12 API calls 15439->15440 15440->15436 15460 f19af4 15441->15460 15447 f1b46b 15446->15447 15451 f1b467 std::locale::_Setgloballocale 15446->15451 15447->15451 15452 f1b370 15447->15452 15450 f1b485 GetProcAddress 15450->15451 15451->15420 15458 f1b381 std::locale::_Setgloballocale 15452->15458 15453 f1b417 15453->15450 15453->15451 15454 f1b39f LoadLibraryExW 15455 f1b3ba GetLastError 15454->15455 15456 f1b41e 15454->15456 15455->15458 15456->15453 15457 f1b430 FreeLibrary 15456->15457 15457->15453 15458->15453 15458->15454 15459 f1b3ed LoadLibraryExW 15458->15459 15459->15456 15459->15458 15461 f19b00 std::locale::_Setgloballocale 15460->15461 15474 f1423b RtlEnterCriticalSection 15461->15474 15463 f19b0a 15475 f19b3a 15463->15475 15466 f19c06 15467 f19c12 std::locale::_Setgloballocale 15466->15467 15479 f1423b RtlEnterCriticalSection 15467->15479 15469 f19c1c 15480 f19de7 15469->15480 15471 f19c34 15484 f19c54 15471->15484 15474->15463 15478 f14283 RtlLeaveCriticalSection 15475->15478 15477 f19b28 15477->15466 15478->15477 15479->15469 15481 f19e1d __Getctype 15480->15481 15482 f19df6 __Getctype 15480->15482 15481->15471 15482->15481 15487 f22134 15482->15487 15515 f14283 RtlLeaveCriticalSection 15484->15515 15486 f19c42 15486->15417 15488 f221b4 15487->15488 15490 f2214a 15487->15490 15491 f1b00c ___std_exception_destroy 14 API calls 15488->15491 15514 f22202 15488->15514 15489 f222a5 __Getctype 14 API calls 15500 f22210 15489->15500 15490->15488 15492 f2217d 15490->15492 15496 f1b00c ___std_exception_destroy 14 API calls 15490->15496 15493 f221d6 15491->15493 15502 f1b00c ___std_exception_destroy 14 API calls 15492->15502 15513 f2219f 15492->15513 15494 f1b00c ___std_exception_destroy 14 API calls 15493->15494 15497 f221e9 15494->15497 15495 f1b00c ___std_exception_destroy 14 API calls 15498 f221a9 15495->15498 15501 f22172 15496->15501 15503 f1b00c ___std_exception_destroy 14 API calls 15497->15503 15504 f1b00c ___std_exception_destroy 14 API calls 15498->15504 15499 f22270 15505 f1b00c ___std_exception_destroy 14 API calls 15499->15505 15500->15499 15512 f1b00c 14 API calls ___std_exception_destroy 15500->15512 15506 f21438 __Getctype 14 API calls 15501->15506 15507 f22194 15502->15507 15508 f221f7 15503->15508 15504->15488 15509 f22276 15505->15509 15506->15492 15510 f21897 __Getctype 14 API calls 15507->15510 15511 f1b00c ___std_exception_destroy 14 API calls 15508->15511 15509->15481 15510->15513 15511->15514 15512->15500 15513->15495 15514->15489 15515->15486 15517 f199a3 15516->15517 15519 f199b1 15516->15519 15517->15519 15523 f199c9 15517->15523 15518 f116ef ___std_exception_copy 14 API calls 15520 f199b9 15518->15520 15519->15518 15528 f08c50 15520->15528 15522 f199c3 15522->15387 15523->15522 15524 f116ef ___std_exception_copy 14 API calls 15523->15524 15524->15520 15526 f1b00c ___std_exception_destroy 14 API calls 15525->15526 15527 f11c9e 15526->15527 15527->15388 15531 f08b9c 15528->15531 15532 f08bae ___std_exception_copy 15531->15532 15537 f08bd3 15532->15537 15534 f08bc6 15548 f0898c 15534->15548 15538 f08be3 15537->15538 15539 f08bea 15537->15539 15554 f089f1 GetLastError 15538->15554 15544 f08bf8 15539->15544 15558 f089c8 15539->15558 15542 f08c1f 15542->15544 15561 f08c7d IsProcessorFeaturePresent 15542->15561 15544->15534 15545 f08c4f 15546 f08b9c ___std_exception_copy 41 API calls 15545->15546 15547 f08c5c 15546->15547 15547->15534 15549 f08998 15548->15549 15550 f089af 15549->15550 15593 f08a37 15549->15593 15552 f08a37 ___std_exception_copy 41 API calls 15550->15552 15553 f089c2 15550->15553 15552->15553 15553->15522 15555 f08a0a 15554->15555 15565 f1a036 15555->15565 15559 f089d3 GetLastError SetLastError 15558->15559 15560 f089ec 15558->15560 15559->15542 15560->15542 15562 f08c89 15561->15562 15587 f08a54 15562->15587 15566 f1a04f 15565->15566 15567 f1a049 15565->15567 15568 f1b68d __Getctype 6 API calls 15566->15568 15571 f08a22 SetLastError 15566->15571 15569 f1b64e __Getctype 6 API calls 15567->15569 15570 f1a069 15568->15570 15569->15566 15570->15571 15572 f1a64c __Getctype 14 API calls 15570->15572 15571->15539 15573 f1a079 15572->15573 15574 f1a081 15573->15574 15575 f1a096 15573->15575 15576 f1b68d __Getctype 6 API calls 15574->15576 15577 f1b68d __Getctype 6 API calls 15575->15577 15579 f1a08d 15576->15579 15578 f1a0a2 15577->15578 15580 f1a0b5 15578->15580 15581 f1a0a6 15578->15581 15584 f1b00c ___std_exception_destroy 14 API calls 15579->15584 15583 f19c60 __Getctype 14 API calls 15580->15583 15582 f1b68d __Getctype 6 API calls 15581->15582 15582->15579 15585 f1a0c0 15583->15585 15584->15571 15586 f1b00c ___std_exception_destroy 14 API calls 15585->15586 15586->15571 15588 f08a70 std::locale::_Setgloballocale 15587->15588 15589 f08a9c IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15588->15589 15590 f08b6d std::locale::_Setgloballocale 15589->15590 15591 f03d67 _ValidateLocalCookies 5 API calls 15590->15591 15592 f08b8b GetCurrentProcess TerminateProcess 15591->15592 15592->15545 15594 f08a41 15593->15594 15595 f08a4a 15593->15595 15596 f089f1 ___std_exception_copy 16 API calls 15594->15596 15595->15550 15597 f08a46 15596->15597 15597->15595 15600 f141b6 15597->15600 15601 f1f60e std::locale::_Setgloballocale RtlEnterCriticalSection RtlLeaveCriticalSection 15600->15601 15602 f141bb 15601->15602 15603 f141c6 15602->15603 15604 f1f653 std::locale::_Setgloballocale 40 API calls 15602->15604 15605 f141d0 IsProcessorFeaturePresent 15603->15605 15609 f141ef 15603->15609 15604->15603 15607 f141dc 15605->15607 15606 f136d2 std::locale::_Setgloballocale 21 API calls 15611 f141f9 15606->15611 15608 f08a54 std::locale::_Setgloballocale 8 API calls 15607->15608 15608->15609 15609->15606 15610 f1b7e6 std::locale::_Setgloballocale 6 API calls 15610->15611 15611->15610 15612 f1422e 15611->15612 15613 f08a53 15611->15613 15614 f14252 __Getctype RtlDeleteCriticalSection 15612->15614 15614->15613 15616 f15ab1 std::locale::_Setgloballocale 15615->15616 15621 f1423b RtlEnterCriticalSection 15616->15621 15618 f15abc std::locale::_Setgloballocale 15622 f15af3 15618->15622 15621->15618 15625 f14283 RtlLeaveCriticalSection 15622->15625 15624 f15a84 15624->15356 15625->15624 15716 f02b89 15626->15716 15629 ed5410 15630 ed5419 15629->15630 15632 f02524 std::_Throw_Cpp_error 79 API calls 15629->15632 15630->15299 15633 ed5430 15632->15633 15727 f0952c 15633->15727 15637 ed2d13 15636->15637 15637->15637 15638 ed3040 std::_Throw_Cpp_error 43 API calls 15637->15638 15639 ed2d25 15638->15639 15639->15299 15641 eead10 15640->15641 15641->15641 16289 eefbf0 15641->16289 15644 ed3040 std::_Throw_Cpp_error 43 API calls 15643->15644 15645 ed2d55 15644->15645 15646 fa3670 15645->15646 15647 fa3708 15646->15647 15659 fa3711 std::locale::_Setgloballocale 15646->15659 16298 eee4b0 15647->16298 15650 fa38ff 15652 fa3903 15650->15652 16402 ee6130 15650->16402 15654 fa3930 std::ios_base::_Ios_base_dtor 15652->15654 15655 f08c60 std::_Throw_Cpp_error 41 API calls 15652->15655 15654->15304 15656 fa397e 15655->15656 15657 f03059 __Xtime_get_ticks 2 API calls 15656->15657 15658 fa3986 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 15657->15658 15658->15304 15659->15650 15659->15652 16321 fc1ae0 15659->16321 16332 ef4160 15659->16332 16498 f0974e 15660->16498 15664 ee629d 15663->15664 15665 ee62b1 15663->15665 15666 ee6130 43 API calls 15664->15666 15665->15297 15666->15665 15668 f112ba ___std_exception_copy 15667->15668 16549 f0d695 15668->16549 15670 f112d4 15671 f0898c ___std_exception_copy 41 API calls 15670->15671 15672 f112e1 15671->15672 15672->15297 15674 f9c70a VirtualAllocEx 15673->15674 15675 f9c6cd 15673->15675 15677 f9c77f std::locale::_Setgloballocale 15674->15677 15676 f9c6d3 WriteProcessMemory 15675->15676 15676->15676 15678 f9c707 15676->15678 16765 eeab20 15677->16765 15678->15674 15681 ee8f00 std::_Throw_Cpp_error 43 API calls 15682 f9c82f 15681->15682 16770 ed3440 15682->16770 15685 f9c91d 15686 f9c93b std::ios_base::_Ios_base_dtor 15685->15686 15687 f08c60 std::_Throw_Cpp_error 41 API calls 15685->15687 15686->15311 15688 f9c97e 15687->15688 15688->15311 15689 f11618 15690 f1162b ___std_exception_copy 15689->15690 17027 f113fa 15690->17027 15692 f11640 15693 f0898c ___std_exception_copy 41 API calls 15692->15693 15694 f1164d 15693->15694 15695 f0d098 15694->15695 15696 f0d0ab ___std_exception_copy 15695->15696 17197 f0cf73 15696->17197 15698 f0d0b7 15699 f0898c ___std_exception_copy 41 API calls 15698->15699 15700 f0d0c3 15699->15700 15700->15313 15702 f02bb4 15701->15702 15703 f02ba6 RtlReleaseSRWLockExclusive 15701->15703 15702->15297 15703->15702 17289 ee7ef0 15704->17289 15706 eeb48d 17308 ef2100 15706->17308 15710 eeb503 15710->15297 17681 f28ba0 15711->17681 15713 f28b21 std::locale::_Locimp::_Locimp 15714 ed3040 std::_Throw_Cpp_error 43 API calls 15713->15714 15715 f28b6c 15714->15715 15715->15297 15733 f02bb8 GetCurrentThreadId 15716->15733 15719 f02524 15720 f0253a std::_Throw_Cpp_error 15719->15720 15759 f024d7 15720->15759 15728 f0953f ___std_exception_copy 15727->15728 16263 f093cb 15728->16263 15730 f0954e 15731 f0898c ___std_exception_copy 41 API calls 15730->15731 15732 ed5450 15731->15732 15732->15299 15734 f02c01 15733->15734 15735 f02be2 15733->15735 15736 f02c21 15734->15736 15737 f02c0a 15734->15737 15738 f02be7 RtlAcquireSRWLockExclusive 15735->15738 15744 f02bf7 15735->15744 15740 f02c80 15736->15740 15746 f02c39 15736->15746 15739 f02c15 RtlAcquireSRWLockExclusive 15737->15739 15737->15744 15738->15744 15739->15744 15742 f02c87 RtlTryAcquireSRWLockExclusive 15740->15742 15740->15744 15742->15744 15743 ed5409 15743->15629 15743->15719 15751 f03d67 15744->15751 15746->15744 15747 f02c70 RtlTryAcquireSRWLockExclusive 15746->15747 15748 f0301b 15746->15748 15747->15744 15747->15746 15749 f03059 __Xtime_get_ticks 2 API calls 15748->15749 15750 f03026 __aulldiv __aullrem 15749->15750 15750->15746 15752 f03d70 IsProcessorFeaturePresent 15751->15752 15753 f03d6f 15751->15753 15755 f0454a 15752->15755 15753->15743 15758 f0450d SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 15755->15758 15757 f0462d 15757->15743 15758->15757 15760 f024e3 __EH_prolog3_GS 15759->15760 15761 ed2cf0 std::_Throw_Cpp_error 43 API calls 15760->15761 15762 f024f7 15761->15762 15780 ed36e0 15762->15780 15764 f0250c 15794 f03f5d 15764->15794 15781 ee63b0 std::_Throw_Cpp_error 43 API calls 15780->15781 15782 ed3731 15781->15782 15783 ed375a 15782->15783 15797 ee8f00 15782->15797 15785 ee8f00 std::_Throw_Cpp_error 43 API calls 15783->15785 15786 ed378a 15785->15786 15787 f04b05 ___std_exception_copy 42 API calls 15786->15787 15788 ed381e 15787->15788 15789 ed385f std::ios_base::_Ios_base_dtor 15788->15789 15790 f08c60 std::_Throw_Cpp_error 41 API calls 15788->15790 15789->15764 15791 ed38b0 15790->15791 15806 f04b68 15791->15806 15793 ed38f5 std::ios_base::_Ios_base_dtor 15793->15764 15795 f03d67 _ValidateLocalCookies 5 API calls 15794->15795 15796 f03f67 15795->15796 15796->15796 15799 ee8f22 std::locale::_Locimp::_Locimp 15797->15799 15800 ee8f4f 15797->15800 15798 ee902f std::ios_base::_Ios_base_dtor 15798->15783 15799->15783 15800->15798 15801 ed32d0 std::_Throw_Cpp_error 43 API calls 15800->15801 15802 ee8fa4 std::locale::_Locimp::_Locimp 15801->15802 15803 ee9002 std::locale::_Locimp::_Locimp 15802->15803 15804 ed2fe0 std::_Throw_Cpp_error 41 API calls 15802->15804 15803->15783 15805 ee8fef 15804->15805 15805->15783 15807 f04b75 15806->15807 15808 f04b7c 15806->15808 15809 f11c86 ___std_exception_destroy 14 API calls 15807->15809 15808->15793 15809->15808 16264 f093d7 std::locale::_Setgloballocale 16263->16264 16265 f093e0 16264->16265 16266 f09404 16264->16266 16267 f08bd3 ___std_exception_copy 41 API calls 16265->16267 16277 f11240 RtlEnterCriticalSection 16266->16277 16276 f093f9 16267->16276 16269 f0940d 16270 f09422 16269->16270 16278 f1a1db 16269->16278 16272 f0948e 16270->16272 16273 f094bf 16270->16273 16274 f08bd3 ___std_exception_copy 41 API calls 16272->16274 16285 f094f7 16273->16285 16274->16276 16276->15730 16277->16269 16279 f1a1e7 16278->16279 16280 f1a1fc 16278->16280 16281 f116ef ___std_exception_copy 14 API calls 16279->16281 16280->16270 16282 f1a1ec 16281->16282 16283 f08c50 ___std_exception_copy 41 API calls 16282->16283 16284 f1a1f7 16283->16284 16284->16270 16288 f11254 RtlLeaveCriticalSection 16285->16288 16287 f094fd 16287->16276 16288->16287 16291 eefc8d 16289->16291 16294 eefc12 std::locale::_Locimp::_Locimp 16289->16294 16290 eefd5e 16291->16290 16292 ed32d0 std::_Throw_Cpp_error 43 API calls 16291->16292 16293 eefce1 std::locale::_Locimp::_Locimp 16292->16293 16295 eefd3a std::locale::_Locimp::_Locimp 16293->16295 16296 ed2fe0 std::_Throw_Cpp_error 41 API calls 16293->16296 16297 eefd27 16296->16297 16299 eee528 16298->16299 16300 eee4c2 16298->16300 16413 ed3330 16299->16413 16302 eee4ca 16300->16302 16303 eee4f9 16300->16303 16304 eee52d 16302->16304 16305 eee4d1 16302->16305 16306 eee516 16303->16306 16308 f03662 std::_Facet_Register 43 API calls 16303->16308 16309 ed2b50 Concurrency::cancel_current_task 43 API calls 16304->16309 16307 f03662 std::_Facet_Register 43 API calls 16305->16307 16306->15659 16311 eee4d7 16307->16311 16310 eee503 16308->16310 16309->16311 16310->15659 16312 eee4e0 16311->16312 16313 f08c60 std::_Throw_Cpp_error 41 API calls 16311->16313 16312->15659 16314 eee537 16313->16314 16416 ee6ad0 16314->16416 16316 eee574 16317 ed4900 std::_Throw_Cpp_error 43 API calls 16316->16317 16318 eee5fb 16317->16318 16319 eee613 16318->16319 16420 ee9b60 16318->16420 16319->15659 16322 fc1ae7 16321->16322 16323 fc1aec 16321->16323 16322->15659 16324 f123dc ___std_exception_copy 15 API calls 16323->16324 16330 fc1b2f 16323->16330 16324->16330 16325 fc1b42 16325->15659 16326 fc1bf7 16326->15659 16327 f11c86 ___std_exception_destroy 14 API calls 16328 fc1be7 16327->16328 16328->15659 16329 fc1ba1 16329->16326 16329->16327 16330->16325 16330->16329 16331 f11c86 ___std_exception_destroy 14 API calls 16330->16331 16331->16329 16333 ef4288 16332->16333 16334 ef4195 16332->16334 16336 ed3330 43 API calls 16333->16336 16335 ef41b1 16334->16335 16337 ef4202 16334->16337 16338 ef41f2 16334->16338 16340 f03662 std::_Facet_Register 43 API calls 16335->16340 16339 ef428d 16336->16339 16344 f03662 std::_Facet_Register 43 API calls 16337->16344 16349 ef41cf std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 16337->16349 16338->16335 16338->16339 16341 ed2b50 Concurrency::cancel_current_task 43 API calls 16339->16341 16342 ef41c4 16340->16342 16343 ef4292 16341->16343 16342->16343 16342->16349 16345 f08c60 std::_Throw_Cpp_error 41 API calls 16343->16345 16344->16349 16346 ef4297 16345->16346 16347 ef42fa 16346->16347 16348 ef43e9 16346->16348 16466 ef6ff0 16347->16466 16350 ed3330 43 API calls 16348->16350 16461 ef77d0 16349->16461 16351 ef43ee 16350->16351 16353 ef445a 16351->16353 16354 ef4549 16351->16354 16359 ef6ff0 43 API calls 16353->16359 16357 ed3330 43 API calls 16354->16357 16356 ef4336 16474 ef7830 16356->16474 16365 ef454e 16357->16365 16358 ef425e 16358->15659 16361 ef4496 16359->16361 16360 ef470b 16363 ed3330 43 API calls 16360->16363 16364 ee63b0 std::_Throw_Cpp_error 43 API calls 16361->16364 16362 ef4706 16366 ed2b50 Concurrency::cancel_current_task 43 API calls 16362->16366 16387 ef46af 16363->16387 16378 ef44c4 16364->16378 16365->16360 16365->16362 16368 ef45ee 16365->16368 16369 ef4615 16365->16369 16366->16360 16367 f08c60 std::_Throw_Cpp_error 41 API calls 16370 ef4715 16367->16370 16368->16362 16371 ef45f9 16368->16371 16374 f03662 std::_Facet_Register 43 API calls 16369->16374 16386 ef45ff 16369->16386 16489 eed010 16370->16489 16375 f03662 std::_Facet_Register 43 API calls 16371->16375 16374->16386 16375->16386 16376 ef43b0 16376->15659 16380 ef7830 41 API calls 16378->16380 16382 ef4510 16380->16382 16381 ef472f 16383 f051eb Concurrency::cancel_current_task RaiseException 16381->16383 16382->15659 16384 ef4738 16383->16384 16385 ef4798 16384->16385 16389 ef477f 16384->16389 16390 ef475b 16384->16390 16388 ed2b50 Concurrency::cancel_current_task 43 API calls 16385->16388 16386->16387 16391 ef46d1 std::ios_base::_Ios_base_dtor 16386->16391 16479 f01f8c 16386->16479 16387->16367 16387->16391 16392 ef4768 16388->16392 16394 ef4791 16389->16394 16395 f03662 std::_Facet_Register 43 API calls 16389->16395 16390->16385 16393 ef4762 16390->16393 16391->15659 16397 f08c60 std::_Throw_Cpp_error 41 API calls 16392->16397 16401 ef4771 16392->16401 16398 f03662 std::_Facet_Register 43 API calls 16393->16398 16394->15659 16399 ef4789 16395->16399 16400 ef47a2 16397->16400 16398->16392 16399->15659 16401->15659 16403 ee6174 16402->16403 16405 ee6143 std::locale::_Locimp::_Locimp 16402->16405 16404 ee6180 16403->16404 16407 ee6200 16403->16407 16406 ed32d0 std::_Throw_Cpp_error 43 API calls 16404->16406 16405->15652 16410 ee61bf std::locale::_Locimp::_Locimp 16406->16410 16407->16407 16408 ee8f00 std::_Throw_Cpp_error 43 API calls 16407->16408 16409 ee6232 16408->16409 16409->15652 16411 ee61ed 16410->16411 16412 ed2fe0 std::_Throw_Cpp_error 41 API calls 16410->16412 16411->15652 16412->16411 16424 f01cda 16413->16424 16417 ee6b02 16416->16417 16419 ee6b1d 16417->16419 16450 ee50e0 16417->16450 16419->16316 16421 ee9bbb 16420->16421 16422 ee9b96 16420->16422 16421->16319 16422->16421 16458 ee88a0 16422->16458 16437 f01a8f 16424->16437 16427 f051eb Concurrency::cancel_current_task RaiseException 16428 f01cf9 16427->16428 16440 f01ae4 16428->16440 16431 f051eb Concurrency::cancel_current_task RaiseException 16432 f01d19 16431->16432 16443 f01b27 16432->16443 16435 f051eb Concurrency::cancel_current_task RaiseException 16436 f01d39 16435->16436 16447 ed34e0 16437->16447 16441 ed34e0 std::invalid_argument::invalid_argument 42 API calls 16440->16441 16442 f01af6 16441->16442 16442->16431 16444 f01b3b std::regex_error::regex_error 16443->16444 16445 ed34e0 std::invalid_argument::invalid_argument 42 API calls 16444->16445 16446 f01b44 16445->16446 16446->16435 16448 f04b05 ___std_exception_copy 42 API calls 16447->16448 16449 ed3522 16448->16449 16449->16427 16451 ee5117 16450->16451 16456 ee51b5 16450->16456 16452 ee6ad0 43 API calls 16451->16452 16453 ee5120 16452->16453 16454 ee519d 16453->16454 16457 ed4900 std::_Throw_Cpp_error 43 API calls 16453->16457 16455 ee9b60 43 API calls 16454->16455 16454->16456 16455->16456 16456->16419 16457->16454 16459 ed4900 std::_Throw_Cpp_error 43 API calls 16458->16459 16460 ee88bf 16459->16460 16460->16421 16462 ef77dc 16461->16462 16463 ef77f9 std::ios_base::_Ios_base_dtor 16461->16463 16462->16463 16464 f08c60 std::_Throw_Cpp_error 41 API calls 16462->16464 16463->16358 16465 ef7824 16464->16465 16467 ef703c 16466->16467 16468 ef6ff9 16466->16468 16467->16467 16468->16467 16469 ef7013 16468->16469 16471 f03662 std::_Facet_Register 43 API calls 16468->16471 16470 ef701c 16469->16470 16472 f03662 std::_Facet_Register 43 API calls 16469->16472 16470->16356 16471->16469 16473 ef7035 16472->16473 16473->16356 16475 ef7882 std::ios_base::_Ios_base_dtor 16474->16475 16476 ef783d 16474->16476 16475->16376 16476->16475 16477 f08c60 std::_Throw_Cpp_error 41 API calls 16476->16477 16478 ef78b6 16477->16478 16480 f01fa2 16479->16480 16481 f01f95 FindClose 16479->16481 16480->16386 16481->16480 16482 f01fa6 16481->16482 16483 f141b6 __Getctype 41 API calls 16482->16483 16484 f01fab 16483->16484 16485 f01f8c 41 API calls 16484->16485 16486 f01fba FindFirstFileExW 16485->16486 16487 f01fd5 16486->16487 16488 f01fd9 GetLastError 16486->16488 16487->16386 16488->16487 16490 eed02e 16489->16490 16491 eed01a 16489->16491 16493 ee9910 16490->16493 16491->16490 16492 f01f8c 44 API calls 16491->16492 16492->16491 16494 ee9938 std::ios_base::_Ios_base_dtor 16493->16494 16495 ee9928 16493->16495 16494->16381 16495->16494 16496 f08c60 std::_Throw_Cpp_error 41 API calls 16495->16496 16497 ee994d 16496->16497 16500 f0975a std::locale::_Setgloballocale 16498->16500 16499 f09761 16501 f116ef ___std_exception_copy 14 API calls 16499->16501 16500->16499 16503 f09781 16500->16503 16502 f09766 16501->16502 16504 f08c50 ___std_exception_copy 41 API calls 16502->16504 16505 f09793 16503->16505 16506 f09786 16503->16506 16514 f09771 16504->16514 16515 f1a8e1 16505->16515 16507 f116ef ___std_exception_copy 14 API calls 16506->16507 16507->16514 16510 f097a3 16511 f116ef ___std_exception_copy 14 API calls 16510->16511 16511->16514 16512 f097b0 16523 f097ee 16512->16523 16514->15313 16514->15689 16516 f1a8ed std::locale::_Setgloballocale 16515->16516 16527 f1423b RtlEnterCriticalSection 16516->16527 16518 f1a8fb 16528 f1a985 16518->16528 16524 f097f2 16523->16524 16548 f11254 RtlLeaveCriticalSection 16524->16548 16526 f09803 16526->16514 16527->16518 16535 f1a9a8 16528->16535 16529 f1aa00 16530 f1a64c __Getctype 14 API calls 16529->16530 16532 f1aa09 16530->16532 16533 f1b00c ___std_exception_destroy 14 API calls 16532->16533 16534 f1aa12 16533->16534 16536 f1b7e6 std::locale::_Setgloballocale 6 API calls 16534->16536 16540 f1a908 16534->16540 16535->16529 16535->16535 16535->16540 16544 f11240 RtlEnterCriticalSection 16535->16544 16545 f11254 RtlLeaveCriticalSection 16535->16545 16537 f1aa31 16536->16537 16546 f11240 RtlEnterCriticalSection 16537->16546 16541 f1a941 16540->16541 16547 f14283 RtlLeaveCriticalSection 16541->16547 16543 f0979c 16543->16510 16543->16512 16544->16535 16545->16535 16546->16540 16547->16543 16548->16526 16563 f0ce69 16549->16563 16551 f0d6ef 16557 f0d713 16551->16557 16570 f0e1c0 16551->16570 16552 f0d6a7 16552->16551 16553 f0d6bc 16552->16553 16562 f0d6d7 std::_Locinfo::_Locinfo_dtor 16552->16562 16555 f08bd3 ___std_exception_copy 41 API calls 16553->16555 16555->16562 16559 f0d737 16557->16559 16577 f0ce84 16557->16577 16558 f0d7bf 16560 f0ce12 41 API calls 16558->16560 16559->16558 16584 f0ce12 16559->16584 16560->16562 16562->15670 16564 f0ce81 16563->16564 16565 f0ce6e 16563->16565 16564->16552 16566 f116ef ___std_exception_copy 14 API calls 16565->16566 16567 f0ce73 16566->16567 16568 f08c50 ___std_exception_copy 41 API calls 16567->16568 16569 f0ce7e 16568->16569 16569->16552 16571 f08a37 ___std_exception_copy 41 API calls 16570->16571 16572 f0e1d0 16571->16572 16590 f1a14c 16572->16590 16578 f0ce90 16577->16578 16582 f0cea6 16577->16582 16579 f1453e __Getctype 41 API calls 16578->16579 16580 f0ce9b std::_Locinfo::_Locinfo_dtor 16579->16580 16580->16557 16581 f0ceb6 16581->16557 16582->16581 16734 f19a29 16582->16734 16585 f0ce23 16584->16585 16586 f0ce37 16584->16586 16585->16586 16587 f116ef ___std_exception_copy 14 API calls 16585->16587 16586->16558 16588 f0ce2c 16587->16588 16589 f08c50 ___std_exception_copy 41 API calls 16588->16589 16589->16586 16591 f1a163 16590->16591 16592 f0e1ed 16590->16592 16591->16592 16593 f22380 __Getctype 41 API calls 16591->16593 16594 f1a1aa 16592->16594 16593->16592 16595 f0e1fa 16594->16595 16596 f1a1c1 16594->16596 16595->16557 16596->16595 16598 f206ab 16596->16598 16599 f19e32 __Getctype 41 API calls 16598->16599 16600 f206b0 16599->16600 16603 f205c3 16600->16603 16602 f206bb 16602->16595 16604 f205cf std::locale::_Setgloballocale 16603->16604 16607 f205e9 16604->16607 16618 f1423b RtlEnterCriticalSection 16604->16618 16606 f205f0 16606->16602 16607->16606 16610 f141b6 __Getctype 41 API calls 16607->16610 16608 f20625 16619 f20642 16608->16619 16611 f20662 16610->16611 16613 f2069e 16611->16613 16622 f19eed 16611->16622 16612 f205f9 16612->16608 16615 f1b00c ___std_exception_destroy 14 API calls 16612->16615 16613->16602 16615->16608 16618->16612 16670 f14283 RtlLeaveCriticalSection 16619->16670 16621 f20649 16621->16607 16623 f19efe 16622->16623 16624 f19ef8 16622->16624 16625 f1b68d __Getctype 6 API calls 16623->16625 16644 f19f04 16623->16644 16626 f1b64e __Getctype 6 API calls 16624->16626 16627 f19f18 16625->16627 16626->16623 16628 f1a64c __Getctype 14 API calls 16627->16628 16627->16644 16630 f19f28 16628->16630 16629 f141b6 __Getctype 41 API calls 16631 f19f82 16629->16631 16632 f19f30 16630->16632 16633 f19f45 16630->16633 16634 f1b68d __Getctype 6 API calls 16632->16634 16635 f1b68d __Getctype 6 API calls 16633->16635 16642 f19f3c 16634->16642 16636 f19f51 16635->16636 16637 f19f55 16636->16637 16638 f19f64 16636->16638 16639 f1b68d __Getctype 6 API calls 16637->16639 16640 f19c60 __Getctype 14 API calls 16638->16640 16639->16642 16643 f19f6f 16640->16643 16641 f1b00c ___std_exception_destroy 14 API calls 16641->16644 16642->16641 16645 f1b00c ___std_exception_destroy 14 API calls 16643->16645 16644->16629 16646 f19f09 16644->16646 16645->16646 16647 f2046e 16646->16647 16648 f205c3 std::_Locinfo::_Locinfo_dtor 51 API calls 16647->16648 16649 f20498 16648->16649 16671 f201f5 16649->16671 16654 f204ca 16656 f1b00c ___std_exception_destroy 14 API calls 16654->16656 16655 f204d8 16685 f206be 16655->16685 16658 f204b1 16656->16658 16658->16613 16660 f20510 16661 f116ef ___std_exception_copy 14 API calls 16660->16661 16662 f20515 16661->16662 16666 f1b00c ___std_exception_destroy 14 API calls 16662->16666 16663 f20557 16665 f205a0 16663->16665 16696 f200e7 16663->16696 16664 f2052b std::_Locinfo::_Locinfo_dtor 16664->16663 16667 f1b00c ___std_exception_destroy 14 API calls 16664->16667 16669 f1b00c ___std_exception_destroy 14 API calls 16665->16669 16666->16658 16667->16663 16669->16658 16670->16621 16704 f0959e 16671->16704 16674 f20216 GetOEMCP 16677 f2023f 16674->16677 16675 f20228 16676 f2022d GetACP 16675->16676 16675->16677 16676->16677 16677->16658 16678 f1b086 16677->16678 16679 f1b0c4 16678->16679 16680 f1b094 __Getctype 16678->16680 16681 f116ef ___std_exception_copy 14 API calls 16679->16681 16680->16679 16682 f1b0af RtlAllocateHeap 16680->16682 16684 f15a79 std::_Facet_Register 2 API calls 16680->16684 16683 f1b0c2 16681->16683 16682->16680 16682->16683 16683->16654 16683->16655 16684->16680 16686 f201f5 std::_Locinfo::_Locinfo_dtor 49 API calls 16685->16686 16687 f206de 16686->16687 16688 f207e3 std::_Locinfo::_Locinfo_dtor 16687->16688 16690 f2071b IsValidCodePage 16687->16690 16695 f20736 std::_Locinfo::_Locinfo_dtor std::locale::_Setgloballocale 16687->16695 16689 f03d67 _ValidateLocalCookies 5 API calls 16688->16689 16691 f20505 16689->16691 16690->16688 16692 f2072d 16690->16692 16691->16660 16691->16664 16693 f20756 GetCPInfo 16692->16693 16692->16695 16693->16688 16693->16695 16712 f202c9 16695->16712 16697 f200f3 std::locale::_Setgloballocale 16696->16697 16723 f1423b RtlEnterCriticalSection 16697->16723 16699 f200fd 16724 f20134 16699->16724 16705 f095b5 16704->16705 16706 f095bc 16704->16706 16705->16674 16705->16675 16706->16705 16707 f19e32 __Getctype 41 API calls 16706->16707 16708 f095dd 16707->16708 16709 f1a11f __Getctype 41 API calls 16708->16709 16710 f095f3 16709->16710 16711 f1a17d std::_Locinfo::_Locinfo_dtor 51 API calls 16710->16711 16711->16705 16713 f202f1 GetCPInfo 16712->16713 16714 f203ba 16712->16714 16713->16714 16715 f20309 16713->16715 16717 f03d67 _ValidateLocalCookies 5 API calls 16714->16717 16716 f1f43b std::_Locinfo::_Locinfo_dtor 50 API calls 16715->16716 16719 f20371 16716->16719 16718 f2046c 16717->16718 16718->16688 16720 f1a898 std::_Locinfo::_Locinfo_dtor 50 API calls 16719->16720 16721 f20392 16720->16721 16722 f1a898 std::_Locinfo::_Locinfo_dtor 50 API calls 16721->16722 16722->16714 16723->16699 16725 f0cedb std::_Locinfo::_Locinfo_dtor 41 API calls 16724->16725 16726 f20156 16725->16726 16727 f0cedb std::_Locinfo::_Locinfo_dtor 41 API calls 16726->16727 16728 f20175 16727->16728 16729 f1b00c ___std_exception_destroy 14 API calls 16728->16729 16730 f2010a 16728->16730 16729->16730 16731 f20128 16730->16731 16732 f14283 std::_Lockit::~_Lockit RtlLeaveCriticalSection 16731->16732 16733 f20116 16732->16733 16733->16665 16735 f0959e std::_Locinfo::_Locinfo_dtor 51 API calls 16734->16735 16737 f19a46 16735->16737 16736 f19a56 16739 f03d67 _ValidateLocalCookies 5 API calls 16736->16739 16737->16736 16741 f1f43b 16737->16741 16740 f19af2 16739->16740 16740->16581 16742 f0959e std::_Locinfo::_Locinfo_dtor 50 API calls 16741->16742 16743 f1f45b 16742->16743 16756 f1b16c 16743->16756 16745 f1f517 16748 f03d67 _ValidateLocalCookies 5 API calls 16745->16748 16746 f1f50f 16759 f03265 16746->16759 16747 f1f488 16747->16745 16747->16746 16750 f1b086 std::_Locinfo::_Locinfo_dtor 15 API calls 16747->16750 16752 f1f4ad std::_Locinfo::_Locinfo_dtor std::locale::_Setgloballocale 16747->16752 16751 f1f53a 16748->16751 16750->16752 16751->16736 16752->16746 16753 f1b16c std::_Locinfo::_Locinfo_dtor MultiByteToWideChar 16752->16753 16754 f1f4f6 16753->16754 16754->16746 16755 f1f4fd GetStringTypeW 16754->16755 16755->16746 16763 f1b0d4 16756->16763 16760 f0326f 16759->16760 16762 f03280 16759->16762 16761 f11c86 ___std_exception_destroy 14 API calls 16760->16761 16760->16762 16761->16762 16762->16745 16764 f1b0e5 MultiByteToWideChar 16763->16764 16764->16747 16766 eeab55 16765->16766 16766->16766 16767 eeaba3 16766->16767 16774 eee8a0 16766->16774 16769 eeab83 16769->15681 16771 ed3459 16770->16771 16778 f10dc7 16771->16778 16775 eee8ce 16774->16775 16777 eee8f8 std::locale::_Locimp::_Locimp 16774->16777 16776 ed32d0 std::_Throw_Cpp_error 43 API calls 16775->16776 16776->16777 16777->16769 16779 f10ddb ___std_exception_copy 16778->16779 16784 f0e555 16779->16784 16782 f0898c ___std_exception_copy 41 API calls 16783 ed3467 WriteProcessMemory WriteProcessMemory CreateRemoteThread WaitForSingleObject 16782->16783 16783->15685 16783->15686 16785 f0e581 16784->16785 16786 f0e5a4 16784->16786 16787 f08bd3 ___std_exception_copy 41 API calls 16785->16787 16786->16785 16788 f0e5ac 16786->16788 16793 f0e599 16787->16793 16795 f0fa97 16788->16795 16789 f03d67 _ValidateLocalCookies 5 API calls 16790 f0e6c7 16789->16790 16790->16782 16793->16789 16813 f10afd 16795->16813 16798 f0fabc 16799 f08bd3 ___std_exception_copy 41 API calls 16798->16799 16800 f0e62d 16799->16800 16810 f0f27d 16800->16810 16803 f0e1c0 std::_Locinfo::_Locinfo_dtor 51 API calls 16805 f0fae4 std::_Locinfo::_Locinfo_dtor 16803->16805 16805->16800 16805->16803 16806 f0fbc0 16805->16806 16817 f0f48b 16805->16817 16820 f0fec4 16805->16820 16854 f1035f 16805->16854 16807 f08bd3 ___std_exception_copy 41 API calls 16806->16807 16808 f0fbda 16807->16808 16809 f08bd3 ___std_exception_copy 41 API calls 16808->16809 16809->16800 16811 f1b00c ___std_exception_destroy 14 API calls 16810->16811 16812 f0f28d 16811->16812 16812->16793 16814 f0fab1 16813->16814 16815 f10b08 16813->16815 16814->16798 16814->16800 16814->16805 16816 f08bd3 ___std_exception_copy 41 API calls 16815->16816 16816->16814 16883 f0e832 16817->16883 16819 f0f4c6 16819->16805 16821 f0fee2 16820->16821 16822 f0fecb 16820->16822 16823 f08bd3 ___std_exception_copy 41 API calls 16821->16823 16826 f0ff21 16821->16826 16824 f103e4 16822->16824 16825 f10384 16822->16825 16822->16826 16827 f0ff16 16823->16827 16830 f103e9 16824->16830 16831 f1041d 16824->16831 16828 f1040a 16825->16828 16829 f1038a 16825->16829 16826->16805 16827->16805 16918 f0ebec 16828->16918 16841 f1038f 16829->16841 16842 f103db 16829->16842 16832 f10416 16830->16832 16833 f103eb 16830->16833 16834 f10422 16831->16834 16835 f1043a 16831->16835 16925 f10a20 16832->16925 16839 f1039e 16833->16839 16843 f103fa 16833->16843 16834->16828 16834->16842 16852 f103b5 16834->16852 16929 f10a3d 16835->16929 16853 f10443 16839->16853 16893 f10775 16839->16893 16841->16839 16844 f103c8 16841->16844 16841->16852 16842->16853 16907 f0ed79 16842->16907 16843->16828 16846 f103fe 16843->16846 16844->16853 16903 f10906 16844->16903 16846->16853 16914 f1099b 16846->16914 16848 f03d67 _ValidateLocalCookies 5 API calls 16850 f106bc 16848->16850 16850->16805 16852->16853 16932 f1c5ac 16852->16932 16853->16848 16855 f103e4 16854->16855 16856 f10384 16854->16856 16859 f103e9 16855->16859 16860 f1041d 16855->16860 16857 f1040a 16856->16857 16858 f1038a 16856->16858 16866 f0ebec 42 API calls 16857->16866 16869 f1038f 16858->16869 16870 f103db 16858->16870 16861 f10416 16859->16861 16862 f103eb 16859->16862 16863 f10422 16860->16863 16864 f1043a 16860->16864 16867 f10a20 42 API calls 16861->16867 16868 f1039e 16862->16868 16873 f103fa 16862->16873 16863->16857 16863->16870 16880 f103b5 16863->16880 16865 f10a3d 42 API calls 16864->16865 16865->16880 16866->16880 16867->16880 16871 f10775 53 API calls 16868->16871 16882 f10443 16868->16882 16869->16868 16872 f103c8 16869->16872 16869->16880 16874 f0ed79 42 API calls 16870->16874 16870->16882 16871->16880 16876 f10906 52 API calls 16872->16876 16872->16882 16873->16857 16875 f103fe 16873->16875 16874->16880 16878 f1099b 41 API calls 16875->16878 16875->16882 16876->16880 16877 f03d67 _ValidateLocalCookies 5 API calls 16879 f106bc 16877->16879 16878->16880 16879->16805 16881 f1c5ac 52 API calls 16880->16881 16880->16882 16881->16880 16882->16877 16884 f0ce69 std::_Locinfo::_Locinfo_dtor 41 API calls 16883->16884 16885 f0e844 16884->16885 16886 f0e859 16885->16886 16889 f0e88c 16885->16889 16892 f0e874 std::_Locinfo::_Locinfo_dtor 16885->16892 16887 f08bd3 ___std_exception_copy 41 API calls 16886->16887 16887->16892 16888 f0e923 16890 f0ce12 41 API calls 16888->16890 16889->16888 16891 f0ce12 41 API calls 16889->16891 16890->16892 16891->16888 16892->16819 16894 f1078f 16893->16894 16942 f0e780 16894->16942 16896 f107ce 16953 f1c42b 16896->16953 16899 f0e1c0 std::_Locinfo::_Locinfo_dtor 51 API calls 16900 f10885 16899->16900 16901 f0e1c0 std::_Locinfo::_Locinfo_dtor 51 API calls 16900->16901 16902 f108b8 16900->16902 16901->16902 16902->16852 16902->16902 16905 f10921 16903->16905 16904 f10957 16904->16852 16905->16904 16906 f1c5ac 52 API calls 16905->16906 16906->16904 16908 f0ed8e 16907->16908 16909 f0edd7 16908->16909 16910 f0edb0 16908->16910 16912 f0e780 15 API calls 16909->16912 16913 f0edcd 16909->16913 16911 f08bd3 ___std_exception_copy 41 API calls 16910->16911 16911->16913 16912->16913 16913->16852 16916 f109b1 16914->16916 16915 f08bd3 ___std_exception_copy 41 API calls 16917 f109d2 16915->16917 16916->16915 16916->16917 16917->16852 16919 f0ec01 16918->16919 16920 f0ec23 16919->16920 16922 f0ec4a 16919->16922 16921 f08bd3 ___std_exception_copy 41 API calls 16920->16921 16924 f0ec40 16921->16924 16923 f0e780 15 API calls 16922->16923 16922->16924 16923->16924 16924->16852 16926 f10a2c 16925->16926 17017 f0ea5f 16926->17017 16928 f10a3c 16928->16852 16930 f0ed79 42 API calls 16929->16930 16931 f10a52 16930->16931 16931->16852 16933 f1c5c1 16932->16933 16934 f1c602 16933->16934 16935 f0e1c0 std::_Locinfo::_Locinfo_dtor 51 API calls 16933->16935 16940 f1c5c5 std::_Locinfo::_Locinfo_dtor std::locale::_Setgloballocale 16933->16940 16941 f1c5ee std::locale::_Setgloballocale 16933->16941 16934->16940 16934->16941 17024 f1ec43 16934->17024 16935->16934 16936 f08bd3 ___std_exception_copy 41 API calls 16936->16940 16938 f1c6bd 16939 f1c6d3 GetLastError 16938->16939 16938->16940 16939->16940 16939->16941 16940->16852 16941->16936 16941->16940 16943 f0e795 16942->16943 16944 f0e7a7 16942->16944 16943->16896 16944->16943 16945 f1b086 std::_Locinfo::_Locinfo_dtor 15 API calls 16944->16945 16946 f0e7cb 16945->16946 16947 f0e7d3 16946->16947 16948 f0e7de 16946->16948 16950 f1b00c ___std_exception_destroy 14 API calls 16947->16950 16972 f0f297 16948->16972 16950->16943 16952 f1b00c ___std_exception_destroy 14 API calls 16952->16943 16954 f1c460 16953->16954 16956 f1c43c 16953->16956 16954->16956 16957 f1c493 16954->16957 16955 f08bd3 ___std_exception_copy 41 API calls 16967 f10861 16955->16967 16956->16955 16958 f1c4cc 16957->16958 16961 f1c4fb 16957->16961 16975 f1c2cf 16958->16975 16959 f1c524 16964 f1c551 16959->16964 16965 f1c58b 16959->16965 16960 f1c529 16983 f1bb58 16960->16983 16961->16959 16961->16960 16968 f1c571 16964->16968 16969 f1c556 16964->16969 17010 f1be85 16965->17010 16967->16899 16967->16900 17003 f1c07c 16968->17003 16993 f1c200 16969->16993 16973 f1b00c ___std_exception_destroy 14 API calls 16972->16973 16974 f0e7e9 16973->16974 16974->16952 16976 f1c2e5 16975->16976 16977 f1c2f0 16975->16977 16976->16967 16978 f19995 ___std_exception_copy 41 API calls 16977->16978 16979 f1c34b 16978->16979 16980 f1c355 16979->16980 16981 f08c7d __Getctype 11 API calls 16979->16981 16980->16967 16982 f1c363 16981->16982 16984 f1bb6b 16983->16984 16985 f1bb7a 16984->16985 16986 f1bb9c 16984->16986 16987 f08bd3 ___std_exception_copy 41 API calls 16985->16987 16988 f1bbb1 16986->16988 16990 f1bc04 16986->16990 16992 f1bb92 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z std::locale::_Setgloballocale __allrem _strrchr 16987->16992 16989 f1be85 53 API calls 16988->16989 16989->16992 16991 f0e1c0 std::_Locinfo::_Locinfo_dtor 51 API calls 16990->16991 16990->16992 16991->16992 16992->16967 16994 f247ad 43 API calls 16993->16994 16995 f1c230 16994->16995 16996 f246b3 41 API calls 16995->16996 16997 f1c26e 16996->16997 16998 f1c275 16997->16998 16999 f1c2ae 16997->16999 17000 f1c287 16997->17000 16998->16967 17001 f1bf29 51 API calls 16999->17001 17002 f1c112 51 API calls 17000->17002 17001->16998 17002->16998 17004 f247ad 43 API calls 17003->17004 17005 f1c0ab 17004->17005 17006 f246b3 41 API calls 17005->17006 17007 f1c0ec 17006->17007 17008 f1c0f3 17007->17008 17009 f1c112 51 API calls 17007->17009 17008->16967 17009->17008 17011 f247ad 43 API calls 17010->17011 17012 f1beaf 17011->17012 17013 f246b3 41 API calls 17012->17013 17014 f1befd 17013->17014 17015 f1bf04 17014->17015 17016 f1bf29 51 API calls 17014->17016 17015->16967 17016->17015 17018 f0ea74 17017->17018 17019 f0eabd 17018->17019 17020 f0ea96 17018->17020 17022 f0e780 15 API calls 17019->17022 17023 f0eab3 17019->17023 17021 f08bd3 ___std_exception_copy 41 API calls 17020->17021 17021->17023 17022->17023 17023->16928 17025 f1ec56 std::_Locinfo::_Locinfo_dtor 17024->17025 17026 f1ec94 WideCharToMultiByte 17025->17026 17026->16938 17028 f11408 17027->17028 17033 f11430 17027->17033 17029 f11415 17028->17029 17030 f11437 17028->17030 17028->17033 17031 f08bd3 ___std_exception_copy 41 API calls 17029->17031 17035 f11353 17030->17035 17031->17033 17033->15692 17036 f1135f std::locale::_Setgloballocale 17035->17036 17043 f11240 RtlEnterCriticalSection 17036->17043 17038 f1136d 17044 f113ae 17038->17044 17043->17038 17054 f1c89c 17044->17054 17051 f113a2 17196 f11254 RtlLeaveCriticalSection 17051->17196 17053 f1138b 17053->15692 17074 f1c85e 17054->17074 17056 f1c8ad 17057 f113c6 17056->17057 17058 f1b086 std::_Locinfo::_Locinfo_dtor 15 API calls 17056->17058 17061 f11471 17057->17061 17059 f1c906 17058->17059 17060 f1b00c ___std_exception_destroy 14 API calls 17059->17060 17060->17057 17064 f11483 17061->17064 17065 f113e4 17061->17065 17062 f11491 17063 f08bd3 ___std_exception_copy 41 API calls 17062->17063 17063->17065 17064->17062 17064->17065 17068 f114c7 std::locale::_Locimp::_Locimp 17064->17068 17070 f1c947 17065->17070 17067 f1a1db 41 API calls 17067->17068 17068->17065 17068->17067 17090 f09a81 17068->17090 17096 f19668 17068->17096 17071 f1137a 17070->17071 17072 f1c952 17070->17072 17071->17051 17072->17071 17073 f09a81 74 API calls 17072->17073 17073->17071 17075 f1c86a 17074->17075 17076 f1c894 17075->17076 17077 f1a1db 41 API calls 17075->17077 17076->17056 17078 f1c885 17077->17078 17081 f23bd1 17078->17081 17080 f1c88b 17080->17056 17082 f23bde 17081->17082 17084 f23beb 17081->17084 17083 f116ef ___std_exception_copy 14 API calls 17082->17083 17085 f23be3 17083->17085 17086 f23bf7 17084->17086 17087 f116ef ___std_exception_copy 14 API calls 17084->17087 17085->17080 17086->17080 17088 f23c18 17087->17088 17089 f08c50 ___std_exception_copy 41 API calls 17088->17089 17089->17085 17091 f09a9a 17090->17091 17095 f09ac1 17090->17095 17092 f1a1db 41 API calls 17091->17092 17091->17095 17093 f09ab6 17092->17093 17094 f19668 74 API calls 17093->17094 17094->17095 17095->17068 17097 f19674 std::locale::_Setgloballocale 17096->17097 17098 f1967c 17097->17098 17099 f196b5 17097->17099 17101 f196fb 17097->17101 17098->17068 17100 f08bd3 ___std_exception_copy 41 API calls 17099->17100 17100->17098 17107 f1e6b2 RtlEnterCriticalSection 17101->17107 17103 f19701 17104 f1971f 17103->17104 17108 f19779 17103->17108 17136 f19771 17104->17136 17107->17103 17109 f197a1 17108->17109 17135 f197c4 17108->17135 17110 f197a5 17109->17110 17112 f19800 17109->17112 17111 f08bd3 ___std_exception_copy 41 API calls 17110->17111 17111->17135 17113 f1981e 17112->17113 17146 f1262d 17112->17146 17139 f192be 17113->17139 17117 f19836 17121 f19865 17117->17121 17122 f1983e 17117->17122 17118 f1987d 17119 f19891 17118->17119 17120 f198e6 WriteFile 17118->17120 17125 f198d2 17119->17125 17126 f19899 17119->17126 17123 f19908 GetLastError 17120->17123 17120->17135 17154 f18e8f GetConsoleOutputCP 17121->17154 17122->17135 17149 f19256 17122->17149 17123->17135 17182 f1933b 17125->17182 17128 f198be 17126->17128 17129 f1989e 17126->17129 17174 f194ff 17128->17174 17132 f198a7 17129->17132 17129->17135 17131 f19878 17131->17135 17167 f19416 17132->17167 17135->17104 17195 f1e767 RtlLeaveCriticalSection 17136->17195 17138 f19777 17138->17098 17140 f23bd1 41 API calls 17139->17140 17142 f192d0 17140->17142 17141 f19334 17141->17117 17141->17118 17142->17141 17143 f192fe 17142->17143 17144 f0e1c0 std::_Locinfo::_Locinfo_dtor 51 API calls 17142->17144 17143->17141 17145 f19318 GetConsoleMode 17143->17145 17144->17143 17145->17141 17189 f1250c 17146->17189 17148 f12646 17148->17113 17152 f192ad 17149->17152 17153 f19278 17149->17153 17150 f192af GetLastError 17150->17152 17151 f23d9e CreateFileW CloseHandle WriteConsoleW GetLastError WriteConsoleW 17151->17153 17152->17135 17153->17150 17153->17151 17153->17152 17155 f18f01 17154->17155 17163 f18f08 std::locale::_Locimp::_Locimp 17154->17163 17156 f0e1c0 std::_Locinfo::_Locinfo_dtor 51 API calls 17155->17156 17156->17163 17157 f03d67 _ValidateLocalCookies 5 API calls 17158 f1924f 17157->17158 17158->17131 17159 f1c716 51 API calls 17159->17163 17160 f191be 17160->17157 17161 f1ec43 std::_Locinfo::_Locinfo_dtor WideCharToMultiByte 17161->17163 17162 f19137 WriteFile 17162->17163 17164 f1922d GetLastError 17162->17164 17163->17159 17163->17160 17163->17161 17163->17162 17165 f23c96 5 API calls std::_Locinfo::_Locinfo_dtor 17163->17165 17166 f19175 WriteFile 17163->17166 17164->17160 17165->17163 17166->17163 17166->17164 17171 f19425 17167->17171 17168 f194e4 17170 f03d67 _ValidateLocalCookies 5 API calls 17168->17170 17169 f1949a WriteFile 17169->17171 17172 f194e6 GetLastError 17169->17172 17173 f194fd 17170->17173 17171->17168 17171->17169 17172->17168 17173->17135 17175 f1950e 17174->17175 17178 f1ec43 std::_Locinfo::_Locinfo_dtor WideCharToMultiByte 17175->17178 17179 f19618 GetLastError 17175->17179 17180 f195cd WriteFile 17175->17180 17181 f19616 17175->17181 17176 f03d67 _ValidateLocalCookies 5 API calls 17177 f1962f 17176->17177 17177->17131 17178->17175 17179->17181 17180->17175 17180->17179 17181->17176 17186 f1934a 17182->17186 17183 f03d67 _ValidateLocalCookies 5 API calls 17184 f19414 17183->17184 17184->17131 17185 f193ba WriteFile 17185->17186 17187 f193fd GetLastError 17185->17187 17186->17185 17188 f193fb 17186->17188 17187->17188 17188->17183 17190 f1e92e 41 API calls 17189->17190 17191 f1251e 17190->17191 17192 f1253a SetFilePointerEx 17191->17192 17194 f12526 17191->17194 17193 f12552 GetLastError 17192->17193 17192->17194 17193->17194 17194->17148 17195->17138 17196->17053 17198 f0cf7f std::locale::_Setgloballocale 17197->17198 17199 f0cf89 17198->17199 17200 f0cfac 17198->17200 17201 f08bd3 ___std_exception_copy 41 API calls 17199->17201 17207 f0cfa4 17200->17207 17208 f11240 RtlEnterCriticalSection 17200->17208 17201->17207 17203 f0cfca 17209 f0d00a 17203->17209 17205 f0cfd7 17223 f0d002 17205->17223 17207->15698 17208->17203 17210 f0d017 17209->17210 17211 f0d03a 17209->17211 17212 f08bd3 ___std_exception_copy 41 API calls 17210->17212 17213 f09a81 74 API calls 17211->17213 17214 f0d032 17211->17214 17212->17214 17215 f0d052 17213->17215 17214->17205 17226 f1b046 17215->17226 17218 f1a1db 41 API calls 17219 f0d066 17218->17219 17230 f18d1c 17219->17230 17222 f1b00c ___std_exception_destroy 14 API calls 17222->17214 17288 f11254 RtlLeaveCriticalSection 17223->17288 17225 f0d008 17225->17207 17227 f0d05a 17226->17227 17228 f1b05d 17226->17228 17227->17218 17228->17227 17229 f1b00c ___std_exception_destroy 14 API calls 17228->17229 17229->17227 17231 f18d45 17230->17231 17232 f0d06d 17230->17232 17233 f18d94 17231->17233 17235 f18d6c 17231->17235 17232->17214 17232->17222 17234 f08bd3 ___std_exception_copy 41 API calls 17233->17234 17234->17232 17237 f18c8b 17235->17237 17238 f18c97 std::locale::_Setgloballocale 17237->17238 17245 f1e6b2 RtlEnterCriticalSection 17238->17245 17240 f18ca5 17241 f18cd6 17240->17241 17246 f18def 17240->17246 17259 f18d10 17241->17259 17245->17240 17262 f1e92e 17246->17262 17248 f18dff 17249 f18e05 17248->17249 17250 f18e37 17248->17250 17252 f1e92e 41 API calls 17248->17252 17275 f1e89d 17249->17275 17250->17249 17253 f1e92e 41 API calls 17250->17253 17254 f18e2e 17252->17254 17255 f18e43 FindCloseChangeNotification 17253->17255 17256 f1e92e 41 API calls 17254->17256 17255->17249 17257 f18e4f GetLastError 17255->17257 17256->17250 17257->17249 17258 f18e5d 17258->17241 17287 f1e767 RtlLeaveCriticalSection 17259->17287 17261 f18cf9 17261->17232 17263 f1e950 17262->17263 17264 f1e93b 17262->17264 17267 f116dc 14 API calls 17263->17267 17269 f1e975 17263->17269 17284 f116dc 17264->17284 17270 f1e980 17267->17270 17268 f116ef ___std_exception_copy 14 API calls 17272 f1e948 17268->17272 17269->17248 17271 f116ef ___std_exception_copy 14 API calls 17270->17271 17273 f1e988 17271->17273 17272->17248 17274 f08c50 ___std_exception_copy 41 API calls 17273->17274 17274->17272 17276 f1e913 17275->17276 17277 f1e8ac 17275->17277 17278 f116ef ___std_exception_copy 14 API calls 17276->17278 17277->17276 17283 f1e8d6 17277->17283 17279 f1e918 17278->17279 17280 f116dc 14 API calls 17279->17280 17281 f1e903 17280->17281 17281->17258 17282 f1e8fd SetStdHandle 17282->17281 17283->17281 17283->17282 17285 f19f85 ___std_exception_copy 14 API calls 17284->17285 17286 f116e1 17285->17286 17286->17268 17287->17261 17288->17225 17290 ee7f1d 17289->17290 17291 ee8034 17289->17291 17292 ee7f7c 17290->17292 17293 ee7fcb 17290->17293 17294 ee7f2b 17290->17294 17295 ee7f24 17290->17295 17296 ee7f83 17290->17296 17300 ed2cf0 std::_Throw_Cpp_error 43 API calls 17291->17300 17302 ee7f29 17291->17302 17375 eecf80 17292->17375 17293->15706 17299 f03662 std::_Facet_Register 43 API calls 17294->17299 17370 eec3a0 17295->17370 17297 f03662 std::_Facet_Register 43 API calls 17296->17297 17297->17302 17299->17302 17303 ee804f 17300->17303 17302->15706 17380 ed7f90 17303->17380 17305 ee8062 17306 f051eb Concurrency::cancel_current_task RaiseException 17305->17306 17307 ee8073 17306->17307 17310 ef215f 17308->17310 17437 f1132b 17310->17437 17313 eeb4f0 17314 eedb10 17313->17314 17315 eede3d 17314->17315 17316 eedb56 17314->17316 17318 eefd70 43 API calls 17315->17318 17489 eeebb0 17316->17489 17320 eede87 17318->17320 17319 eedba4 17322 eefd70 43 API calls 17319->17322 17321 eeeda0 56 API calls 17320->17321 17367 eedf4f std::ios_base::_Ios_base_dtor 17320->17367 17324 eedee2 17321->17324 17325 eedbc1 17322->17325 17323 eede38 std::ios_base::_Ios_base_dtor 17323->15710 17327 ed75c0 43 API calls 17324->17327 17369 eedcc3 std::ios_base::_Ios_base_dtor 17325->17369 17495 eeeda0 17325->17495 17326 ee7ef0 43 API calls 17328 eedfc7 17326->17328 17329 eedf06 17327->17329 17328->17323 17333 f08c60 std::_Throw_Cpp_error 41 API calls 17328->17333 17334 eef440 56 API calls 17329->17334 17331 eedcec 17336 ee7ef0 43 API calls 17331->17336 17332 eedd82 17339 ee7ef0 43 API calls 17332->17339 17343 eedd9f 17332->17343 17337 eee06f 17333->17337 17349 eedf1f 17334->17349 17335 eedc1c 17542 ed75c0 17335->17542 17364 eedd01 17336->17364 17591 ee90b0 17337->17591 17339->17343 17341 eee093 17346 ee90b0 42 API calls 17341->17346 17342 eedc40 17572 eef440 17342->17572 17347 ee35b0 41 API calls 17343->17347 17351 eee0a1 17346->17351 17353 eedd6c 17347->17353 17348 f051eb Concurrency::cancel_current_task RaiseException 17354 eee08e 17348->17354 17349->17341 17355 ed7a20 14 API calls 17349->17355 17350 eedc56 17350->17337 17356 eedc6b 17350->17356 17352 f051eb Concurrency::cancel_current_task RaiseException 17351->17352 17357 eee0b2 17352->17357 17361 ee35b0 41 API calls 17353->17361 17358 f08c60 std::_Throw_Cpp_error 41 API calls 17354->17358 17355->17367 17581 ed7a20 17356->17581 17359 f08c60 std::_Throw_Cpp_error 41 API calls 17357->17359 17358->17341 17363 eee0b7 17359->17363 17365 eede26 17361->17365 17586 ee35b0 17364->17586 17366 ee35b0 41 API calls 17365->17366 17366->17323 17367->17326 17367->17328 17367->17357 17368 eedc86 17368->17354 17368->17369 17369->17331 17369->17332 17371 f03662 std::_Facet_Register 43 API calls 17370->17371 17372 eec3c3 17371->17372 17373 f03662 std::_Facet_Register 43 API calls 17372->17373 17374 eec3ec 17373->17374 17374->17302 17376 f03662 std::_Facet_Register 43 API calls 17375->17376 17377 eecfb7 17376->17377 17378 ed3040 std::_Throw_Cpp_error 43 API calls 17377->17378 17379 eecfee 17378->17379 17379->17302 17391 ed7350 17380->17391 17382 ed8029 17409 eead80 17382->17409 17384 ed803d 17385 ed8076 std::ios_base::_Ios_base_dtor 17384->17385 17387 ed80df 17384->17387 17413 ed72b0 17385->17413 17389 f08c60 std::_Throw_Cpp_error 41 API calls 17387->17389 17388 ed80aa 17388->17305 17390 ed80e4 17389->17390 17390->17305 17416 ed4d70 17391->17416 17400 ee8f00 std::_Throw_Cpp_error 43 API calls 17401 ed73e6 17400->17401 17402 ed7476 std::ios_base::_Ios_base_dtor 17401->17402 17403 f08c60 std::_Throw_Cpp_error 41 API calls 17401->17403 17402->17382 17404 ed74c4 17403->17404 17405 f04b68 ___std_exception_destroy 14 API calls 17404->17405 17406 ed7511 17405->17406 17407 f04b68 ___std_exception_destroy 14 API calls 17406->17407 17408 ed7527 std::ios_base::_Ios_base_dtor 17407->17408 17408->17382 17410 eeadb4 17409->17410 17411 ee8f00 std::_Throw_Cpp_error 43 API calls 17410->17411 17412 eeadbf 17411->17412 17412->17384 17414 f04b05 ___std_exception_copy 42 API calls 17413->17414 17415 ed731a 17414->17415 17415->17388 17418 ed4da6 17416->17418 17417 ed4dd8 17420 eeac50 17417->17420 17418->17417 17419 ed3040 std::_Throw_Cpp_error 43 API calls 17418->17419 17419->17417 17421 eeac81 17420->17421 17422 eeacd3 17421->17422 17423 eee8a0 43 API calls 17421->17423 17424 ed73af 17423->17424 17425 eeabb0 17424->17425 17426 eeabe1 17425->17426 17426->17426 17427 ee8f00 std::_Throw_Cpp_error 43 API calls 17426->17427 17428 ed73c2 17427->17428 17429 eeae20 17428->17429 17432 eee710 17429->17432 17431 ed73d1 17431->17400 17433 eee753 17432->17433 17434 ed32d0 std::_Throw_Cpp_error 43 API calls 17433->17434 17435 eee758 std::locale::_Locimp::_Locimp 17433->17435 17436 eee843 std::locale::_Locimp::_Locimp 17434->17436 17435->17431 17436->17431 17438 f19e32 __Getctype 41 API calls 17437->17438 17439 f11336 17438->17439 17440 f1a11f __Getctype 41 API calls 17439->17440 17441 ef225f 17440->17441 17442 eefd70 17441->17442 17444 eefd84 17442->17444 17448 eefde4 17442->17448 17449 eefdc2 17444->17449 17456 ef9e20 17444->17456 17445 eeff6c 17445->17313 17451 eefe74 17448->17451 17478 ef01e0 17448->17478 17449->17448 17450 ef9e20 43 API calls 17449->17450 17453 eefe58 17449->17453 17450->17453 17451->17313 17452 eefecc 17452->17445 17455 ef9e20 43 API calls 17452->17455 17482 ef08f0 17452->17482 17453->17451 17474 ef1430 17453->17474 17455->17452 17457 ef9f76 17456->17457 17458 ef9e62 17456->17458 17460 ed3330 43 API calls 17457->17460 17459 ef9e7c 17458->17459 17461 ef9eca 17458->17461 17462 ef9eba 17458->17462 17464 f03662 std::_Facet_Register 43 API calls 17459->17464 17463 ef9f7b 17460->17463 17467 f03662 std::_Facet_Register 43 API calls 17461->17467 17471 ef9e9a std::locale::_Locimp::_Locimp 17461->17471 17462->17459 17462->17463 17465 ed2b50 Concurrency::cancel_current_task 43 API calls 17463->17465 17466 ef9e8f 17464->17466 17468 ef9f80 17465->17468 17466->17468 17466->17471 17467->17471 17469 f08c60 std::_Throw_Cpp_error 41 API calls 17468->17469 17470 ef9f85 17469->17470 17472 ef77d0 41 API calls 17471->17472 17473 ef9f47 17472->17473 17473->17449 17475 ef1443 17474->17475 17476 ef1471 17475->17476 17477 ef9e20 43 API calls 17475->17477 17476->17448 17477->17476 17479 ef01f0 17478->17479 17480 ef9e20 43 API calls 17479->17480 17481 ef0260 17479->17481 17480->17479 17481->17452 17483 ef1430 43 API calls 17482->17483 17484 ef08fc 17483->17484 17486 ef9e20 43 API calls 17484->17486 17487 ef090a 17484->17487 17488 ef0995 17484->17488 17485 ef9e20 43 API calls 17485->17488 17486->17484 17487->17452 17488->17485 17488->17487 17490 eeec6d 17489->17490 17491 ee7ef0 43 API calls 17490->17491 17492 eeec8d 17491->17492 17594 ef16c0 17492->17594 17494 eeecdf 17494->17319 17496 eeee46 17495->17496 17517 eeef1f std::ios_base::_Ios_base_dtor 17495->17517 17497 eef425 17496->17497 17500 eee8a0 43 API calls 17496->17500 17502 f08c60 std::_Throw_Cpp_error 41 API calls 17497->17502 17498 ee8f00 std::_Throw_Cpp_error 43 API calls 17499 eeef5b 17498->17499 17501 eeef6a 17499->17501 17505 eef191 17499->17505 17503 eeee79 17500->17503 17504 eef440 56 API calls 17501->17504 17506 eef42f 17502->17506 17507 ee8f00 std::_Throw_Cpp_error 43 API calls 17503->17507 17508 eeef79 17504->17508 17515 ed3040 std::_Throw_Cpp_error 43 API calls 17505->17515 17509 f08c60 std::_Throw_Cpp_error 41 API calls 17506->17509 17510 eeee93 17507->17510 17514 ed3040 std::_Throw_Cpp_error 43 API calls 17508->17514 17512 eef434 17509->17512 17511 ee8f00 std::_Throw_Cpp_error 43 API calls 17510->17511 17513 eeeee3 17511->17513 17516 f08c60 std::_Throw_Cpp_error 41 API calls 17512->17516 17513->17497 17513->17517 17518 eeefba 17514->17518 17519 eef1c9 17515->17519 17540 eef375 std::ios_base::_Ios_base_dtor 17516->17540 17517->17498 17520 ee8f00 std::_Throw_Cpp_error 43 API calls 17518->17520 17521 eefbf0 43 API calls 17519->17521 17523 eeefcd 17520->17523 17524 eef1e0 17521->17524 17522 f08c60 std::_Throw_Cpp_error 41 API calls 17525 eef43e 17522->17525 17526 eee710 43 API calls 17523->17526 17527 ee8f00 std::_Throw_Cpp_error 43 API calls 17524->17527 17528 eef019 17526->17528 17531 eef22f std::ios_base::_Ios_base_dtor 17527->17531 17529 ee8f00 std::_Throw_Cpp_error 43 API calls 17528->17529 17530 eef032 17529->17530 17532 ee8f00 std::_Throw_Cpp_error 43 API calls 17530->17532 17531->17512 17535 eef161 std::ios_base::_Ios_base_dtor 17531->17535 17534 eef081 std::ios_base::_Ios_base_dtor 17532->17534 17533 ed3040 std::_Throw_Cpp_error 43 API calls 17536 eef30c 17533->17536 17534->17506 17534->17535 17535->17533 17541 eef3f2 std::ios_base::_Ios_base_dtor 17535->17541 17537 eefbf0 43 API calls 17536->17537 17538 eef323 17537->17538 17539 ee8f00 std::_Throw_Cpp_error 43 API calls 17538->17539 17539->17540 17540->17522 17540->17541 17541->17335 17665 ed4e30 17542->17665 17545 ed4e30 43 API calls 17546 ed762b 17545->17546 17547 eeace0 43 API calls 17546->17547 17548 ed7640 17547->17548 17549 eeabb0 43 API calls 17548->17549 17550 ed7656 17549->17550 17551 eee710 43 API calls 17550->17551 17553 ed766d std::ios_base::_Ios_base_dtor 17551->17553 17552 ed7a09 17554 f08c60 std::_Throw_Cpp_error 41 API calls 17552->17554 17553->17552 17555 ed770a std::ios_base::_Ios_base_dtor 17553->17555 17556 ed7a0e 17554->17556 17558 ed7350 43 API calls 17555->17558 17557 f08c60 std::_Throw_Cpp_error 41 API calls 17556->17557 17559 ed7a13 17557->17559 17560 ed77a4 17558->17560 17561 ee8f00 std::_Throw_Cpp_error 43 API calls 17560->17561 17562 ed77b9 17561->17562 17563 eee710 43 API calls 17562->17563 17564 ed780c 17563->17564 17565 ee8f00 std::_Throw_Cpp_error 43 API calls 17564->17565 17566 ed7828 17565->17566 17567 eead80 43 API calls 17566->17567 17569 ed7879 std::ios_base::_Ios_base_dtor 17567->17569 17568 ed7975 std::ios_base::_Ios_base_dtor 17570 ed72b0 42 API calls 17568->17570 17569->17556 17569->17568 17571 ed79ca 17570->17571 17571->17342 17573 eef630 17572->17573 17579 eef4c9 std::ios_base::_Ios_base_dtor std::locale::_Locimp::_Locimp 17572->17579 17573->17350 17575 eef647 17577 f08c60 std::_Throw_Cpp_error 41 API calls 17575->17577 17576 ed32d0 std::_Throw_Cpp_error 43 API calls 17576->17579 17580 eef651 17577->17580 17578 ee8f00 std::_Throw_Cpp_error 43 API calls 17578->17579 17579->17573 17579->17575 17579->17576 17579->17578 17669 ed34a0 17579->17669 17580->17350 17582 f04b68 ___std_exception_destroy 14 API calls 17581->17582 17583 ed7a61 17582->17583 17584 f04b68 ___std_exception_destroy 14 API calls 17583->17584 17585 ed7a77 17584->17585 17585->17368 17587 ee35d1 17586->17587 17588 ee35f1 std::ios_base::_Ios_base_dtor 17586->17588 17587->17588 17589 f08c60 std::_Throw_Cpp_error 41 API calls 17587->17589 17588->17353 17590 ee3625 17589->17590 17590->17353 17676 ee6590 17591->17676 17597 ef17d0 17594->17597 17596 ef16da std::locale::_Setgloballocale 17596->17494 17598 ef1809 17597->17598 17604 ef1838 17597->17604 17599 ef1923 17598->17599 17602 ef181b 17598->17602 17614 ef1990 17599->17614 17602->17604 17605 ef9f90 17602->17605 17604->17596 17606 efa0a3 17605->17606 17607 ef9fc2 17605->17607 17608 ed3330 43 API calls 17606->17608 17626 efd180 17607->17626 17612 efa000 std::locale::_Locimp::_Locimp 17608->17612 17610 f08c60 std::_Throw_Cpp_error 41 API calls 17611 efa0ad 17610->17611 17612->17610 17613 efa05f std::ios_base::_Ios_base_dtor 17612->17613 17613->17604 17615 f01cda 43 API calls 17614->17615 17617 ef199a 17615->17617 17616 ef1928 17617->17616 17618 ed2cf0 std::_Throw_Cpp_error 43 API calls 17617->17618 17619 ef1a03 17618->17619 17620 eeace0 43 API calls 17619->17620 17621 ef1a18 17620->17621 17634 ed7cf0 17621->17634 17623 ef1a2d 17624 f051eb Concurrency::cancel_current_task RaiseException 17623->17624 17625 ef1a3e 17624->17625 17627 efd1c9 17626->17627 17628 efd189 17626->17628 17627->17627 17628->17627 17630 f03662 std::_Facet_Register 43 API calls 17628->17630 17632 efd1a0 17628->17632 17629 f03662 std::_Facet_Register 43 API calls 17631 efd1c2 17629->17631 17630->17632 17631->17612 17632->17629 17633 efd1a9 17632->17633 17633->17612 17635 ed7350 43 API calls 17634->17635 17636 ed7d80 17635->17636 17637 eead80 43 API calls 17636->17637 17638 ed7d94 17637->17638 17639 ed7dcd std::ios_base::_Ios_base_dtor 17638->17639 17642 ed7e33 17638->17642 17640 ed72b0 42 API calls 17639->17640 17641 ed7dfd 17640->17641 17641->17623 17643 f08c60 std::_Throw_Cpp_error 41 API calls 17642->17643 17644 ed7e38 17643->17644 17645 ed7350 43 API calls 17644->17645 17646 ed7ece 17645->17646 17647 eead80 43 API calls 17646->17647 17648 ed7ee2 17647->17648 17649 ed7f1b std::ios_base::_Ios_base_dtor 17648->17649 17652 ed7f81 17648->17652 17650 ed72b0 42 API calls 17649->17650 17651 ed7f4b 17650->17651 17651->17623 17653 f08c60 std::_Throw_Cpp_error 41 API calls 17652->17653 17654 ed7f86 17653->17654 17655 ed7350 43 API calls 17654->17655 17656 ed8029 17655->17656 17657 eead80 43 API calls 17656->17657 17658 ed803d 17657->17658 17659 ed8076 std::ios_base::_Ios_base_dtor 17658->17659 17661 ed80df 17658->17661 17660 ed72b0 42 API calls 17659->17660 17662 ed80aa 17660->17662 17663 f08c60 std::_Throw_Cpp_error 41 API calls 17661->17663 17662->17623 17664 ed80e4 17663->17664 17664->17623 17666 ed4e66 17665->17666 17666->17666 17667 ed4ea8 17666->17667 17668 ed3040 std::_Throw_Cpp_error 43 API calls 17666->17668 17667->17545 17668->17667 17672 ed3380 17669->17672 17673 ed3399 17672->17673 17674 f10dc7 54 API calls 17673->17674 17675 ed33a7 17674->17675 17675->17579 17677 f04b05 ___std_exception_copy 42 API calls 17676->17677 17678 ee65ce 17677->17678 17679 f04b05 ___std_exception_copy 42 API calls 17678->17679 17680 ee6601 17679->17680 17680->17348 17682 f28e07 17681->17682 17686 f28bf8 17681->17686 17682->15713 17684 f28d28 std::locale::_Setgloballocale 17684->17682 17685 ed3130 43 API calls 17684->17685 17685->17684 17686->17684 17688 f087a0 17686->17688 17697 ed3130 17686->17697 17689 f087d3 17688->17689 17690 f087b7 17688->17690 17691 f19e32 __Getctype 41 API calls 17689->17691 17690->17686 17692 f087d8 17691->17692 17693 f1a11f __Getctype 41 API calls 17692->17693 17694 f087e8 17693->17694 17694->17690 17695 f19a29 51 API calls 17694->17695 17696 f0881a 17695->17696 17696->17686 17698 ed316f 17697->17698 17699 ed32b3 17697->17699 17701 ed3189 17698->17701 17702 ed31d7 17698->17702 17703 ed31c7 17698->17703 17700 ed3330 43 API calls 17699->17700 17704 ed32b8 17700->17704 17705 f03662 std::_Facet_Register 43 API calls 17701->17705 17707 f03662 std::_Facet_Register 43 API calls 17702->17707 17710 ed319c std::locale::_Locimp::_Locimp 17702->17710 17703->17701 17703->17704 17706 ed2b50 Concurrency::cancel_current_task 43 API calls 17704->17706 17705->17710 17706->17710 17707->17710 17708 f08c60 std::_Throw_Cpp_error 41 API calls 17709 ed32c2 17708->17709 17710->17708 17711 ed326b std::ios_base::_Ios_base_dtor 17710->17711 17711->17686 17713 f03649 GetSystemTimeAsFileTime 17712->17713 17714 f0363d GetSystemTimePreciseAsFileTime 17712->17714 17715 f03067 17713->17715 17714->17715 17715->15227 15208 11ceb8c 15209 11ceb99 VirtualAlloc 15208->15209 17974 ef47b0 17975 ef48ed 17974->17975 17976 ef47ed 17974->17976 17977 ed3330 43 API calls 17975->17977 17981 ef4a30 43 API calls 17976->17981 17978 ef48f2 17977->17978 17979 ef493d 17978->17979 17980 ef4a23 17978->17980 17985 ef4a30 43 API calls 17979->17985 17982 ed3330 43 API calls 17980->17982 17984 ef4827 17981->17984 17983 ef4a28 17982->17983 17988 eee1e0 41 API calls 17984->17988 17986 ef4977 17985->17986 17993 ee3d50 17986->17993 17989 ef48b4 17988->17989 17990 ef499f 17991 eee1e0 41 API calls 17990->17991 17992 ef49ea 17991->17992 17994 ee3d8f 17993->17994 18017 ee3df7 std::locale::_Locimp::_Locimp 17993->18017 17995 ee3f1e 17994->17995 17996 ee3f7d 17994->17996 17997 ee3e69 17994->17997 17998 ee3d96 17994->17998 17994->18017 18065 ee7e80 17995->18065 18002 f03662 std::_Facet_Register 43 API calls 17996->18002 18000 f03662 std::_Facet_Register 43 API calls 17997->18000 18001 f03662 std::_Facet_Register 43 API calls 17998->18001 18003 ee3e73 18000->18003 18004 ee3da0 18001->18004 18005 ee3f8a 18002->18005 18003->18017 18026 efbf20 18003->18026 18006 f03662 std::_Facet_Register 43 API calls 18004->18006 18009 ee408e 18005->18009 18010 ee3fd3 18005->18010 18005->18017 18008 ee3dd2 18006->18008 18053 eff450 18008->18053 18013 ed3330 43 API calls 18009->18013 18014 ee3fdb 18010->18014 18015 ee4004 18010->18015 18011 ee3eb1 18011->18017 18022 ee3d50 105 API calls 18011->18022 18018 ee4093 18013->18018 18014->18018 18019 ee3fe6 18014->18019 18016 f03662 std::_Facet_Register 43 API calls 18015->18016 18016->18017 18017->17990 18020 ed2b50 Concurrency::cancel_current_task 43 API calls 18018->18020 18021 f03662 std::_Facet_Register 43 API calls 18019->18021 18023 ee3fec 18020->18023 18021->18023 18022->18011 18023->18017 18024 f08c60 std::_Throw_Cpp_error 41 API calls 18023->18024 18025 ee409d 18024->18025 18027 efbf9b 18026->18027 18028 efbf32 18026->18028 18031 ed3330 43 API calls 18027->18031 18029 efbf3d 18028->18029 18030 efbf6c 18028->18030 18032 efbf44 18029->18032 18033 efbfa0 18029->18033 18034 efbf89 18030->18034 18036 f03662 std::_Facet_Register 43 API calls 18030->18036 18031->18033 18035 f03662 std::_Facet_Register 43 API calls 18032->18035 18037 ed2b50 Concurrency::cancel_current_task 43 API calls 18033->18037 18034->18011 18038 efbf4a 18035->18038 18039 efbf76 18036->18039 18037->18038 18040 f08c60 std::_Throw_Cpp_error 41 API calls 18038->18040 18041 efbf53 18038->18041 18039->18011 18042 efbfaa 18040->18042 18041->18011 18043 efbffc 18042->18043 18044 efc067 18042->18044 18047 efc003 std::locale::_Locimp::_Locimp 18042->18047 18070 eefab0 18043->18070 18046 ed3330 43 API calls 18044->18046 18048 efc06c 18046->18048 18047->18011 18049 f03662 std::_Facet_Register 43 API calls 18048->18049 18050 efc09e 18049->18050 18051 ed3040 std::_Throw_Cpp_error 43 API calls 18050->18051 18052 efc0e2 18051->18052 18052->18011 18054 eff488 18053->18054 18064 eff52f 18053->18064 18055 f03662 std::_Facet_Register 43 API calls 18054->18055 18056 eff4aa 18055->18056 18057 ee63b0 std::_Throw_Cpp_error 43 API calls 18056->18057 18058 eff4c0 18057->18058 18059 ee3d50 105 API calls 18058->18059 18060 eff4d0 18059->18060 18061 eff450 105 API calls 18060->18061 18062 eff521 18061->18062 18063 eff450 105 API calls 18062->18063 18063->18064 18064->18017 18066 f03662 std::_Facet_Register 43 API calls 18065->18066 18067 ee7ea6 18066->18067 18068 ee63b0 std::_Throw_Cpp_error 43 API calls 18067->18068 18069 ee7ec5 18068->18069 18069->18017 18071 eefb2b 18070->18071 18072 eefac2 18070->18072 18075 ed2b50 Concurrency::cancel_current_task 43 API calls 18071->18075 18073 eefafc 18072->18073 18074 eefacd 18072->18074 18077 eefb19 18073->18077 18080 f03662 std::_Facet_Register 43 API calls 18073->18080 18074->18071 18076 eefad4 18074->18076 18078 eefada 18075->18078 18079 f03662 std::_Facet_Register 43 API calls 18076->18079 18077->18047 18081 f08c60 std::_Throw_Cpp_error 41 API calls 18078->18081 18083 eefae3 18078->18083 18079->18078 18082 eefb06 18080->18082 18085 eefb35 18081->18085 18082->18047 18083->18047 18084 eefb5b std::locale::_Setgloballocale 18084->18047 18085->18084 18088 ef9c70 18085->18088 18087 eefb7f 18087->18047 18089 ef9dc4 18088->18089 18094 ef9ca2 18088->18094 18090 ed3330 43 API calls 18089->18090 18105 ef9d04 std::locale::_Locimp::_Locimp 18090->18105 18091 ef9dbf 18092 ed2b50 Concurrency::cancel_current_task 43 API calls 18091->18092 18092->18089 18093 f08c60 std::_Throw_Cpp_error 41 API calls 18095 ef9dce 18093->18095 18094->18091 18096 ef9cf3 18094->18096 18099 ef9d1d 18094->18099 18107 ee9950 18095->18107 18096->18091 18098 ef9cfe 18096->18098 18101 f03662 std::_Facet_Register 43 API calls 18098->18101 18102 f03662 std::_Facet_Register 43 API calls 18099->18102 18099->18105 18100 ef9dd9 18103 f051eb Concurrency::cancel_current_task RaiseException 18100->18103 18101->18105 18102->18105 18104 ef9de2 18103->18104 18105->18093 18106 ef9d8f std::ios_base::_Ios_base_dtor 18105->18106 18106->18087 18108 ee9978 std::ios_base::_Ios_base_dtor 18107->18108 18109 ee9968 18107->18109 18108->18100 18109->18108 18110 f08c60 std::_Throw_Cpp_error 41 API calls 18109->18110 18111 ee998d 18110->18111 18112 ee9a4f 18111->18112 18119 f02b64 18111->18119 18112->18100 18118 ee9a04 18118->18100 18120 f02ae7 18119->18120 18126 ee99cc 18120->18126 18148 f09805 18120->18148 18125 f0d098 79 API calls 18125->18126 18126->18112 18127 ee83b0 18126->18127 18128 ee843c 18127->18128 18129 ee8463 18127->18129 18200 f111fa 18128->18200 18131 eec430 18129->18131 18132 f02460 std::_Lockit::_Lockit 7 API calls 18131->18132 18133 eec45f 18132->18133 18134 f02460 std::_Lockit::_Lockit 7 API calls 18133->18134 18140 eec4a9 std::_Throw_Cpp_error 18133->18140 18135 eec481 18134->18135 18139 f024b8 std::_Lockit::~_Lockit 2 API calls 18135->18139 18136 eec4f8 18137 f024b8 std::_Lockit::~_Lockit 2 API calls 18136->18137 18138 eec5c9 18137->18138 18138->18118 18139->18140 18140->18136 18141 f03662 std::_Facet_Register 43 API calls 18140->18141 18142 eec506 18141->18142 18143 ed4040 std::_Throw_Cpp_error 76 API calls 18142->18143 18144 eec536 18143->18144 18145 ed4100 std::_Throw_Cpp_error 74 API calls 18144->18145 18146 eec592 18145->18146 18147 f026e7 std::_Facet_Register 43 API calls 18146->18147 18147->18136 18150 f0974e std::locale::_Setgloballocale 18148->18150 18149 f09761 18151 f116ef ___std_exception_copy 14 API calls 18149->18151 18150->18149 18153 f09781 18150->18153 18152 f09766 18151->18152 18154 f08c50 ___std_exception_copy 41 API calls 18152->18154 18155 f09793 18153->18155 18156 f09786 18153->18156 18159 f02b33 18154->18159 18158 f1a8e1 17 API calls 18155->18158 18157 f116ef ___std_exception_copy 14 API calls 18156->18157 18157->18159 18160 f0979c 18158->18160 18159->18126 18165 f0d5e6 18159->18165 18161 f097b0 18160->18161 18162 f097a3 18160->18162 18164 f097ee RtlLeaveCriticalSection 18161->18164 18163 f116ef ___std_exception_copy 14 API calls 18162->18163 18163->18159 18164->18159 18166 f0d5f9 ___std_exception_copy 18165->18166 18171 f0d33d 18166->18171 18169 f0898c ___std_exception_copy 41 API calls 18170 f02b4e 18169->18170 18170->18125 18170->18126 18173 f0d349 std::locale::_Setgloballocale 18171->18173 18172 f0d34f 18174 f08bd3 ___std_exception_copy 41 API calls 18172->18174 18173->18172 18175 f0d392 18173->18175 18176 f0d36a 18174->18176 18182 f11240 RtlEnterCriticalSection 18175->18182 18176->18169 18178 f0d39e 18183 f0d4c0 18178->18183 18180 f0d3b4 18192 f0d3dd 18180->18192 18182->18178 18184 f0d4d3 18183->18184 18185 f0d4e6 18183->18185 18184->18180 18195 f0d3e7 18185->18195 18187 f0d509 18188 f09a81 74 API calls 18187->18188 18191 f0d597 18187->18191 18189 f0d537 18188->18189 18190 f1262d 43 API calls 18189->18190 18190->18191 18191->18180 18199 f11254 RtlLeaveCriticalSection 18192->18199 18194 f0d3e5 18194->18176 18196 f0d3f8 18195->18196 18198 f0d450 18195->18198 18197 f125ed 43 API calls 18196->18197 18196->18198 18197->18198 18198->18187 18199->18194 18201 f11206 18200->18201 18204 f1121b 18200->18204 18202 f116ef ___std_exception_copy 14 API calls 18201->18202 18203 f1120b 18202->18203 18205 f08c50 ___std_exception_copy 41 API calls 18203->18205 18204->18129 18206 f11216 18205->18206 18206->18129

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • setsockopt.WS2_32(000003A8,0000FFFF,00001006,?,00000008), ref: 00F94F56
                                                                                                            • recv.WS2_32(?,00000004,00000002), ref: 00F94F71
                                                                                                            • WSAGetLastError.WS2_32 ref: 00F94F75
                                                                                                            • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 00F94FF3
                                                                                                            • recv.WS2_32(00000000,0000000C,00000008), ref: 00F95014
                                                                                                            • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?), ref: 00F950B0
                                                                                                            • recv.WS2_32(00000000,?,00000008), ref: 00F950CB
                                                                                                              • Part of subcall function 00F95940: WSAStartup.WS2_32 ref: 00F9596A
                                                                                                              • Part of subcall function 00F95940: getaddrinfo.WS2_32(?,?,?,01056328), ref: 00F959EC
                                                                                                              • Part of subcall function 00F95940: socket.WS2_32(?,?,?), ref: 00F95A0D
                                                                                                              • Part of subcall function 00F95940: connect.WS2_32(00000000,01026B31,?), ref: 00F95A21
                                                                                                              • Part of subcall function 00F95940: closesocket.WS2_32(00000000), ref: 00F95A2D
                                                                                                              • Part of subcall function 00F95940: FreeAddrInfoW.WS2_32(?), ref: 00F95A3A
                                                                                                              • Part of subcall function 00F95940: WSACleanup.WS2_32 ref: 00F95A40
                                                                                                            • recv.WS2_32(?,00000004,00000008), ref: 00F951D3
                                                                                                            • __Xtime_get_ticks.LIBCPMT ref: 00F951DA
                                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F951E8
                                                                                                            • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 00F95261
                                                                                                            • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 00F95269
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: recv$Sleepsetsockopt$AddrCleanupErrorFreeInfoLastStartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectgetaddrinfosocket
                                                                                                            • String ID:
                                                                                                            • API String ID: 3089209366-0
                                                                                                            • Opcode ID: fad7286ff40069ccb4a10a7126c5e984344ef0d3dc4316e0999fe464bcf3cf48
                                                                                                            • Instruction ID: 6ee0878d08dfe24425b2504b10445b220ab5b62cd90539330f0ff5e9f0438d5b
                                                                                                            • Opcode Fuzzy Hash: fad7286ff40069ccb4a10a7126c5e984344ef0d3dc4316e0999fe464bcf3cf48
                                                                                                            • Instruction Fuzzy Hash: C8B18CB1D00308DFEF25DFA4CC49BAEBBB5BB45710F204219E494AB2D2D77A5984DB81
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 56 f95940-f95972 WSAStartup 57 f95978-f959a2 call fb77d0 * 2 56->57 58 f95a46-f95a4f 56->58 63 f959ae-f959f4 getaddrinfo 57->63 64 f959a4-f959a8 57->64 65 f95a40 WSACleanup 63->65 66 f959f6-f959fc 63->66 64->58 64->63 65->58 67 f959fe 66->67 68 f95a54-f95a5e FreeAddrInfoW 66->68 69 f95a04-f95a18 socket 67->69 68->65 70 f95a60-f95a68 68->70 69->65 71 f95a1a-f95a2a connect 69->71 72 f95a2c-f95a34 closesocket 71->72 73 f95a50 71->73 72->69 74 f95a36-f95a3a FreeAddrInfoW 72->74 73->68 74->65
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddrFreeInfo$CleanupStartupclosesocketconnectgetaddrinfosocket
                                                                                                            • String ID:
                                                                                                            • API String ID: 448659506-0
                                                                                                            • Opcode ID: 3f92dbbb1762c88d0249a46ef7e13eec5947024b36e0c5caa2ef293fc3734f8f
                                                                                                            • Instruction ID: 1b6d2f59a97e5231b2a506efa6c9ed691a97c5919bb6ee67363efa3fecd4bcea
                                                                                                            • Opcode Fuzzy Hash: 3f92dbbb1762c88d0249a46ef7e13eec5947024b36e0c5caa2ef293fc3734f8f
                                                                                                            • Instruction Fuzzy Hash: DA31F272A04700AFE7319F64DC84A6BBBE4FB85B34F20471DF8A593190D77998049B96
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 75 ed9280-ed92dd call ee63b0 78 ed9413-ed9521 call ed2df0 call fb77d0 75->78 79 ed92e3-ed92e9 75->79 95 ed9537-ed953f call ee8dc0 78->95 96 ed9523-ed9535 78->96 80 ed92f0-ed9313 79->80 82 ed9315-ed931f 80->82 83 ed9324-ed9331 80->83 85 ed9403-ed9406 82->85 86 ed9333-ed933d 83->86 87 ed9342-ed934f 83->87 89 ed9409-ed940d 85->89 86->85 90 ed9351-ed935b 87->90 91 ed9360-ed936d 87->91 89->78 89->80 90->85 93 ed936f-ed9379 91->93 94 ed937e-ed938b 91->94 93->85 97 ed938d-ed9397 94->97 98 ed9399-ed93a6 94->98 99 ed9544-ed9597 call fb77d0 * 2 95->99 96->99 97->85 101 ed93a8-ed93b2 98->101 102 ed93b4-ed93c1 98->102 112 ed9599-ed95c8 call fb77d0 call f05260 99->112 113 ed95cb-ed95e1 call fb77d0 99->113 101->85 104 ed93cf-ed93dc 102->104 105 ed93c3-ed93cd 102->105 107 ed93de-ed93e8 104->107 108 ed93ea-ed93f4 104->108 105->85 107->85 108->89 111 ed93f6-ed93ff 108->111 111->85 112->113 119 ed95e7-ed95ed 113->119 120 ed96e2 113->120 122 ed95f0-ed96ce GetModuleHandleA GetProcAddress WSASend 119->122 123 ed96e6-ed96f0 120->123 124 ed975f-ed9763 122->124 125 ed96d4-ed96dc 122->125 126 ed971e-ed973d 123->126 127 ed96f2-ed96fe 123->127 124->123 125->120 125->122 128 ed976f-ed9796 126->128 129 ed973f-ed974b 126->129 130 ed9714-ed971b call f038e3 127->130 131 ed9700-ed970e 127->131 134 ed974d-ed975b 129->134 135 ed9765-ed976c call f038e3 129->135 130->126 131->130 132 ed9797-ed97fe call f08c60 call ed2df0 * 2 131->132 134->132 137 ed975d 134->137 135->128 137->135
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(Ws2_32.dll,?,?,?,?,0101A4DC,00000000,76A923A0,-01056880), ref: 00ED96A6
                                                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00ED96B4
                                                                                                            • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,0101A4DC,00000000,76A923A0,-01056880), ref: 00ED96C9
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressHandleModuleProcSend
                                                                                                            • String ID: 4oST$4oST$Ws2_32.dll
                                                                                                            • API String ID: 2819740048-1839276265
                                                                                                            • Opcode ID: 2fc832f71983803c1597ec99cdc80afd3677883d924af9eaca6477891b20dd51
                                                                                                            • Instruction ID: c00b02764ee0d9cb96d8d50463cf236962bcc9d733b9e31f1c4b11f8cf2b7e13
                                                                                                            • Opcode Fuzzy Hash: 2fc832f71983803c1597ec99cdc80afd3677883d924af9eaca6477891b20dd51
                                                                                                            • Instruction Fuzzy Hash: 3A02CA70E04288DFDF25CFA4CC907ADBBB0EF55314F24428AE4897B686D7741986CB92
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 146 f19779-f1979b 147 f197a1-f197a3 146->147 148 f1998e 146->148 150 f197a5-f197c4 call f08bd3 147->150 151 f197cf-f197f2 147->151 149 f19990-f19994 148->149 157 f197c7-f197ca 150->157 152 f197f4-f197f6 151->152 153 f197f8-f197fe 151->153 152->153 155 f19800-f19811 152->155 153->150 153->155 158 f19813-f19821 call f1262d 155->158 159 f19824-f19834 call f192be 155->159 157->149 158->159 164 f19836-f1983c 159->164 165 f1987d-f1988f 159->165 168 f19865-f1987b call f18e8f 164->168 169 f1983e-f19841 164->169 166 f19891-f19897 165->166 167 f198e6-f19906 WriteFile 165->167 173 f198d2-f198e4 call f1933b 166->173 174 f19899-f1989c 166->174 170 f19911 167->170 171 f19908-f1990e GetLastError 167->171 186 f1985e-f19860 168->186 175 f19843-f19846 169->175 176 f1984c-f1985b call f19256 169->176 179 f19914-f1991f 170->179 171->170 192 f198b9-f198bc 173->192 180 f198be-f198d0 call f194ff 174->180 181 f1989e-f198a1 174->181 175->176 182 f19926-f19929 175->182 176->186 187 f19921-f19924 179->187 188 f19989-f1998c 179->188 180->192 189 f1992c-f1992e 181->189 190 f198a7-f198b4 call f19416 181->190 182->189 186->179 187->182 188->149 193 f19930-f19935 189->193 194 f1995c-f19968 189->194 190->192 192->186 197 f19937-f19949 193->197 198 f1994e-f19957 call f116b8 193->198 199 f19972-f19984 194->199 200 f1996a-f19970 194->200 197->157 198->157 199->157 200->148 200->199
                                                                                                            APIs
                                                                                                              • Part of subcall function 00F18E8F: GetConsoleOutputCP.KERNEL32(200B473F,00000000,00000000,?), ref: 00F18EF2
                                                                                                            • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00F198FE
                                                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00F19908
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ConsoleErrorFileLastOutputWrite
                                                                                                            • String ID:
                                                                                                            • API String ID: 2915228174-0
                                                                                                            • Opcode ID: a736ad410096c7d8c148a8f4fee489fab0a6424d52412cbf16ff1d4bb9145126
                                                                                                            • Instruction ID: 11ad37bc09ebfc4ef843081fde40d1adbb0840a4fd1834d1c3e73c2e45e1db2d
                                                                                                            • Opcode Fuzzy Hash: a736ad410096c7d8c148a8f4fee489fab0a6424d52412cbf16ff1d4bb9145126
                                                                                                            • Instruction Fuzzy Hash: EC61D772D08109AFDF11CFA8CC54AEEBFB9AF09324F540149E900A7246D7B6D981EBD0
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 203 f18def-f18e03 call f1e92e 206 f18e05-f18e07 203->206 207 f18e09-f18e11 203->207 208 f18e57-f18e77 call f1e89d 206->208 209 f18e13-f18e1a 207->209 210 f18e1c-f18e1f 207->210 218 f18e89 208->218 219 f18e79-f18e87 call f116b8 208->219 209->210 211 f18e27-f18e3b call f1e92e * 2 209->211 212 f18e21-f18e25 210->212 213 f18e3d-f18e4d call f1e92e FindCloseChangeNotification 210->213 211->206 211->213 212->211 212->213 213->206 225 f18e4f-f18e55 GetLastError 213->225 223 f18e8b-f18e8e 218->223 219->223 225->208
                                                                                                            APIs
                                                                                                            • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,00F18CD6,00000000,?,01047178,0000000C,00F18D92,?,?,?), ref: 00F18E45
                                                                                                            • GetLastError.KERNEL32(?,00F18CD6,00000000,?,01047178,0000000C,00F18D92,?,?,?), ref: 00F18E4F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ChangeCloseErrorFindLastNotification
                                                                                                            • String ID:
                                                                                                            • API String ID: 1687624791-0
                                                                                                            • Opcode ID: 101f13fc55416583588492c7f093d342f4cef8cf76a55bb91e4d4b4b521208e5
                                                                                                            • Instruction ID: 5a9d035aee1f638bb5dd8549b51c6e42aeaca5887d08a464496c7f28bb4eb8eb
                                                                                                            • Opcode Fuzzy Hash: 101f13fc55416583588492c7f093d342f4cef8cf76a55bb91e4d4b4b521208e5
                                                                                                            • Instruction Fuzzy Hash: 6B110C33F041145AD73526B45E45BEE37498B827B4F29065DFD14971C2DF2A9CC2A390
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 228 f1250c-f12524 call f1e92e 231 f12526-f1252d 228->231 232 f1253a-f12550 SetFilePointerEx 228->232 233 f12534-f12538 231->233 234 f12552-f12563 GetLastError call f116b8 232->234 235 f12565-f1256f 232->235 236 f1258b-f1258e 233->236 234->233 235->233 238 f12571-f12586 235->238 238->236
                                                                                                            APIs
                                                                                                            • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,00F12616,?,?,?,?,?), ref: 00F12548
                                                                                                            • GetLastError.KERNEL32(?,?,?,?,00F12616,?,?,?,?,?,00000000,?,00000000), ref: 00F12555
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorFileLastPointer
                                                                                                            • String ID:
                                                                                                            • API String ID: 2976181284-0
                                                                                                            • Opcode ID: c1a0e914533cbc966826e82253559f34e8c2e50a54baea17ca8e78d7fc351676
                                                                                                            • Instruction ID: 407e71170334591e41142adc7349e33f424622507591fbb80fb4aae04bacbd84
                                                                                                            • Opcode Fuzzy Hash: c1a0e914533cbc966826e82253559f34e8c2e50a54baea17ca8e78d7fc351676
                                                                                                            • Instruction Fuzzy Hash: 2201D633A10115AFCF158F99DC959DE3F2AEB85330B280208F8119B291EA76ED91DB90
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 298 ed32d0-ed32e0 299 ed3306-ed3308 298->299 300 ed32e2-ed32e7 298->300 303 ed3318-ed331e 299->303 304 ed330a-ed3317 call f03662 299->304 301 ed331f call ed2b50 300->301 302 ed32e9-ed32ea call f03662 300->302 308 ed3324-ed3329 call f08c60 301->308 309 ed32ef-ed32f6 302->309 309->308 312 ed32f8-ed3305 309->312
                                                                                                            APIs
                                                                                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00ED331F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Concurrency::cancel_current_task
                                                                                                            • String ID:
                                                                                                            • API String ID: 118556049-0
                                                                                                            • Opcode ID: 88e0f75f83d5f9e69285ef2088a1dfdc1055322beeb667a90db4e8c6ac7f301f
                                                                                                            • Instruction ID: 211cd79f7811f6e27f274889e89f75c2ec154982147514a45b85b482f2ad571e
                                                                                                            • Opcode Fuzzy Hash: 88e0f75f83d5f9e69285ef2088a1dfdc1055322beeb667a90db4e8c6ac7f301f
                                                                                                            • Instruction Fuzzy Hash: D6F024321001049BCB146F74D9158E9B3E8EF243A1710093BE89CE7392EB2ADA529781
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 314 f1b086-f1b092 315 f1b0c4-f1b0cf call f116ef 314->315 316 f1b094-f1b096 314->316 323 f1b0d1-f1b0d3 315->323 318 f1b098-f1b099 316->318 319 f1b0af-f1b0c0 RtlAllocateHeap 316->319 318->319 320 f1b0c2 319->320 321 f1b09b-f1b0a2 call f18270 319->321 320->323 321->315 326 f1b0a4-f1b0ad call f15a79 321->326 326->315 326->319
                                                                                                            APIs
                                                                                                            • RtlAllocateHeap.NTDLL(00000000,00000001,?), ref: 00F1B0B8
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AllocateHeap
                                                                                                            • String ID:
                                                                                                            • API String ID: 1279760036-0
                                                                                                            • Opcode ID: cd077b5b0217d9e91daf39d34ee34c3aa6702ff7cf1baa4aa5a9caad7227e7be
                                                                                                            • Instruction ID: 4f36a11fa896d002bfbf2c9827f2a7ad140a570b3dbcb770fd812caa962c7e0f
                                                                                                            • Opcode Fuzzy Hash: cd077b5b0217d9e91daf39d34ee34c3aa6702ff7cf1baa4aa5a9caad7227e7be
                                                                                                            • Instruction Fuzzy Hash: 8DE03032601611EAEA312A759C047DB3649AF457B0B150161FE65970C1DF298CC0B2E1
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 329 11ceb8c-11ceb97 330 11ceb99-11ceb9e 329->330 331 11ceba0-11ceba3 329->331 332 11cebaa-11cebbe VirtualAlloc 330->332 331->332 333 11ceba5 331->333 333->332
                                                                                                            APIs
                                                                                                            • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 011CEBB7
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmp, Offset: 01077000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AllocVirtual
                                                                                                            • String ID:
                                                                                                            • API String ID: 4275171209-0
                                                                                                            • Opcode ID: 4047af8941ca93394774f1f7c66d6b6e33ffd6915764e1227402051d9074d677
                                                                                                            • Instruction ID: fc7b595d79e10628012d624b7ea43d260e4e4a5437d3d4e2d03403be97166e43
                                                                                                            • Opcode Fuzzy Hash: 4047af8941ca93394774f1f7c66d6b6e33ffd6915764e1227402051d9074d677
                                                                                                            • Instruction Fuzzy Hash: E9E0E2B6310208ABDF24CE8CD889BAB379DEB98A11F108415FA0AD7209C234E8508775
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • VirtualAllocEx.KERNEL32(00000000,00000000,?,00003000,00000040), ref: 00F9C6A1
                                                                                                            • WriteProcessMemory.KERNEL32(00000000,00000000,?,?,00000000), ref: 00F9C6BD
                                                                                                            • WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 00F9C6F2
                                                                                                            • VirtualAllocEx.KERNEL32(?,00000000,00001000,00003000,00000040), ref: 00F9C71B
                                                                                                            • WriteProcessMemory.KERNEL32(?,00000000,?,00000218,00000000), ref: 00F9C8BF
                                                                                                            • WriteProcessMemory.KERNEL32(?,00000218,00F9C990,-00000010,00000000), ref: 00F9C8E1
                                                                                                            • CreateRemoteThread.KERNEL32(?,00000000,00000000,00000218,00000000,00000000,00000000), ref: 00F9C8F4
                                                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00F9C8FD
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MemoryProcessWrite$AllocVirtual$CreateObjectRemoteSingleThreadWait
                                                                                                            • String ID: %s|%s$131$4oST
                                                                                                            • API String ID: 2137838514-1634972829
                                                                                                            • Opcode ID: 861dfe84e5a2469447c112ee7da6f8290a1ef8b59b62192f7aaf1d746a0320df
                                                                                                            • Instruction ID: 5b861f30042639bc8c30da544ac5cf4529b05617526bbe125ad9cecc75398c55
                                                                                                            • Opcode Fuzzy Hash: 861dfe84e5a2469447c112ee7da6f8290a1ef8b59b62192f7aaf1d746a0320df
                                                                                                            • Instruction Fuzzy Hash: 6DB18BB0D00208DFDB24CFA8CC85BAEBBB5FF48300F104259E549AB285D775A945DFA5
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002,00000000,?,?,?,00F235F3,?,?), ref: 00F2337A
                                                                                                            • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002,00000000,?,?,?,00F235F3,?,?), ref: 00F233A3
                                                                                                            • GetACP.KERNEL32(?,?,00F235F3,?,?), ref: 00F233B8
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: InfoLocale
                                                                                                            • String ID: ACP$OCP
                                                                                                            • API String ID: 2299586839-711371036
                                                                                                            • Opcode ID: 82a74d017eaf5cc65b39651922fb16b592f111ab93bea56e51182788fd2304ca
                                                                                                            • Instruction ID: abe0171176a089999ff17370d760a9f4ed9c8068b1b0c2a23e17862ed5f3ba2a
                                                                                                            • Opcode Fuzzy Hash: 82a74d017eaf5cc65b39651922fb16b592f111ab93bea56e51182788fd2304ca
                                                                                                            • Instruction Fuzzy Hash: 962195B2A00125EAD734CF19E905B9A73A6BB50B60B568464E945D7104EF3ADF40E350
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                              • Part of subcall function 00F19E32: GetLastError.KERNEL32(00000000,?,00F1F819), ref: 00F19E36
                                                                                                              • Part of subcall function 00F19E32: SetLastError.KERNEL32(00000000,00000000,00000001,00000007,000000FF), ref: 00F19ED8
                                                                                                            • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 00F235C5
                                                                                                            • IsValidCodePage.KERNEL32(?), ref: 00F23603
                                                                                                            • IsValidLocale.KERNEL32(?,00000001), ref: 00F23616
                                                                                                            • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00F2365E
                                                                                                            • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 00F23679
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                                            • String ID:
                                                                                                            • API String ID: 415426439-0
                                                                                                            • Opcode ID: 592856bc77bf46aaa8e97d1dd4a018bda346aa48a382079a159b49215a162029
                                                                                                            • Instruction ID: 69d2f6936431864b97926680b6b1ab4d4b2e8c8026d2dcf317bd00300415d3c7
                                                                                                            • Opcode Fuzzy Hash: 592856bc77bf46aaa8e97d1dd4a018bda346aa48a382079a159b49215a162029
                                                                                                            • Instruction Fuzzy Hash: 7F5162B1E00226ABDB20DFA5EC46EBA77B8AF08710F180469E504E7140DB79DB44AB61
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                              • Part of subcall function 00F19E32: GetLastError.KERNEL32(00000000,?,00F1F819), ref: 00F19E36
                                                                                                              • Part of subcall function 00F19E32: SetLastError.KERNEL32(00000000,00000000,00000001,00000007,000000FF), ref: 00F19ED8
                                                                                                            • GetACP.KERNEL32(?,?,?,?,?,?,00F172F0,?,?,?,?,?,-00000050,?,?,?), ref: 00F22C07
                                                                                                            • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00F172F0,?,?,?,?,?,-00000050,?,?), ref: 00F22C3E
                                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00F22DA1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$CodeInfoLocalePageValid
                                                                                                            • String ID: utf8
                                                                                                            • API String ID: 607553120-905460609
                                                                                                            • Opcode ID: 2c407024d4af695ea9e6f10c907f0e1b455eb99f04ba3f96162332132f6fb1f7
                                                                                                            • Instruction ID: 0b84c8fda85aaa1207f92cd817fb120d2bb13be7ed772373492de91cb7bc9fe9
                                                                                                            • Opcode Fuzzy Hash: 2c407024d4af695ea9e6f10c907f0e1b455eb99f04ba3f96162332132f6fb1f7
                                                                                                            • Instruction Fuzzy Hash: 44711C35A00326BADB74AF74EC82FBA73A8EF44720F544429F945D7181EB78E940E760
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: d832fe2a0f42001a57c9b2c34ab75cd1b9a187cae735d2738bff895b2773b599
                                                                                                            • Instruction ID: 965086ac0b38eed6816fbb937855bed4742130407901d10d9f4492370dff099b
                                                                                                            • Opcode Fuzzy Hash: d832fe2a0f42001a57c9b2c34ab75cd1b9a187cae735d2738bff895b2773b599
                                                                                                            • Instruction Fuzzy Hash: CD023C71E012199BDF14CFA9D9806AEFBF1FF48324F248269D919E7381D731A941EB90
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • RtlDecodePointer.NTDLL(?), ref: 00F279EC
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: DecodePointer
                                                                                                            • String ID: `-$acos$asin$exp$log$log10$pow$sqrt
                                                                                                            • API String ID: 3527080286-3258016019
                                                                                                            • Opcode ID: 5a862ee733c03b4010c3982e89660a5e0798c18e3d394bcc389eadaa6c7573e5
                                                                                                            • Instruction ID: 6f722c76beedb477189669f4bc2885495fb00a2fe7510cc17da0cff0f048cdf9
                                                                                                            • Opcode Fuzzy Hash: 5a862ee733c03b4010c3982e89660a5e0798c18e3d394bcc389eadaa6c7573e5
                                                                                                            • Instruction Fuzzy Hash: 0A51B071D0872ACBCF14BF68F8482ADBBB0FB85320F544184D481A7268CB798A65AF55
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00EEA09D
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00EEA0BF
                                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00EEA0E7
                                                                                                            • __Getctype.LIBCPMT ref: 00EEA1C5
                                                                                                            • std::_Facet_Register.LIBCPMT ref: 00EEA1F9
                                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00EEA223
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                                                                                            • String ID: PD$PG$E
                                                                                                            • API String ID: 1102183713-3756609794
                                                                                                            • Opcode ID: 9c2df188ab95fe905e8478ea0bcac27bc05840f87d17991198edfb1d1c3545a5
                                                                                                            • Instruction ID: deacb9ea31fb4b4d0c4d80f0ca52f41c151ccdbb139181dbd23e1733bd06b164
                                                                                                            • Opcode Fuzzy Hash: 9c2df188ab95fe905e8478ea0bcac27bc05840f87d17991198edfb1d1c3545a5
                                                                                                            • Instruction Fuzzy Hash: 29519BB0D01349DBCB21CF58C9457AEBBB4BB14314F18816DD885AB381D779AE44DBD2
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • _ValidateLocalCookies.LIBCMT ref: 00F072F7
                                                                                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 00F072FF
                                                                                                            • _ValidateLocalCookies.LIBCMT ref: 00F07388
                                                                                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 00F073B3
                                                                                                            • _ValidateLocalCookies.LIBCMT ref: 00F07408
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                            • String ID: `-$csm
                                                                                                            • API String ID: 1170836740-3034041616
                                                                                                            • Opcode ID: 1674b9b339ccec35e5dfa253cd5e11a6545cc6ec2ecdbe389fe01fc7b4baf0e5
                                                                                                            • Instruction ID: 13a367bd49ec94ec1951c238fc14eb3a30a9df9c450c99411aa1e5c9522df07e
                                                                                                            • Opcode Fuzzy Hash: 1674b9b339ccec35e5dfa253cd5e11a6545cc6ec2ecdbe389fe01fc7b4baf0e5
                                                                                                            • Instruction Fuzzy Hash: 4541A334E04309DBCF20EF68CC85A9EBBA5AF44324F148195EC189B392D775E915FB91
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00EEC45A
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00EEC47C
                                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00EEC4A4
                                                                                                            • std::_Facet_Register.LIBCPMT ref: 00EEC59A
                                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00EEC5C4
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                                                                            • String ID: E$PD
                                                                                                            • API String ID: 459529453-4195941332
                                                                                                            • Opcode ID: 98f2a2c7fbb4d011e879129468f07a2768d533663204f8835094bd7f025ac2e5
                                                                                                            • Instruction ID: 442b3aad8534b6fe10fdb1ab922b330f06c10957af4453e6269a3eab4c7b1fbc
                                                                                                            • Opcode Fuzzy Hash: 98f2a2c7fbb4d011e879129468f07a2768d533663204f8835094bd7f025ac2e5
                                                                                                            • Instruction Fuzzy Hash: 6D5193B0900299DFDB21DF98C954BAEBBF0FB00314F248159E4556B381D77AAA06DBD1
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _strrchr
                                                                                                            • String ID:
                                                                                                            • API String ID: 3213747228-0
                                                                                                            • Opcode ID: 88e4da6258101c5fc24b34185784eb547dfa0330ad300027970d950eece25734
                                                                                                            • Instruction ID: 8292fd284351b9f5d5e1086bc22a14787f10cc715afcb5b2d426583c4b6c667e
                                                                                                            • Opcode Fuzzy Hash: 88e4da6258101c5fc24b34185784eb547dfa0330ad300027970d950eece25734
                                                                                                            • Instruction Fuzzy Hash: 98B14632E00365DFDB258F24CC82BEEBBA5EF59360F144155E904AF282D774D981E7A0
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • FreeLibrary.KERNEL32(00000000,?,00F1B47F,?,?,00000000,00000001,?,?,00F1B6A9,00000022,FlsSetValue,0102EB88,0102EB90,00000001), ref: 00F1B431
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FreeLibrary
                                                                                                            • String ID: api-ms-$ext-ms-
                                                                                                            • API String ID: 3664257935-537541572
                                                                                                            • Opcode ID: 06bb89a81a6c1e979f2647cce99ef22564dc967ab0f0d7e88c0554fce6907eab
                                                                                                            • Instruction ID: 4d1a72a608376819229a9a5759beee0f76497438d3c627c42544506fe3b8aab3
                                                                                                            • Opcode Fuzzy Hash: 06bb89a81a6c1e979f2647cce99ef22564dc967ab0f0d7e88c0554fce6907eab
                                                                                                            • Instruction Fuzzy Hash: BD21D232E41221EBCB31DF65DC41ADB3758DB41770F244224E855A7286DB35ED90E7D0
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,200B473F,?,?,00000000,0101E6D5,000000FF,?,00F135FF,?,?,00F135D3,00000016), ref: 00F13658
                                                                                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00F1366A
                                                                                                            • FreeLibrary.KERNEL32(00000000,?,00000000,0101E6D5,000000FF,?,00F135FF,?,?,00F135D3,00000016), ref: 00F1368C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                            • String ID: CorExitProcess$`-$mscoree.dll
                                                                                                            • API String ID: 4061214504-1261224117
                                                                                                            • Opcode ID: 17d530b21b348772e8e68526ae3a2405fc4fcf4dbaeb4836c140ce7510d07034
                                                                                                            • Instruction ID: dbd225b1bebb7d3e8372a11e60a64b3363f0d2961e77b92a066493a44535c0f1
                                                                                                            • Opcode Fuzzy Hash: 17d530b21b348772e8e68526ae3a2405fc4fcf4dbaeb4836c140ce7510d07034
                                                                                                            • Instruction Fuzzy Hash: 0401DB31A44729FFCB218F55DC09FAEB7B8FB04B64F104529F851A2694DBB99E00CB40
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: 191.96.150.225$4oST$4oST$4oST
                                                                                                            • API String ID: 0-2793144940
                                                                                                            • Opcode ID: d78431c4f173b46f3c3ba5b787b69808896c4e00d65c1ac2ec14d1bb3b853307
                                                                                                            • Instruction ID: e7027a46aa1f5d3a43d52d64bf40110e3e820eaac5e416926e4f903c8553f4e3
                                                                                                            • Opcode Fuzzy Hash: d78431c4f173b46f3c3ba5b787b69808896c4e00d65c1ac2ec14d1bb3b853307
                                                                                                            • Instruction Fuzzy Hash: 6002F170D04288DEEF15DFA8C9457DEBBB0AB14304F648099E8457B382D7B55E88DBA2
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • __EH_prolog3.LIBCMT ref: 00F02720
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00F0272B
                                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00F02799
                                                                                                              • Part of subcall function 00F0287C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00F02894
                                                                                                            • std::locale::_Setgloballocale.LIBCPMT ref: 00F02746
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                                                                                            • String ID: `-
                                                                                                            • API String ID: 677527491-2038111592
                                                                                                            • Opcode ID: a9150a04b1540db7bbfa24661fca4c91e4e8d09dbbfefc9513da4f47a721a7ea
                                                                                                            • Instruction ID: d0126d4e08999580690f8b9970cf09734ba60641ebbe245d06c2a1c6c5183f4d
                                                                                                            • Opcode Fuzzy Hash: a9150a04b1540db7bbfa24661fca4c91e4e8d09dbbfefc9513da4f47a721a7ea
                                                                                                            • Instruction Fuzzy Hash: 2D01BC79A00221DBC71AEB20D84957E77A5FF84750B18804AE845573C6CFBCAA02FB91
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 00F02BCC
                                                                                                            • RtlAcquireSRWLockExclusive.NTDLL(00000008), ref: 00F02BEB
                                                                                                            • RtlAcquireSRWLockExclusive.NTDLL(00000008), ref: 00F02C19
                                                                                                            • RtlTryAcquireSRWLockExclusive.NTDLL(00000008), ref: 00F02C74
                                                                                                            • RtlTryAcquireSRWLockExclusive.NTDLL(00000008), ref: 00F02C8B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AcquireExclusiveLock$CurrentThread
                                                                                                            • String ID:
                                                                                                            • API String ID: 66001078-0
                                                                                                            • Opcode ID: bda4bc55ecc271cce9c22c3261cd455c453a1c79d1bfb27d879d50a840e6589e
                                                                                                            • Instruction ID: 26fff1fa150eda82dfa4a96f56ed89eaee9e107b56dd628967e1ce3d7393b778
                                                                                                            • Opcode Fuzzy Hash: bda4bc55ecc271cce9c22c3261cd455c453a1c79d1bfb27d879d50a840e6589e
                                                                                                            • Instruction Fuzzy Hash: 66413C31A0060ADBEB61CF69C58896EB3B8FF09370B608929D446D7680D735E984FB71
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • ___std_exception_destroy.LIBVCRUNTIME ref: 00ED750C
                                                                                                            • ___std_exception_destroy.LIBVCRUNTIME ref: 00ED7522
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ___std_exception_destroy
                                                                                                            • String ID: )$[json.exception.
                                                                                                            • API String ID: 4194217158-1768919221
                                                                                                            • Opcode ID: bc67657c03e45bef553fa49a0b1686069d411c669a4a5ff101fa639903057645
                                                                                                            • Instruction ID: 9544c63f198ff8ddb406a4da1cfffb7d29a0c210cb79a55dc377874d00996986
                                                                                                            • Opcode Fuzzy Hash: bc67657c03e45bef553fa49a0b1686069d411c669a4a5ff101fa639903057645
                                                                                                            • Instruction Fuzzy Hash: 6A51DFB1D04688DFDB00DFA8C905B9EBBF4EF51314F14426DE850AB382E7B85A44D7A1
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00ED499F
                                                                                                              • Part of subcall function 00F051EB: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,76A923A0,?,00F01CF9,?,010469D8,76A923A0,?,76A923A0,-01056880), ref: 00F0524B
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ExceptionIos_base_dtorRaisestd::ios_base::_
                                                                                                            • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                            • API String ID: 1903096808-1866435925
                                                                                                            • Opcode ID: 70392d6e5e0c9c9ad2c6c52a4f1463cdb4ec05ad5c66c235a1f7da3a7e39e9d1
                                                                                                            • Instruction ID: 90caeb077ad6baf0ab23b9a98f579622d2de92f28fb51d477fa6cbc31d59b16f
                                                                                                            • Opcode Fuzzy Hash: 70392d6e5e0c9c9ad2c6c52a4f1463cdb4ec05ad5c66c235a1f7da3a7e39e9d1
                                                                                                            • Instruction Fuzzy Hash: EF1159B29046446BCB10DF5DCC02B96739CE744710F04461AF998A73C1EB35A901D792
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • GetConsoleOutputCP.KERNEL32(200B473F,00000000,00000000,?), ref: 00F18EF2
                                                                                                              • Part of subcall function 00F1EC43: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00F1A854,?,00000000,-00000008), ref: 00F1ECA4
                                                                                                            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00F19144
                                                                                                            • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00F1918A
                                                                                                            • GetLastError.KERNEL32 ref: 00F1922D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                                            • String ID:
                                                                                                            • API String ID: 2112829910-0
                                                                                                            • Opcode ID: e932309d9084d4854d4d9455985d1f467b889794c82efe5f262fa3ab53693b85
                                                                                                            • Instruction ID: 20b43516eaff8c362dd043f5227dfc3649131f47e9b07f3ba657bd2270b53b90
                                                                                                            • Opcode Fuzzy Hash: e932309d9084d4854d4d9455985d1f467b889794c82efe5f262fa3ab53693b85
                                                                                                            • Instruction Fuzzy Hash: 53D19E75D04248AFCF15CFA8C894AEDBBB5FF09310F24456AE45AEB341D770A982DB90
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • WriteConsoleW.KERNEL32(?,?,?,00000000,?,?,00F23DBC,?,00000001,?,?,?,00F19281,?,00000000,00000000), ref: 00F26D39
                                                                                                            • GetLastError.KERNEL32(?,00F23DBC,?,00000001,?,?,?,00F19281,?,00000000,00000000,?,?,?,00F1985B,?), ref: 00F26D45
                                                                                                              • Part of subcall function 00F26D0B: CloseHandle.KERNEL32(FFFFFFFE,00F26D55,?,00F23DBC,?,00000001,?,?,?,00F19281,?,00000000,00000000,?,?), ref: 00F26D1B
                                                                                                            • ___initconout.LIBCMT ref: 00F26D55
                                                                                                              • Part of subcall function 00F26CCD: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00F26CFC,00F23DA9,?,?,00F19281,?,00000000,00000000,?), ref: 00F26CE0
                                                                                                            • WriteConsoleW.KERNEL32(?,?,?,00000000,?,00F23DBC,?,00000001,?,?,?,00F19281,?,00000000,00000000,?), ref: 00F26D6A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                                            • String ID:
                                                                                                            • API String ID: 2744216297-0
                                                                                                            • Opcode ID: a0f206abd5ceafdc87b7dc2b229ca4b9420c3302b91b56fe9b638eb50be51c6a
                                                                                                            • Instruction ID: 3a82a8ffe762f2f7baecbf4788d4fbf284e58c6e0228861067fa4e0c52f170e9
                                                                                                            • Opcode Fuzzy Hash: a0f206abd5ceafdc87b7dc2b229ca4b9420c3302b91b56fe9b638eb50be51c6a
                                                                                                            • Instruction Fuzzy Hash: 80F01C36640128FBCF332F91EC09A8A3F66EF083B1B104410FA4886520DA3B8C20EB91
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • ___std_exception_copy.LIBVCRUNTIME ref: 00ED3819
                                                                                                            • ___std_exception_destroy.LIBVCRUNTIME ref: 00ED38F0
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ___std_exception_copy___std_exception_destroy
                                                                                                            • String ID: )
                                                                                                            • API String ID: 2970364248-2934624886
                                                                                                            • Opcode ID: 690992b9fb7fc030c413dd110f1592885bfeed35f2f022f262cd3408bb90ecc9
                                                                                                            • Instruction ID: a645ee4dc1952db3092bcdd9601d6ca00439c0f5d8580dc55351a859b45b2cd5
                                                                                                            • Opcode Fuzzy Hash: 690992b9fb7fc030c413dd110f1592885bfeed35f2f022f262cd3408bb90ecc9
                                                                                                            • Instruction Fuzzy Hash: 9B6189B1C00258DFDB14CF98C844B9EFBB4FF18324F14825AE854AB682D7B95A44DBA1
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00ED499F
                                                                                                              • Part of subcall function 00F051EB: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,76A923A0,?,00F01CF9,?,010469D8,76A923A0,?,76A923A0,-01056880), ref: 00F0524B
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ExceptionIos_base_dtorRaisestd::ios_base::_
                                                                                                            • String ID: ios_base::badbit set$ios_base::failbit set
                                                                                                            • API String ID: 1903096808-1240500531
                                                                                                            • Opcode ID: b30f2f758f312465200f7dfc3edf6df6abfd946130e97f4d5d38bf436c9a2dee
                                                                                                            • Instruction ID: f1016421078fa87aebf298ce0fc182b9d53d5c1721b6ae68ffea73f2932dbdc4
                                                                                                            • Opcode Fuzzy Hash: b30f2f758f312465200f7dfc3edf6df6abfd946130e97f4d5d38bf436c9a2dee
                                                                                                            • Instruction Fuzzy Hash: E04101B1900248AFCB04DF58CC46BAEBBF8EB45710F14825EF454AB3C1DB759A01DBA1
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00ED4061
                                                                                                            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00ED40C4
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                                                                            • String ID: bad locale name
                                                                                                            • API String ID: 3988782225-1405518554
                                                                                                            • Opcode ID: a4323d80c2f3f878d8607007f3c8d0273f474ab8a97b616f079a961b875ad446
                                                                                                            • Instruction ID: 03393dcda8d14f95586f437f9f0c73e478f8acca2f641cbce3370ee6c7b4e0c3
                                                                                                            • Opcode Fuzzy Hash: a4323d80c2f3f878d8607007f3c8d0273f474ab8a97b616f079a961b875ad446
                                                                                                            • Instruction Fuzzy Hash: 3511D370805B84DED321CF68C90474BFFF4AF15714F14869DD09597B81D3B99A04D7A2
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • ___std_exception_copy.LIBVCRUNTIME ref: 00EE65C9
                                                                                                            • ___std_exception_copy.LIBVCRUNTIME ref: 00EE65FC
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ___std_exception_copy
                                                                                                            • String ID: )
                                                                                                            • API String ID: 2659868963-2934624886
                                                                                                            • Opcode ID: 814757037e5f316fe91600d1ef4577688e506ef0c6d66e8de91419e7252f90d5
                                                                                                            • Instruction ID: c3297941a8f8a9d42346c601b1068b77b4a50fdfc63bfab80b5ecac96ef49866
                                                                                                            • Opcode Fuzzy Hash: 814757037e5f316fe91600d1ef4577688e506ef0c6d66e8de91419e7252f90d5
                                                                                                            • Instruction Fuzzy Hash: B51130B5900758EFCB15CF99C980B86FBF8FF49720F10876AE9549BA41E774A540CBA0
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • ___std_exception_destroy.LIBVCRUNTIME ref: 00ED7A5C
                                                                                                            • ___std_exception_destroy.LIBVCRUNTIME ref: 00ED7A72
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ___std_exception_destroy
                                                                                                            • String ID: )
                                                                                                            • API String ID: 4194217158-2934624886
                                                                                                            • Opcode ID: 1f99f551c34034b1f3218ab23cae7dfd7684354d85880b8ee9bf81f168cb77f8
                                                                                                            • Instruction ID: 367f46a82ea203d57119bbff54ca0261c53fa8e0e00526900dcad18e8e68e5f4
                                                                                                            • Opcode Fuzzy Hash: 1f99f551c34034b1f3218ab23cae7dfd7684354d85880b8ee9bf81f168cb77f8
                                                                                                            • Instruction Fuzzy Hash: 97F06DB1805758EFC710DF98C90178DBBF8EB05B24F50066AE864A3780D77966048BA1
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • GetSystemTimePreciseAsFileTime.KERNEL32(?,00F03067,?,?,?,?,00F951DF), ref: 00F03645
                                                                                                            • GetSystemTimeAsFileTime.KERNEL32(?,200B473F,00000000,?,0101E6F2,000000FF,?,00F03067,?,?,?,?,00F951DF), ref: 00F03649
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Time$FileSystem$Precise
                                                                                                            • String ID: `-
                                                                                                            • API String ID: 743729956-2038111592
                                                                                                            • Opcode ID: e408632424cae917eb82a7aaa64d2c77d78a76ca8d5cccae0efe7ceba3780cb6
                                                                                                            • Instruction ID: dd412f006dbc54d6c2dd8197b1f0f2c4cf77b5851c1838746c249d93f524b7b9
                                                                                                            • Opcode Fuzzy Hash: e408632424cae917eb82a7aaa64d2c77d78a76ca8d5cccae0efe7ceba3780cb6
                                                                                                            • Instruction Fuzzy Hash: BCF0E532A04664EFC7228F54E800F5EB7A8FB08F60F10412AE812D7784CB7AA900DF80
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • InitializeCriticalSectionAndSpinCount.KERNEL32(00000016,00000001,00F089C2,00000001,00000016,00F08BD1,?,?,?,?,?,00000000), ref: 00F1B826
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000007.00000002.3549710928.0000000000ED1000.00000040.00000001.01000000.00000004.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                            • Associated: 00000007.00000002.3549690908.0000000000ED0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001052000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549710928.0000000001062000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.000000000106C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001071000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3549931920.0000000001074000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001077000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011A7000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.00000000011C1000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001250000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.0000000001568000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            • Associated: 00000007.00000002.3550023689.000000000180D000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_7_2_ed0000_MPGPH131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CountCriticalInitializeSectionSpin
                                                                                                            • String ID: InitializeCriticalSectionEx$`-
                                                                                                            • API String ID: 2593887523-2357131798
                                                                                                            • Opcode ID: 4bac6ec2d35737975f50f0c4d152465a7e01afdb46711eb89938686d23307b29
                                                                                                            • Instruction ID: 75df097798edd60650b3bbbc97edb11a6f3aff24193b1abb626c6bbced84df7f
                                                                                                            • Opcode Fuzzy Hash: 4bac6ec2d35737975f50f0c4d152465a7e01afdb46711eb89938686d23307b29
                                                                                                            • Instruction Fuzzy Hash: 25E09232681228FBCB312E51DC05EEE7F16EF08B70F008024F9195A521CBB65862FBD0
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • setsockopt.WS2_32(000003D0,0000FFFF,00001006,?,00000008), ref: 00894F56
                                                                                                            • recv.WS2_32(?,00000004,00000002), ref: 00894F71
                                                                                                            • WSAGetLastError.WS2_32 ref: 00894F75
                                                                                                            • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 00894FF3
                                                                                                            • recv.WS2_32(00000000,0000000C,00000008), ref: 00895014
                                                                                                            • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?), ref: 008950B0
                                                                                                            • recv.WS2_32(00000000,?,00000008), ref: 008950CB
                                                                                                              • Part of subcall function 00895940: WSAStartup.WS2_32 ref: 0089596A
                                                                                                              • Part of subcall function 00895940: getaddrinfo.WS2_32(?,?,?,00956328), ref: 008959EC
                                                                                                              • Part of subcall function 00895940: socket.WS2_32(?,?,?), ref: 00895A0D
                                                                                                              • Part of subcall function 00895940: connect.WS2_32(00000000,00926B31,?), ref: 00895A21
                                                                                                              • Part of subcall function 00895940: closesocket.WS2_32(00000000), ref: 00895A2D
                                                                                                              • Part of subcall function 00895940: FreeAddrInfoW.WS2_32(?), ref: 00895A3A
                                                                                                              • Part of subcall function 00895940: WSACleanup.WS2_32 ref: 00895A40
                                                                                                            • recv.WS2_32(?,00000004,00000008), ref: 008951D3
                                                                                                            • __Xtime_get_ticks.LIBCPMT ref: 008951DA
                                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008951E8
                                                                                                            • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 00895261
                                                                                                            • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 00895269
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: recv$Sleepsetsockopt$AddrCleanupErrorFreeInfoLastStartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectgetaddrinfosocket
                                                                                                            • String ID:
                                                                                                            • API String ID: 3089209366-0
                                                                                                            • Opcode ID: 1b7ddc9fbf883da0edb6a7def89b5196b10e1121c07cd45aa46b28c447499ad9
                                                                                                            • Instruction ID: 6e86e9e7226468afdd66fd0cc0e27f825b3e493c99c5dd631237143dcab97fbd
                                                                                                            • Opcode Fuzzy Hash: 1b7ddc9fbf883da0edb6a7def89b5196b10e1121c07cd45aa46b28c447499ad9
                                                                                                            • Instruction Fuzzy Hash: B9B1A971D14308DFEB21EFA8DC49BADBBB1FB45310F244219E454AB2E2D7745984DB82
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 56 895940-895972 WSAStartup 57 895978-8959a2 call 8b77d0 * 2 56->57 58 895a46-895a4f 56->58 63 8959ae-8959f4 getaddrinfo 57->63 64 8959a4-8959a8 57->64 65 895a40 WSACleanup 63->65 66 8959f6-8959fc 63->66 64->58 64->63 65->58 67 8959fe 66->67 68 895a54-895a5e FreeAddrInfoW 66->68 69 895a04-895a18 socket 67->69 68->65 70 895a60-895a68 68->70 69->65 71 895a1a-895a2a connect 69->71 72 895a2c-895a34 closesocket 71->72 73 895a50 71->73 72->69 74 895a36-895a3a FreeAddrInfoW 72->74 73->68 74->65
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddrFreeInfo$CleanupStartupclosesocketconnectgetaddrinfosocket
                                                                                                            • String ID:
                                                                                                            • API String ID: 448659506-0
                                                                                                            • Opcode ID: 25a1c611f5687a25a4a822b714b17a903dcc48d16fcf41c6c17c231859bfdf43
                                                                                                            • Instruction ID: 336365447e4156bdf3345bdc5744a15cace43b23a0d66271664081053ee80302
                                                                                                            • Opcode Fuzzy Hash: 25a1c611f5687a25a4a822b714b17a903dcc48d16fcf41c6c17c231859bfdf43
                                                                                                            • Instruction Fuzzy Hash: FB31D0325087109FDB21EF64DC84A6ABBE5FB84734F14071DF8A5D32E0D73098059B96
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 75 7d9280-7d92dd call 7e63b0 78 7d9413-7d9521 call 7d2df0 call 8b77d0 75->78 79 7d92e3-7d92e9 75->79 95 7d9537-7d953f call 7e8dc0 78->95 96 7d9523-7d9535 78->96 81 7d92f0-7d9313 79->81 83 7d9315-7d931f 81->83 84 7d9324-7d9331 81->84 86 7d9403-7d9406 83->86 87 7d9333-7d933d 84->87 88 7d9342-7d934f 84->88 92 7d9409-7d940d 86->92 87->86 89 7d9351-7d935b 88->89 90 7d9360-7d936d 88->90 89->86 93 7d936f-7d9379 90->93 94 7d937e-7d938b 90->94 92->78 92->81 93->86 97 7d938d-7d9397 94->97 98 7d9399-7d93a6 94->98 99 7d9544-7d9597 call 8b77d0 * 2 95->99 96->99 97->86 101 7d93a8-7d93b2 98->101 102 7d93b4-7d93c1 98->102 112 7d9599-7d95c8 call 8b77d0 call 805260 99->112 113 7d95cb-7d95e1 call 8b77d0 99->113 101->86 104 7d93cf-7d93dc 102->104 105 7d93c3-7d93cd 102->105 107 7d93de-7d93e8 104->107 108 7d93ea-7d93f4 104->108 105->86 107->86 108->92 111 7d93f6-7d93ff 108->111 111->86 112->113 118 7d95e7-7d95ed 113->118 119 7d96e2 113->119 122 7d95f0-7d96ce GetModuleHandleA GetProcAddress WSASend 118->122 123 7d96e6-7d96f0 119->123 124 7d975f-7d9763 122->124 125 7d96d4-7d96dc 122->125 126 7d971e-7d973d 123->126 127 7d96f2-7d96fe 123->127 124->123 125->119 125->122 130 7d976f-7d9796 126->130 131 7d973f-7d974b 126->131 128 7d9714-7d971b call 8038e3 127->128 129 7d9700-7d970e 127->129 128->126 129->128 134 7d9797-7d97fe call 808c60 call 7d2df0 * 2 129->134 132 7d974d-7d975b 131->132 133 7d9765-7d976c call 8038e3 131->133 132->134 136 7d975d 132->136 133->130 136->133
                                                                                                            APIs
                                                                                                            • GetModuleHandleA.KERNEL32(Ws2_32.dll,?,?,?,?,0091A4DC,00000000,76A923A0,-00956880), ref: 007D96A6
                                                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 007D96B4
                                                                                                            • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,0091A4DC,00000000,76A923A0,-00956880), ref: 007D96C9
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressHandleModuleProcSend
                                                                                                            • String ID: 4oST$4oST$Ws2_32.dll
                                                                                                            • API String ID: 2819740048-1839276265
                                                                                                            • Opcode ID: 106db1294e063374b3fae26b1ac27230dbbbc6077db979c6e8379a9026ba52c4
                                                                                                            • Instruction ID: be2180a1b7ed132c82aeb594269f9aa2f99de3817db59004f6f6611865787bb5
                                                                                                            • Opcode Fuzzy Hash: 106db1294e063374b3fae26b1ac27230dbbbc6077db979c6e8379a9026ba52c4
                                                                                                            • Instruction Fuzzy Hash: 0F02E070E04288DFDF25CFA4C8907EDBBB0FF55314F24429AE4896B686D7741986CB92
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 204 819779-81979b 205 8197a1-8197a3 204->205 206 81998e 204->206 208 8197a5-8197c4 call 808bd3 205->208 209 8197cf-8197f2 205->209 207 819990-819994 206->207 217 8197c7-8197ca 208->217 211 8197f4-8197f6 209->211 212 8197f8-8197fe 209->212 211->212 213 819800-819811 211->213 212->208 212->213 215 819813-819821 call 81262d 213->215 216 819824-819834 call 8192be 213->216 215->216 222 819836-81983c 216->222 223 81987d-81988f 216->223 217->207 226 819865-81987b call 818e8f 222->226 227 81983e-819841 222->227 224 819891-819897 223->224 225 8198e6-819906 WriteFile 223->225 231 8198d2-8198e4 call 81933b 224->231 232 819899-81989c 224->232 228 819911 225->228 229 819908-81990e GetLastError 225->229 242 81985e-819860 226->242 233 819843-819846 227->233 234 81984c-81985b call 819256 227->234 236 819914-81991f 228->236 229->228 254 8198b9-8198bc 231->254 237 8198be-8198d0 call 8194ff 232->237 238 81989e-8198a1 232->238 233->234 239 819926-819929 233->239 234->242 243 819921-819924 236->243 244 819989-81998c 236->244 237->254 245 81992c-81992e 238->245 246 8198a7-8198b4 call 819416 238->246 239->245 242->236 243->239 244->207 250 819930-819935 245->250 251 81995c-819968 245->251 246->254 255 819937-819949 250->255 256 81994e-819957 call 8116b8 250->256 257 819972-819984 251->257 258 81996a-819970 251->258 254->242 255->217 256->217 257->217 258->206 258->257
                                                                                                            APIs
                                                                                                              • Part of subcall function 00818E8F: GetConsoleOutputCP.KERNEL32(2784C555,00000000,00000000,?), ref: 00818EF2
                                                                                                            • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 008198FE
                                                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00819908
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ConsoleErrorFileLastOutputWrite
                                                                                                            • String ID:
                                                                                                            • API String ID: 2915228174-0
                                                                                                            • Opcode ID: 048912398b30d9ac83e6426d764ab1423c094a4bd6d574c14d858dbea16cb1fa
                                                                                                            • Instruction ID: b2e3769e4d112b6cab075fe07ec3df52136722792741f55fd229e7b63727c57c
                                                                                                            • Opcode Fuzzy Hash: 048912398b30d9ac83e6426d764ab1423c094a4bd6d574c14d858dbea16cb1fa
                                                                                                            • Instruction Fuzzy Hash: C961AF72C14209ABDF118FA8C854AEEBFBDFF09318F140159E984E7252D332D981CBA1
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 261 818def-818e03 call 81e92e 264 818e05-818e07 261->264 265 818e09-818e11 261->265 266 818e57-818e77 call 81e89d 264->266 267 818e13-818e1a 265->267 268 818e1c-818e1f 265->268 278 818e89 266->278 279 818e79-818e87 call 8116b8 266->279 267->268 272 818e27-818e3b call 81e92e * 2 267->272 269 818e21-818e25 268->269 270 818e3d-818e4d call 81e92e FindCloseChangeNotification 268->270 269->270 269->272 270->264 282 818e4f-818e55 GetLastError 270->282 272->264 272->270 280 818e8b-818e8e 278->280 279->280 282->266
                                                                                                            APIs
                                                                                                            • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,00818CD6,00000000,?,00947178,0000000C,00818D92,?,?,?), ref: 00818E45
                                                                                                            • GetLastError.KERNEL32(?,00818CD6,00000000,?,00947178,0000000C,00818D92,?,?,?), ref: 00818E4F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ChangeCloseErrorFindLastNotification
                                                                                                            • String ID:
                                                                                                            • API String ID: 1687624791-0
                                                                                                            • Opcode ID: fe91adaf6e493d62f46b4e224fd9d622174d3db2a396129014046f136bc55219
                                                                                                            • Instruction ID: 89a5c868a2c7fd8c84a962af377bbe7b6366fee6294aaf6461df1058b7e40b1d
                                                                                                            • Opcode Fuzzy Hash: fe91adaf6e493d62f46b4e224fd9d622174d3db2a396129014046f136bc55219
                                                                                                            • Instruction Fuzzy Hash: 621108337142149ACA252638AC4BBEE6B4DFF82734F290659FD18D71D2DF219CC18292
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 286 81250c-812524 call 81e92e 289 812526-81252d 286->289 290 81253a-812550 SetFilePointerEx 286->290 291 812534-812538 289->291 292 812552-812563 GetLastError call 8116b8 290->292 293 812565-81256f 290->293 296 81258b-81258e 291->296 292->291 293->291 295 812571-812586 293->295 295->296
                                                                                                            APIs
                                                                                                            • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,00812616,?,?,?,?,?), ref: 00812548
                                                                                                            • GetLastError.KERNEL32(?,?,?,?,00812616,?,?,?,?,?,00000000,?,00000000), ref: 00812555
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorFileLastPointer
                                                                                                            • String ID:
                                                                                                            • API String ID: 2976181284-0
                                                                                                            • Opcode ID: 997804704bfaa272cef691742ff6a32b585054e4a32e56ae1b2b78af1df34299
                                                                                                            • Instruction ID: 3bba7553e9e58b7c5ef6f47585c63d2c6f443b44533566bd43e33da8ac780972
                                                                                                            • Opcode Fuzzy Hash: 997804704bfaa272cef691742ff6a32b585054e4a32e56ae1b2b78af1df34299
                                                                                                            • Instruction Fuzzy Hash: 8001A133614219AFCF058F59DC559DA3B2EEF85324B240208F811DB291E671E9A2DB90
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 298 7d32d0-7d32e0 299 7d3306-7d3308 298->299 300 7d32e2-7d32e7 298->300 301 7d3318-7d331e 299->301 302 7d330a-7d3317 call 803662 299->302 303 7d331f call 7d2b50 300->303 304 7d32e9-7d32ea call 803662 300->304 310 7d3324-7d3329 call 808c60 303->310 308 7d32ef-7d32f6 304->308 308->310 311 7d32f8-7d3305 308->311
                                                                                                            APIs
                                                                                                            • Concurrency::cancel_current_task.LIBCPMT ref: 007D331F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Concurrency::cancel_current_task
                                                                                                            • String ID:
                                                                                                            • API String ID: 118556049-0
                                                                                                            • Opcode ID: 88e0f75f83d5f9e69285ef2088a1dfdc1055322beeb667a90db4e8c6ac7f301f
                                                                                                            • Instruction ID: bea65e72d45d46e7c162c74e29012c09cc626ba225c725f61120c3324b9872ea
                                                                                                            • Opcode Fuzzy Hash: 88e0f75f83d5f9e69285ef2088a1dfdc1055322beeb667a90db4e8c6ac7f301f
                                                                                                            • Instruction Fuzzy Hash: 42F0B4721001049BDB146F68D9158E9B3F8EF243A1710097BE89DD7362EB2ADA518792
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 314 81a64c-81a657 315 81a665-81a66b 314->315 316 81a659-81a663 314->316 318 81a684-81a695 RtlAllocateHeap 315->318 319 81a66d-81a66e 315->319 316->315 317 81a699-81a6a4 call 8116ef 316->317 323 81a6a6-81a6a8 317->323 320 81a670-81a677 call 818270 318->320 321 81a697 318->321 319->318 320->317 327 81a679-81a682 call 815a79 320->327 321->323 327->317 327->318
                                                                                                            APIs
                                                                                                            • RtlAllocateHeap.NTDLL(00000008,?,00000001), ref: 0081A68D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AllocateHeap
                                                                                                            • String ID:
                                                                                                            • API String ID: 1279760036-0
                                                                                                            • Opcode ID: 294c59123d40f5ad6bbfbdb2565f10badd70ac09e808d83027d683b215f807f8
                                                                                                            • Instruction ID: 045f11d99f738d43e69370e8c3105f5748dd0aefbbaeb6fa073cc496f1d89b70
                                                                                                            • Opcode Fuzzy Hash: 294c59123d40f5ad6bbfbdb2565f10badd70ac09e808d83027d683b215f807f8
                                                                                                            • Instruction Fuzzy Hash: 12F0B4762166256B9B2A6B66DC05AEA374DFF61770F1D4111A808EA190DA34DC8086E3
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 330 81b086-81b092 331 81b0c4-81b0cf call 8116ef 330->331 332 81b094-81b096 330->332 340 81b0d1-81b0d3 331->340 333 81b098-81b099 332->333 334 81b0af-81b0c0 RtlAllocateHeap 332->334 333->334 336 81b0c2 334->336 337 81b09b-81b0a2 call 818270 334->337 336->340 337->331 342 81b0a4-81b0ad call 815a79 337->342 342->331 342->334
                                                                                                            APIs
                                                                                                            • RtlAllocateHeap.NTDLL(00000000,00000001,?), ref: 0081B0B8
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AllocateHeap
                                                                                                            • String ID:
                                                                                                            • API String ID: 1279760036-0
                                                                                                            • Opcode ID: 4e6613db3e9c2cb822d229d8a2bbc9c0554def66414f3c5a2044debd6f3076f3
                                                                                                            • Instruction ID: fbb3efddbc8482f89436e33f8860afaa7fcf585d24d75a1322183a48dfaa3d2a
                                                                                                            • Opcode Fuzzy Hash: 4e6613db3e9c2cb822d229d8a2bbc9c0554def66414f3c5a2044debd6f3076f3
                                                                                                            • Instruction Fuzzy Hash: D1E03032155E246BEA3137769C05BDB364DFF457A0F150161ED25D70D1DB258CC092E2
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • VirtualAllocEx.KERNEL32(00000000,00000000,?,00003000,00000040), ref: 0089C6A1
                                                                                                            • WriteProcessMemory.KERNEL32(00000000,00000000,?,?,00000000), ref: 0089C6BD
                                                                                                            • WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0089C6F2
                                                                                                            • VirtualAllocEx.KERNEL32(?,00000000,00001000,00003000,00000040), ref: 0089C71B
                                                                                                            • WriteProcessMemory.KERNEL32(?,00000000,?,00000218,00000000), ref: 0089C8BF
                                                                                                            • WriteProcessMemory.KERNEL32(?,00000218,0089C990,-00000010,00000000), ref: 0089C8E1
                                                                                                            • CreateRemoteThread.KERNEL32(?,00000000,00000000,00000218,00000000,00000000,00000000), ref: 0089C8F4
                                                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0089C8FD
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MemoryProcessWrite$AllocVirtual$CreateObjectRemoteSingleThreadWait
                                                                                                            • String ID: %s|%s$131$4oST
                                                                                                            • API String ID: 2137838514-1634972829
                                                                                                            • Opcode ID: 81b8390d0415907fab83b6cb263bb0acf9cd9b7e562509221941a8c2d4ea3612
                                                                                                            • Instruction ID: 46da1f73b6e19bb471609888f761cf37dfa15b8874074d1a8c5cbfdf4b4f5326
                                                                                                            • Opcode Fuzzy Hash: 81b8390d0415907fab83b6cb263bb0acf9cd9b7e562509221941a8c2d4ea3612
                                                                                                            • Instruction Fuzzy Hash: B7B18AB1D00208DFDB14CFA8CC85BAEBBB4FF48300F144259E919AB291D775AA45DFA5
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002,00000000,?,?,?,008235F3,?,?), ref: 0082337A
                                                                                                            • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002,00000000,?,?,?,008235F3,?,?), ref: 008233A3
                                                                                                            • GetACP.KERNEL32(?,?,008235F3,?,?), ref: 008233B8
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: InfoLocale
                                                                                                            • String ID: ACP$OCP
                                                                                                            • API String ID: 2299586839-711371036
                                                                                                            • Opcode ID: 40bf63b525b9dbf59ddf67b33ff45fd3419bbcfac6487e15173fd5d3ac6aff46
                                                                                                            • Instruction ID: c7a3183bafc02342f29cbc167ee956e8bf18c278a50e4c9d950a0f90b04f41a5
                                                                                                            • Opcode Fuzzy Hash: 40bf63b525b9dbf59ddf67b33ff45fd3419bbcfac6487e15173fd5d3ac6aff46
                                                                                                            • Instruction Fuzzy Hash: 18219262604128EAD734CB19F929A9AB3A6FB50B54B568424E905D7304EF36DFC1D350
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                              • Part of subcall function 00819E32: GetLastError.KERNEL32(00000000,?,0081F819), ref: 00819E36
                                                                                                              • Part of subcall function 00819E32: SetLastError.KERNEL32(00000000,00000000,00000001,00000007,000000FF), ref: 00819ED8
                                                                                                            • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 008235C5
                                                                                                            • IsValidCodePage.KERNEL32(?), ref: 00823603
                                                                                                            • IsValidLocale.KERNEL32(?,00000001), ref: 00823616
                                                                                                            • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0082365E
                                                                                                            • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 00823679
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                                            • String ID:
                                                                                                            • API String ID: 415426439-0
                                                                                                            • Opcode ID: aa5a0e391c0aecdd025c04c2d08665a61cb2b4df25685d2e1d496c3fdcb1f13b
                                                                                                            • Instruction ID: ecaef8d07c1307a5234e8b56a0905f4b4e3dabeed2a2d7b3a736ce15233a949f
                                                                                                            • Opcode Fuzzy Hash: aa5a0e391c0aecdd025c04c2d08665a61cb2b4df25685d2e1d496c3fdcb1f13b
                                                                                                            • Instruction Fuzzy Hash: D751AF72A00229ABDB10DFA9EC55ABE77B8FF18700F140469F914E7191EB74DB80DB61
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                              • Part of subcall function 00819E32: GetLastError.KERNEL32(00000000,?,0081F819), ref: 00819E36
                                                                                                              • Part of subcall function 00819E32: SetLastError.KERNEL32(00000000,00000000,00000001,00000007,000000FF), ref: 00819ED8
                                                                                                            • GetACP.KERNEL32(?,?,?,?,?,?,008172F0,?,?,?,?,?,-00000050,?,?,?), ref: 00822C07
                                                                                                            • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,008172F0,?,?,?,?,?,-00000050,?,?), ref: 00822C3E
                                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00822DA1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$CodeInfoLocalePageValid
                                                                                                            • String ID: utf8
                                                                                                            • API String ID: 607553120-905460609
                                                                                                            • Opcode ID: ac1b5b10c652016bb6726689f390f37803c966597a33088726cfd11d84f5028f
                                                                                                            • Instruction ID: 899a81144f78b3deadadc74141b71e2c42daac278dbe52c13da6525518c9e587
                                                                                                            • Opcode Fuzzy Hash: ac1b5b10c652016bb6726689f390f37803c966597a33088726cfd11d84f5028f
                                                                                                            • Instruction Fuzzy Hash: 3971073560032ABAEB24AF78EC42BBA73A8FF44710F14456AF905D7181EB74E9C08761
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: d832fe2a0f42001a57c9b2c34ab75cd1b9a187cae735d2738bff895b2773b599
                                                                                                            • Instruction ID: 37b13d2947d0ae4d9b960dddcee344b0124cac8afd6d72191613fd7506bd202f
                                                                                                            • Opcode Fuzzy Hash: d832fe2a0f42001a57c9b2c34ab75cd1b9a187cae735d2738bff895b2773b599
                                                                                                            • Instruction Fuzzy Hash: 7F021B71E012199FDF54CFA9DD806AEBBF1FF48314F248269E919E7381D731AA418B90
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • RtlDecodePointer.NTDLL(?), ref: 008279EC
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: DecodePointer
                                                                                                            • String ID: `-}$acos$asin$exp$log$log10$pow$sqrt
                                                                                                            • API String ID: 3527080286-4286532426
                                                                                                            • Opcode ID: cc40d8cafd56698bccec07c13221e873dad02deae3e1c87e06fad03d7aaf2697
                                                                                                            • Instruction ID: f7edd78f32b6013c6ebdde94fc670d1bc3537dc8346dc1146144c55093396c7f
                                                                                                            • Opcode Fuzzy Hash: cc40d8cafd56698bccec07c13221e873dad02deae3e1c87e06fad03d7aaf2697
                                                                                                            • Instruction Fuzzy Hash: F2519D7190863ECBDF149F6AF8881ADBFB0FF05324F544185D482E72A8C7748AA98B55
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 007EA09D
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 007EA0BF
                                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 007EA0E7
                                                                                                            • __Getctype.LIBCPMT ref: 007EA1C5
                                                                                                            • std::_Facet_Register.LIBCPMT ref: 007EA1F9
                                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 007EA223
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                                                                                            • String ID: PD}$PG}$E}
                                                                                                            • API String ID: 1102183713-2277173291
                                                                                                            • Opcode ID: c86a0db291ae0da2adb011635d6b48d9ce63847062f1ae3cdaab5fcd781ef7b4
                                                                                                            • Instruction ID: 7c5b70fbe05a1a466483aac5855022da61021467fb61eb58c0938c0dc9da154b
                                                                                                            • Opcode Fuzzy Hash: c86a0db291ae0da2adb011635d6b48d9ce63847062f1ae3cdaab5fcd781ef7b4
                                                                                                            • Instruction Fuzzy Hash: D451B7B0D01389DBCB20CF59C94579EBBF4FB14310F148259E845AB392E7B8AE44CB92
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • _ValidateLocalCookies.LIBCMT ref: 008072F7
                                                                                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 008072FF
                                                                                                            • _ValidateLocalCookies.LIBCMT ref: 00807388
                                                                                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 008073B3
                                                                                                            • _ValidateLocalCookies.LIBCMT ref: 00807408
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                            • String ID: `-}$csm
                                                                                                            • API String ID: 1170836740-3222909650
                                                                                                            • Opcode ID: 5d9ad308ff68efce409bba6c44b23a4fa96847bc26f3e256cd73b3474db45973
                                                                                                            • Instruction ID: 871731b281e40e72021002f7cadeec4e74f313da4ae43c1713a1a10a7a196a25
                                                                                                            • Opcode Fuzzy Hash: 5d9ad308ff68efce409bba6c44b23a4fa96847bc26f3e256cd73b3474db45973
                                                                                                            • Instruction Fuzzy Hash: DA41BD30E05209ABDF50DF68CC80A9EBBA5FF44318F558055EC18DB3D2DB31A945DB92
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 007EC45A
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 007EC47C
                                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 007EC4A4
                                                                                                            • std::_Facet_Register.LIBCPMT ref: 007EC59A
                                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 007EC5C4
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                                                                            • String ID: E}$PD}
                                                                                                            • API String ID: 459529453-4115384346
                                                                                                            • Opcode ID: 56893a5eae37edcbfe189891c739a88a95edcc1777d027bf78a17972d62bc846
                                                                                                            • Instruction ID: 31d88aa82b6ca9c42647f945801569511cad3d53e11599f29ecd25e98318b977
                                                                                                            • Opcode Fuzzy Hash: 56893a5eae37edcbfe189891c739a88a95edcc1777d027bf78a17972d62bc846
                                                                                                            • Instruction Fuzzy Hash: 5751D0B0901394DFDB12DF58C858BAEBBF0FB05314F248159E845AB391D7B9AA06CBD1
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _strrchr
                                                                                                            • String ID:
                                                                                                            • API String ID: 3213747228-0
                                                                                                            • Opcode ID: 88e4da6258101c5fc24b34185784eb547dfa0330ad300027970d950eece25734
                                                                                                            • Instruction ID: f5f06afb7bbefee7a0e7a8d5e454e59f34b5e13b4c033d5c598e6b7a596f419f
                                                                                                            • Opcode Fuzzy Hash: 88e4da6258101c5fc24b34185784eb547dfa0330ad300027970d950eece25734
                                                                                                            • Instruction Fuzzy Hash: EFB16532A003659FDB258F68DC82BEE7BA9FF19310F144165E904EB282D774D981C7A1
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • FreeLibrary.KERNEL32(00000000,?,0081B47F,?,?,00000000,00000001,?,?,0081B6A9,00000022,FlsSetValue,0092EB88,0092EB90,00000001), ref: 0081B431
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FreeLibrary
                                                                                                            • String ID: api-ms-$ext-ms-
                                                                                                            • API String ID: 3664257935-537541572
                                                                                                            • Opcode ID: 55c29efc1604dc9d4ba5e3f95040bdaf1ccc9b671dd6953d67f427d23e8d7ee9
                                                                                                            • Instruction ID: b1971dba9b28e0398cc906efc93cb3b02ef51e2402de2f699af77d0bff2d7c41
                                                                                                            • Opcode Fuzzy Hash: 55c29efc1604dc9d4ba5e3f95040bdaf1ccc9b671dd6953d67f427d23e8d7ee9
                                                                                                            • Instruction Fuzzy Hash: EF216632A15221BBCB319B25EC41EDA375CFF41360F244220F815E7292DB30EE91D6D1
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,2784C555,?,?,00000000,0091E6D5,000000FF,?,008135FF,?,?,008135D3,00000016), ref: 00813658
                                                                                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0081366A
                                                                                                            • FreeLibrary.KERNEL32(00000000,?,00000000,0091E6D5,000000FF,?,008135FF,?,?,008135D3,00000016), ref: 0081368C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                            • String ID: CorExitProcess$`-}$mscoree.dll
                                                                                                            • API String ID: 4061214504-2653274339
                                                                                                            • Opcode ID: a62ba6d38f93beb3fbe248c0f801f6f5bf24137e24c01e278e58c947faa14e42
                                                                                                            • Instruction ID: 03177c568388cc930c78dc77d8c7331b785980c62de31af26102d18af30f87e6
                                                                                                            • Opcode Fuzzy Hash: a62ba6d38f93beb3fbe248c0f801f6f5bf24137e24c01e278e58c947faa14e42
                                                                                                            • Instruction Fuzzy Hash: 7601A732958729EFCB118F54DC09FAEB7B8FB44B55F004125F811E22D0DB749A00DA40
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: 191.96.150.225$4oST$4oST$4oST
                                                                                                            • API String ID: 0-2793144940
                                                                                                            • Opcode ID: 0893f863b36c71bfad44d8b15563a56ea730cd3ccc21655829eaccfb02f83f01
                                                                                                            • Instruction ID: dc492f88a95dd8d523d188030957a19159d869f3537658e921f3c76e52bda5d6
                                                                                                            • Opcode Fuzzy Hash: 0893f863b36c71bfad44d8b15563a56ea730cd3ccc21655829eaccfb02f83f01
                                                                                                            • Instruction Fuzzy Hash: C802FF70D05288DFDF11EFA8C9457DDBBB0EB54304F588099D809AB382D7B55E88DBA2
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • __EH_prolog3.LIBCMT ref: 00802720
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 0080272B
                                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00802799
                                                                                                              • Part of subcall function 0080287C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00802894
                                                                                                            • std::locale::_Setgloballocale.LIBCPMT ref: 00802746
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                                                                                            • String ID: `-}
                                                                                                            • API String ID: 677527491-3104327004
                                                                                                            • Opcode ID: 5cfb0b46e98da6ad9da5f3075b2f2259c9dd45e6453dc8f0a6ec317b86d76d7d
                                                                                                            • Instruction ID: 7bd2cc3d5b397070b02aecfa5300e5a1bddaf610a9135a9561f094d1be334dc9
                                                                                                            • Opcode Fuzzy Hash: 5cfb0b46e98da6ad9da5f3075b2f2259c9dd45e6453dc8f0a6ec317b86d76d7d
                                                                                                            • Instruction Fuzzy Hash: 6801BC76A01A14CBC706EB24DC5957D7BA5FF84780B084059E801973D2CFB4AA42DB82
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 00802BCC
                                                                                                            • RtlAcquireSRWLockExclusive.NTDLL(00000008), ref: 00802BEB
                                                                                                            • RtlAcquireSRWLockExclusive.NTDLL(00000008), ref: 00802C19
                                                                                                            • RtlTryAcquireSRWLockExclusive.NTDLL(00000008), ref: 00802C74
                                                                                                            • RtlTryAcquireSRWLockExclusive.NTDLL(00000008), ref: 00802C8B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AcquireExclusiveLock$CurrentThread
                                                                                                            • String ID:
                                                                                                            • API String ID: 66001078-0
                                                                                                            • Opcode ID: d9ca676c21c6331c38f4e55c8aba283bf1d99197072b1d74da8abf3cf1c04381
                                                                                                            • Instruction ID: 4260c6b6c5a6eb8fea193fb060f34403357d31d58bc357712a198040c68bc699
                                                                                                            • Opcode Fuzzy Hash: d9ca676c21c6331c38f4e55c8aba283bf1d99197072b1d74da8abf3cf1c04381
                                                                                                            • Instruction Fuzzy Hash: 61417C31900A0ADFEB61DF69CC899AEB3F8FF08350B604929E456D7680D7B0F985DB51
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • ___std_exception_destroy.LIBVCRUNTIME ref: 007D750C
                                                                                                            • ___std_exception_destroy.LIBVCRUNTIME ref: 007D7522
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ___std_exception_destroy
                                                                                                            • String ID: )}$[json.exception.
                                                                                                            • API String ID: 4194217158-1226008984
                                                                                                            • Opcode ID: d6e9d0f24ea6a83ee7719589fcf9ae47bf6bd33e4a47be41c8d1de518d9703b6
                                                                                                            • Instruction ID: 251aeb26247be8b536f25434d9a59b126d1059f9c21f0dbb69e7fa78b5b670e2
                                                                                                            • Opcode Fuzzy Hash: d6e9d0f24ea6a83ee7719589fcf9ae47bf6bd33e4a47be41c8d1de518d9703b6
                                                                                                            • Instruction Fuzzy Hash: 1551D0B1D01388DFDB10DFA8C905B9EBBB4EF15314F144269E850A7382E7B85A44CBA2
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 007D499F
                                                                                                              • Part of subcall function 008051EB: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,76A923A0,?,00801CF9,?,009469D8,76A923A0,?,76A923A0,-00956880), ref: 0080524B
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ExceptionIos_base_dtorRaisestd::ios_base::_
                                                                                                            • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                            • API String ID: 1903096808-1866435925
                                                                                                            • Opcode ID: 311a4e745b3264bd14edd23473059c6188eed4b9df1c2d7a59db91108d00a63e
                                                                                                            • Instruction ID: 1f2160f6564f57ad996757ccf14adc4b7820e1307d0c6687aaa3de45dfcda886
                                                                                                            • Opcode Fuzzy Hash: 311a4e745b3264bd14edd23473059c6188eed4b9df1c2d7a59db91108d00a63e
                                                                                                            • Instruction Fuzzy Hash: 40112972904748ABCB20DF5CDC06B9673E8E705710F44462AF958873C1EB39A900CB96
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • GetConsoleOutputCP.KERNEL32(2784C555,00000000,00000000,?), ref: 00818EF2
                                                                                                              • Part of subcall function 0081EC43: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0081A854,?,00000000,-00000008), ref: 0081ECA4
                                                                                                            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00819144
                                                                                                            • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0081918A
                                                                                                            • GetLastError.KERNEL32 ref: 0081922D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                                            • String ID:
                                                                                                            • API String ID: 2112829910-0
                                                                                                            • Opcode ID: bdfd35a012764c4eead4d657988ccb1037133ac7842f1ac1e7ee1f34b7ade00c
                                                                                                            • Instruction ID: cb8f6035522fe57171119ff76c5deb10784e12b9d035f84f09c45db53f813f61
                                                                                                            • Opcode Fuzzy Hash: bdfd35a012764c4eead4d657988ccb1037133ac7842f1ac1e7ee1f34b7ade00c
                                                                                                            • Instruction Fuzzy Hash: 19D18D75D04248AFCF15CFA8D890AEDBBB9FF09314F14452AE46AEB351D730A982CB50
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • WriteConsoleW.KERNEL32(?,?,?,00000000,?,?,00823DBC,?,00000001,?,?,?,00819281,?,00000000,00000000), ref: 00826D39
                                                                                                            • GetLastError.KERNEL32(?,00823DBC,?,00000001,?,?,?,00819281,?,00000000,00000000,?,?,?,0081985B,?), ref: 00826D45
                                                                                                              • Part of subcall function 00826D0B: CloseHandle.KERNEL32(FFFFFFFE,00826D55,?,00823DBC,?,00000001,?,?,?,00819281,?,00000000,00000000,?,?), ref: 00826D1B
                                                                                                            • ___initconout.LIBCMT ref: 00826D55
                                                                                                              • Part of subcall function 00826CCD: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00826CFC,00823DA9,?,?,00819281,?,00000000,00000000,?), ref: 00826CE0
                                                                                                            • WriteConsoleW.KERNEL32(?,?,?,00000000,?,00823DBC,?,00000001,?,?,?,00819281,?,00000000,00000000,?), ref: 00826D6A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                                            • String ID:
                                                                                                            • API String ID: 2744216297-0
                                                                                                            • Opcode ID: 3758399558b09e963211dc9c059493e0862aa3bfc1f0439e01e941809ed59bb8
                                                                                                            • Instruction ID: a785ac00e97e683d9c5a37e6101e9bc03234154e2da6b80758b38c25409a0ca6
                                                                                                            • Opcode Fuzzy Hash: 3758399558b09e963211dc9c059493e0862aa3bfc1f0439e01e941809ed59bb8
                                                                                                            • Instruction Fuzzy Hash: 88F01C36154128BBCF232F96EC05A893F66FB093B1F004410FA0885120E6328C70EB92
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • ___std_exception_copy.LIBVCRUNTIME ref: 007D3819
                                                                                                            • ___std_exception_destroy.LIBVCRUNTIME ref: 007D38F0
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ___std_exception_copy___std_exception_destroy
                                                                                                            • String ID: )}
                                                                                                            • API String ID: 2970364248-2919107992
                                                                                                            • Opcode ID: 4a39e5d9f54204f4c0d16cb89a6e0951a45cd3f8ceffec0c93218835304b0468
                                                                                                            • Instruction ID: cf594d8c11654f044f00d8b0b635deba04e0c71a9c4ee3d645f6f53c99eb0866
                                                                                                            • Opcode Fuzzy Hash: 4a39e5d9f54204f4c0d16cb89a6e0951a45cd3f8ceffec0c93218835304b0468
                                                                                                            • Instruction Fuzzy Hash: 1B619DB1C01258DFDB10CF98C944B9DFBB5FF19324F14825AE814AB382D7B95A44CBA2
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 007D499F
                                                                                                              • Part of subcall function 008051EB: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,76A923A0,?,00801CF9,?,009469D8,76A923A0,?,76A923A0,-00956880), ref: 0080524B
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ExceptionIos_base_dtorRaisestd::ios_base::_
                                                                                                            • String ID: ios_base::badbit set$ios_base::failbit set
                                                                                                            • API String ID: 1903096808-1240500531
                                                                                                            • Opcode ID: 0d2928967d243fce4bf336f3e240ea6c5f6a324d0f2eeec998090dc20c004bfe
                                                                                                            • Instruction ID: 64ff476c7935d48d319e17a9c2121cde81ad1a89e16434a68eefd1115195e161
                                                                                                            • Opcode Fuzzy Hash: 0d2928967d243fce4bf336f3e240ea6c5f6a324d0f2eeec998090dc20c004bfe
                                                                                                            • Instruction Fuzzy Hash: 9A41F4B2904248AFCB14DF58CD45BAEBBF8EB45710F14825AF554A73C1D779AA00CBA2
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 007D4061
                                                                                                            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 007D40C4
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                                                                            • String ID: bad locale name
                                                                                                            • API String ID: 3988782225-1405518554
                                                                                                            • Opcode ID: 38ae728efb838f5447003e4940d1fc9f05f04a125935e21991bedd5858604bb7
                                                                                                            • Instruction ID: 1c2f9f2ee700e0ac4571dfb49f65f27226b5d49743ca79beabab682e9f59db50
                                                                                                            • Opcode Fuzzy Hash: 38ae728efb838f5447003e4940d1fc9f05f04a125935e21991bedd5858604bb7
                                                                                                            • Instruction Fuzzy Hash: ED11EE70805B84EED321CF68C90874BBFF4AF15714F148A9DE48597B81C3B9AA04CBA2
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • ___std_exception_copy.LIBVCRUNTIME ref: 007E65C9
                                                                                                            • ___std_exception_copy.LIBVCRUNTIME ref: 007E65FC
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ___std_exception_copy
                                                                                                            • String ID: )}
                                                                                                            • API String ID: 2659868963-2919107992
                                                                                                            • Opcode ID: 6d976e86ca8c30c8d18303de775d3f95ad1752532075e5b2e84878bedc96cb7c
                                                                                                            • Instruction ID: dd64e81e10dbbc1724aad559252b3cb10f30899975e00586d835f638a2f38a1d
                                                                                                            • Opcode Fuzzy Hash: 6d976e86ca8c30c8d18303de775d3f95ad1752532075e5b2e84878bedc96cb7c
                                                                                                            • Instruction Fuzzy Hash: 031121B6900758EBC711CF99D980B86F7F8FB09720F10875AF914A7641E774A540CBA1
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • ___std_exception_destroy.LIBVCRUNTIME ref: 007D7A5C
                                                                                                            • ___std_exception_destroy.LIBVCRUNTIME ref: 007D7A72
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ___std_exception_destroy
                                                                                                            • String ID: )}
                                                                                                            • API String ID: 4194217158-2919107992
                                                                                                            • Opcode ID: 332c3d28c4ed2ac9f8e7a7c67365e2ee8b81f1c3a0d577561f5766bb820e3f16
                                                                                                            • Instruction ID: 20b845eed18ebd50a63e56aba05f72fd06c0b1a17c8ae60ae8f1d23b465ece3a
                                                                                                            • Opcode Fuzzy Hash: 332c3d28c4ed2ac9f8e7a7c67365e2ee8b81f1c3a0d577561f5766bb820e3f16
                                                                                                            • Instruction Fuzzy Hash: A2F062B1845758DFC710DF98D901B8DBBF8FB05724F500659E414E37C0D3B956048792
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • GetSystemTimePreciseAsFileTime.KERNEL32(?,00803067,?,?,?,?,008951DF), ref: 00803645
                                                                                                            • GetSystemTimeAsFileTime.KERNEL32(?,2784C555,00000000,?,0091E6F2,000000FF,?,00803067,?,?,?,?,008951DF), ref: 00803649
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Time$FileSystem$Precise
                                                                                                            • String ID: `-}
                                                                                                            • API String ID: 743729956-3104327004
                                                                                                            • Opcode ID: caa85f26091462f7806b36a5aeb31f6a8b679efaf3e92bc938f00c878acfefc8
                                                                                                            • Instruction ID: bfaeac76c23d0c7b56114cb02a22a9d88a76b71cfe726b9348b25528132714bb
                                                                                                            • Opcode Fuzzy Hash: caa85f26091462f7806b36a5aeb31f6a8b679efaf3e92bc938f00c878acfefc8
                                                                                                            • Instruction Fuzzy Hash: 38F06533A58A68EFC7119F55DC01B5AB7A8F708F64F004126E812D77D0DB75A900EF80
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%

                                                                                                            APIs
                                                                                                            • InitializeCriticalSectionAndSpinCount.KERNEL32(00000016,00000001,008089C2,00000001,00000016,00808BD1,?,?,?,?,?,00000000), ref: 0081B826
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000008.00000002.3549517968.00000000007D1000.00000040.00000001.01000000.00000005.sdmp, Offset: 007D0000, based on PE: true
                                                                                                            • Associated: 00000008.00000002.3549393701.00000000007D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000952000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549517968.0000000000962000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.000000000096C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000971000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3549900407.0000000000974000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000977000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AA7000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000AC1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000B50000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.0000000000E68000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            • Associated: 00000008.00000002.3550040233.000000000110D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_8_2_7d0000_RageMP131.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CountCriticalInitializeSectionSpin
                                                                                                            • String ID: InitializeCriticalSectionEx$`-}
                                                                                                            • API String ID: 2593887523-2593076690
                                                                                                            • Opcode ID: d62148dab846216d076095f9e48c2208355996cb7f9aa8effb3b97f757e184c0
                                                                                                            • Instruction ID: b4eb87ed629b8f3f8072f3e3c71ba3dddd4acb95d45cca12d5a9179138f178a2
                                                                                                            • Opcode Fuzzy Hash: d62148dab846216d076095f9e48c2208355996cb7f9aa8effb3b97f757e184c0
                                                                                                            • Instruction Fuzzy Hash: 74E0ED32581268BBCB216F95AC05EAE7F1AEF48BA1B048030F91995161C7724962ABD5
                                                                                                            Uniqueness

                                                                                                            Uniqueness Score: -1.00%