Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
hYrJbjnzVc.exe

Overview

General Information

Sample name:hYrJbjnzVc.exe
renamed because original name is a hash value
Original sample name:adb680e5c7586df1d183ad1ef4807648.exe
Analysis ID:1435364
MD5:adb680e5c7586df1d183ad1ef4807648
SHA1:df9c9e796c877100ebe80a457d57d9358401be50
SHA256:597e094a98f56c0ef8b89cedd7c96d14fca1f5dd25e6e120525246d47de6ba96
Tags:32exetrojan
Infos:

Detection

RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected RisePro Stealer
Connects to many ports of the same IP (likely port scanning)
Found stalling execution ending in API Sleep call
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Uses schtasks.exe or at.exe to add and modify task schedules
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • hYrJbjnzVc.exe (PID: 1968 cmdline: "C:\Users\user\Desktop\hYrJbjnzVc.exe" MD5: ADB680E5C7586DF1D183AD1EF4807648)
    • schtasks.exe (PID: 7016 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5952 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 424 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 4608 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • MPGPH131.exe (PID: 6976 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: ADB680E5C7586DF1D183AD1EF4807648)
  • MPGPH131.exe (PID: 6864 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: ADB680E5C7586DF1D183AD1EF4807648)
  • RageMP131.exe (PID: 3992 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: ADB680E5C7586DF1D183AD1EF4807648)
  • RageMP131.exe (PID: 7080 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: ADB680E5C7586DF1D183AD1EF4807648)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: hYrJbjnzVc.exe PID: 1968JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    Process Memory Space: MPGPH131.exe PID: 6976JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
      Process Memory Space: MPGPH131.exe PID: 6864JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
        Process Memory Space: RageMP131.exe PID: 3992JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
          Process Memory Space: RageMP131.exe PID: 7080JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security

            System Summary

            barindex
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\hYrJbjnzVc.exe, ProcessId: 1968, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RageMP131
            Timestamp:05/02/24-15:51:00.791980
            SID:2046269
            Source Port:49712
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-15:51:00.553596
            SID:2046269
            Source Port:49710
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-15:51:01.432598
            SID:2046269
            Source Port:49721
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-15:49:19.512222
            SID:2046266
            Source Port:58709
            Destination Port:49719
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-15:50:31.741030
            SID:2046267
            Source Port:58709
            Destination Port:49712
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-15:50:32.037911
            SID:2046267
            Source Port:58709
            Destination Port:49719
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-15:50:32.590411
            SID:2046267
            Source Port:58709
            Destination Port:49721
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-15:49:30.619527
            SID:2046266
            Source Port:58709
            Destination Port:49721
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-15:50:31.373536
            SID:2046267
            Source Port:58709
            Destination Port:49710
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-15:50:31.755257
            SID:2046267
            Source Port:58709
            Destination Port:49713
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-15:49:01.484930
            SID:2046266
            Source Port:58709
            Destination Port:49710
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-15:49:08.939674
            SID:2046266
            Source Port:58709
            Destination Port:49712
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-15:49:08.962696
            SID:2046266
            Source Port:58709
            Destination Port:49713
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-15:49:02.615417
            SID:2049060
            Source Port:49710
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-15:51:01.135824
            SID:2046269
            Source Port:49719
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/02/24-15:51:00.823298
            SID:2046269
            Source Port:49713
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeReversingLabs: Detection: 52%
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeVirustotal: Detection: 50%Perma Link
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeReversingLabs: Detection: 52%
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeVirustotal: Detection: 50%Perma Link
            Source: hYrJbjnzVc.exeReversingLabs: Detection: 52%
            Source: hYrJbjnzVc.exeVirustotal: Detection: 51%Perma Link
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJoe Sandbox ML: detected
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeJoe Sandbox ML: detected
            Source: hYrJbjnzVc.exeJoe Sandbox ML: detected
            Source: hYrJbjnzVc.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE

            Networking

            barindex
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 147.45.47.93:58709 -> 192.168.2.6:49710
            Source: TrafficSnort IDS: 2049060 ET TROJAN RisePro TCP Heartbeat Packet 192.168.2.6:49710 -> 147.45.47.93:58709
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.6:49710 -> 147.45.47.93:58709
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 147.45.47.93:58709 -> 192.168.2.6:49712
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 147.45.47.93:58709 -> 192.168.2.6:49713
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.6:49712 -> 147.45.47.93:58709
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.6:49713 -> 147.45.47.93:58709
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 147.45.47.93:58709 -> 192.168.2.6:49719
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.6:49719 -> 147.45.47.93:58709
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 147.45.47.93:58709 -> 192.168.2.6:49721
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.6:49721 -> 147.45.47.93:58709
            Source: TrafficSnort IDS: 2046267 ET TROJAN [ANY.RUN] RisePro TCP (External IP) 147.45.47.93:58709 -> 192.168.2.6:49710
            Source: TrafficSnort IDS: 2046267 ET TROJAN [ANY.RUN] RisePro TCP (External IP) 147.45.47.93:58709 -> 192.168.2.6:49712
            Source: TrafficSnort IDS: 2046267 ET TROJAN [ANY.RUN] RisePro TCP (External IP) 147.45.47.93:58709 -> 192.168.2.6:49713
            Source: TrafficSnort IDS: 2046267 ET TROJAN [ANY.RUN] RisePro TCP (External IP) 147.45.47.93:58709 -> 192.168.2.6:49719
            Source: TrafficSnort IDS: 2046267 ET TROJAN [ANY.RUN] RisePro TCP (External IP) 147.45.47.93:58709 -> 192.168.2.6:49721
            Source: global trafficTCP traffic: 147.45.47.93 ports 0,5,7,8,58709,9
            Source: global trafficTCP traffic: 192.168.2.6:49710 -> 147.45.47.93:58709
            Source: Joe Sandbox ViewIP Address: 147.45.47.93 147.45.47.93
            Source: Joe Sandbox ViewASN Name: FREE-NET-ASFREEnetEU FREE-NET-ASFREEnetEU
            Source: unknownDNS query: name: ipinfo.io
            Source: unknownDNS query: name: ipinfo.io
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: unknownTCP traffic detected without corresponding DNS query: 147.45.47.93
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeCode function: 0_2_00345940 recv,WSAStartup,closesocket,socket,connect,closesocket,0_2_00345940
            Source: global trafficDNS traffic detected: DNS query: ipinfo.io
            Source: hYrJbjnzVc.exe, 00000000.00000003.2086229029.0000000004EF0000.00000004.00001000.00020000.00000000.sdmp, hYrJbjnzVc.exe, 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3340659649.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000003.2169961403.0000000004B20000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3338357309.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000003.2169331680.0000000005620000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 00000008.00000003.2272253211.0000000004C40000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000C.00000003.2364731644.0000000005020000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
            Source: RageMP131.exe, RageMP131.exe, 0000000C.00000002.3338900504.0000000000D25000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3338900504.0000000000D3F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/
            Source: RageMP131.exe, 0000000C.00000002.3338900504.0000000000D3F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/5
            Source: MPGPH131.exe, 00000006.00000002.3339556281.0000000000957000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/M%
            Source: hYrJbjnzVc.exe, 00000000.00000002.3343201264.0000000001290000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/ameSpace=
            Source: RageMP131.exe, 00000008.00000002.3338690809.0000000000937000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/g_Entries
            Source: hYrJbjnzVc.exe, 00000000.00000003.2086229029.0000000004EF0000.00000004.00001000.00020000.00000000.sdmp, hYrJbjnzVc.exe, 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3340659649.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000003.2169961403.0000000004B20000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3338357309.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000003.2169331680.0000000005620000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 00000008.00000003.2272253211.0000000004C40000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000C.00000003.2364731644.0000000005020000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
            Source: RageMP131.exe, 00000008.00000002.3338690809.000000000094D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/tG
            Source: hYrJbjnzVc.exe, 00000000.00000002.3343201264.00000000012BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3339556281.0000000000987000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3341384311.000000000177C000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3341384311.000000000171B000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3338690809.0000000000967000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3338900504.0000000000D30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/191.96.150.225
            Source: RageMP131.exe, 00000008.00000002.3338690809.0000000000967000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/191.96.150.225R
            Source: hYrJbjnzVc.exe, 00000000.00000002.3343201264.00000000012BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/191.96.150.225T5
            Source: hYrJbjnzVc.exe, 00000000.00000002.3343201264.00000000012BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/191.96.150.225r2G
            Source: hYrJbjnzVc.exe, 00000000.00000002.3343201264.000000000125E000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3339556281.000000000092E000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3341384311.000000000171B000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3338690809.000000000090E000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3338900504.0000000000CFB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
            Source: MPGPH131.exe, 00000007.00000002.3341384311.000000000171B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORTD
            Source: RageMP131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address

            System Summary

            barindex
            Source: hYrJbjnzVc.exeStatic PE information: section name:
            Source: hYrJbjnzVc.exeStatic PE information: section name: .idata
            Source: hYrJbjnzVc.exeStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: .idata
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: .idata
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeCode function: 0_2_002BA9180_2_002BA918
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeCode function: 0_2_002BC9500_2_002BC950
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeCode function: 0_2_002B71900_2_002B7190
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeCode function: 0_2_002CDA740_2_002CDA74
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeCode function: 0_2_003703500_2_00370350
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeCode function: 0_2_002C035F0_2_002C035F
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeCode function: 0_2_002D8BA00_2_002D8BA0
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeCode function: 0_2_002AF5700_2_002AF570
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeCode function: 0_2_002D47AD0_2_002D47AD
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeCode function: 0_2_0036CFC00_2_0036CFC0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00D671906_2_00D67190
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00D6C9506_2_00D6C950
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00D6A9186_2_00D6A918
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00D7DA746_2_00D7DA74
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00D88BA06_2_00D88BA0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00D7035F6_2_00D7035F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00E203506_2_00E20350
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00D5F5706_2_00D5F570
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00E8FECB6_2_00E8FECB
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00E1CFC06_2_00E1CFC0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00D847AD6_2_00D847AD
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00E90F236_2_00E90F23
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00D671907_2_00D67190
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00D6C9507_2_00D6C950
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00D6A9187_2_00D6A918
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00D7DA747_2_00D7DA74
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00D88BA07_2_00D88BA0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00D7035F7_2_00D7035F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00E203507_2_00E20350
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00D5F5707_2_00D5F570
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00E8FECB7_2_00E8FECB
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00E1CFC07_2_00E1CFC0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00D847AD7_2_00D847AD
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00E90F237_2_00E90F23
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00F171908_2_00F17190
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00F1C9508_2_00F1C950
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00F1A9188_2_00F1A918
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00F1AADF8_2_00F1AADF
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00F2DA748_2_00F2DA74
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00F38BA08_2_00F38BA0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00F2035F8_2_00F2035F
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00FD03508_2_00FD0350
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00F0F5708_2_00F0F570
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00FCCFC08_2_00FCCFC0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00F347AD8_2_00F347AD
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00F1719012_2_00F17190
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00F1C95012_2_00F1C950
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00F1A91812_2_00F1A918
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00F2DA7412_2_00F2DA74
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00F38BA012_2_00F38BA0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00F2035F12_2_00F2035F
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00FD035012_2_00FD0350
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00F0F57012_2_00F0F570
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00FCCFC012_2_00FCCFC0
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00F347AD12_2_00F347AD
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: String function: 00D64370 appears 48 times
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: String function: 00F14370 appears 48 times
            Source: hYrJbjnzVc.exeBinary or memory string: OriginalFilename vs hYrJbjnzVc.exe
            Source: hYrJbjnzVc.exe, 00000000.00000003.2131257623.0000000007327000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCrossDeviceSettingsHost.exeX vs hYrJbjnzVc.exe
            Source: hYrJbjnzVc.exe, 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCrossDeviceSettingsHost.exeX vs hYrJbjnzVc.exe
            Source: hYrJbjnzVc.exe, 00000000.00000000.2076126335.0000000000847000.00000080.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCrossDeviceSettingsHost.exeX vs hYrJbjnzVc.exe
            Source: hYrJbjnzVc.exe, 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCrossDeviceSettingsHost.exeX vs hYrJbjnzVc.exe
            Source: hYrJbjnzVc.exe, 00000000.00000002.3346617022.0000000002C88000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCrossDeviceSettingsHost.exeX vs hYrJbjnzVc.exe
            Source: hYrJbjnzVc.exeBinary or memory string: OriginalFilenameCrossDeviceSettingsHost.exeX vs hYrJbjnzVc.exe
            Source: hYrJbjnzVc.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.evad.winEXE@11/5@1/1
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeFile created: C:\Users\user\AppData\Local\RageMP131Jump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4608:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5952:120:WilError_03
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeFile created: C:\Users\user\AppData\Local\Temp\rage131MP.tmpJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: hYrJbjnzVc.exe, 00000000.00000003.2086229029.0000000004EF0000.00000004.00001000.00020000.00000000.sdmp, hYrJbjnzVc.exe, 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3340659649.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000003.2169961403.0000000004B20000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3338357309.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000003.2169331680.0000000005620000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 00000008.00000003.2272253211.0000000004C40000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000C.00000003.2364731644.0000000005020000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: hYrJbjnzVc.exe, 00000000.00000003.2086229029.0000000004EF0000.00000004.00001000.00020000.00000000.sdmp, hYrJbjnzVc.exe, 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3340659649.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000003.2169961403.0000000004B20000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3338357309.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000003.2169331680.0000000005620000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 00000008.00000003.2272253211.0000000004C40000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000C.00000003.2364731644.0000000005020000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: hYrJbjnzVc.exeReversingLabs: Detection: 52%
            Source: hYrJbjnzVc.exeVirustotal: Detection: 51%
            Source: hYrJbjnzVc.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: hYrJbjnzVc.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: MPGPH131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: MPGPH131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: MPGPH131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: MPGPH131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: RageMP131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: RageMP131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: RageMP131.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
            Source: RageMP131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeFile read: C:\Users\user\Desktop\hYrJbjnzVc.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\hYrJbjnzVc.exe "C:\Users\user\Desktop\hYrJbjnzVc.exe"
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHESTJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHESTJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSection loaded: webio.dllJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: webio.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: webio.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: webio.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: webio.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winnsi.dllJump to behavior
            Source: hYrJbjnzVc.exeStatic file information: File size 2372608 > 1048576
            Source: hYrJbjnzVc.exeStatic PE information: Raw size of rtycizfs is bigger than: 0x100000 < 0x194400

            Data Obfuscation

            barindex
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeUnpacked PE file: 0.2.hYrJbjnzVc.exe.280000.0.unpack :EW;.rsrc:W;.idata :W; :EW;rtycizfs:EW;ybcmmseg:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;rtycizfs:EW;ybcmmseg:EW;.taggant:EW;
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeUnpacked PE file: 6.2.MPGPH131.exe.d30000.0.unpack :EW;.rsrc:W;.idata :W; :EW;rtycizfs:EW;ybcmmseg:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;rtycizfs:EW;ybcmmseg:EW;.taggant:EW;
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeUnpacked PE file: 7.2.MPGPH131.exe.d30000.0.unpack :EW;.rsrc:W;.idata :W; :EW;rtycizfs:EW;ybcmmseg:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;rtycizfs:EW;ybcmmseg:EW;.taggant:EW;
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeUnpacked PE file: 8.2.RageMP131.exe.ee0000.0.unpack :EW;.rsrc:W;.idata :W; :EW;rtycizfs:EW;ybcmmseg:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;rtycizfs:EW;ybcmmseg:EW;.taggant:EW;
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeUnpacked PE file: 12.2.RageMP131.exe.ee0000.0.unpack :EW;.rsrc:W;.idata :W; :EW;rtycizfs:EW;ybcmmseg:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;rtycizfs:EW;ybcmmseg:EW;.taggant:EW;
            Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
            Source: RageMP131.exe.0.drStatic PE information: real checksum: 0x245ac8 should be: 0x252c23
            Source: MPGPH131.exe.0.drStatic PE information: real checksum: 0x245ac8 should be: 0x252c23
            Source: hYrJbjnzVc.exeStatic PE information: real checksum: 0x245ac8 should be: 0x252c23
            Source: hYrJbjnzVc.exeStatic PE information: section name:
            Source: hYrJbjnzVc.exeStatic PE information: section name: .idata
            Source: hYrJbjnzVc.exeStatic PE information: section name:
            Source: hYrJbjnzVc.exeStatic PE information: section name: rtycizfs
            Source: hYrJbjnzVc.exeStatic PE information: section name: ybcmmseg
            Source: hYrJbjnzVc.exeStatic PE information: section name: .taggant
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: .idata
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: rtycizfs
            Source: RageMP131.exe.0.drStatic PE information: section name: ybcmmseg
            Source: RageMP131.exe.0.drStatic PE information: section name: .taggant
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: .idata
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: rtycizfs
            Source: MPGPH131.exe.0.drStatic PE information: section name: ybcmmseg
            Source: MPGPH131.exe.0.drStatic PE information: section name: .taggant
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeCode function: 0_2_002B3F49 push ecx; ret 0_2_002B3F5C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00D63F49 push ecx; ret 6_2_00D63F5C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 7_2_00D63F49 push ecx; ret 7_2_00D63F5C
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 8_2_00F13F49 push ecx; ret 8_2_00F13F5C
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeCode function: 12_2_00F13F49 push ecx; ret 12_2_00F13F5C
            Source: hYrJbjnzVc.exeStatic PE information: section name: entropy: 7.924289235236996
            Source: hYrJbjnzVc.exeStatic PE information: section name: rtycizfs entropy: 7.911667279717006
            Source: RageMP131.exe.0.drStatic PE information: section name: entropy: 7.924289235236996
            Source: RageMP131.exe.0.drStatic PE information: section name: rtycizfs entropy: 7.911667279717006
            Source: MPGPH131.exe.0.drStatic PE information: section name: entropy: 7.924289235236996
            Source: MPGPH131.exe.0.drStatic PE information: section name: rtycizfs entropy: 7.911667279717006
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeFile created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJump to dropped file
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeStalling execution: Execution stalls by calling Sleepgraph_0-17957
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeStalling execution: Execution stalls by calling Sleep
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeStalling execution: Execution stalls by calling Sleepgraph_6-17471
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 41780A second address: 417825 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F9630EEA8B0h 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 417825 second address: 41782F instructions: 0x00000000 rdtsc 0x00000002 jns 00007F96311B0BC6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 58D18B second address: 58D190 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 57B1D4 second address: 57B207 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BD1h 0x00000007 jmp 00007F96311B0BD9h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 58C0C6 second address: 58C0CB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 57B1C6 second address: 57B1D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F96311B0C04h 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 58C391 second address: 58C399 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 58C399 second address: 58C3BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F96311B0BD9h 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d popad 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 58C3BE second address: 58C3FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9630EEA8AFh 0x00000009 jmp 00007F9630EEA8B1h 0x0000000e popad 0x0000000f jmp 00007F9630EEA8ADh 0x00000014 popad 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 jl 00007F9630EEA8A6h 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 58C3FA second address: 58C3FE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 58C3FE second address: 58C404 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 58C88A second address: 58C8A7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F96311B0BD9h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 58C8A7 second address: 58C8AB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 58E47E second address: 58E49D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F96311B0BCFh 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov eax, dword ptr [eax] 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 58E49D second address: 58E4A3 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 58E4A3 second address: 58E4C0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BCBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jg 00007F96311B0BC8h 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 58E4C0 second address: 41780A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007F9630EEA8B5h 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop eax 0x0000000c mov edi, dword ptr [ebp+122D27D1h] 0x00000012 push dword ptr [ebp+122D0BA5h] 0x00000018 push ebx 0x00000019 jmp 00007F9630EEA8B6h 0x0000001e pop esi 0x0000001f call dword ptr [ebp+122D371Bh] 0x00000025 pushad 0x00000026 pushad 0x00000027 jc 00007F9630EEA8A6h 0x0000002d jmp 00007F9630EEA8ACh 0x00000032 popad 0x00000033 add dword ptr [ebp+122D27D1h], edi 0x00000039 xor eax, eax 0x0000003b pushad 0x0000003c mov ax, bx 0x0000003f mov dword ptr [ebp+122D27D1h], ecx 0x00000045 popad 0x00000046 mov edx, dword ptr [esp+28h] 0x0000004a jc 00007F9630EEA8BBh 0x00000050 jmp 00007F9630EEA8B5h 0x00000055 jmp 00007F9630EEA8AEh 0x0000005a mov dword ptr [ebp+122D2A1Ch], eax 0x00000060 jng 00007F9630EEA8ACh 0x00000066 mov esi, 0000003Ch 0x0000006b pushad 0x0000006c movsx ecx, si 0x0000006f popad 0x00000070 add esi, dword ptr [esp+24h] 0x00000074 xor dword ptr [ebp+122D27D1h], edx 0x0000007a lodsw 0x0000007c cld 0x0000007d add eax, dword ptr [esp+24h] 0x00000081 jmp 00007F9630EEA8B1h 0x00000086 mov ebx, dword ptr [esp+24h] 0x0000008a xor dword ptr [ebp+122D27D1h], esi 0x00000090 nop 0x00000091 push eax 0x00000092 push ebx 0x00000093 push eax 0x00000094 push edx 0x00000095 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 58E592 second address: 58E596 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 58E596 second address: 58E615 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a popad 0x0000000b xor dword ptr [esp], 0AF9CA52h 0x00000012 jng 00007F9630EEA8B4h 0x00000018 pushad 0x00000019 xor dword ptr [ebp+122D279Dh], ecx 0x0000001f mov ebx, dword ptr [ebp+122D27FEh] 0x00000025 popad 0x00000026 push 00000003h 0x00000028 mov dx, di 0x0000002b push 00000000h 0x0000002d mov esi, 45481381h 0x00000032 push 00000003h 0x00000034 push 832276A9h 0x00000039 pushad 0x0000003a jng 00007F9630EEA8A8h 0x00000040 jnl 00007F9630EEA8B1h 0x00000046 popad 0x00000047 add dword ptr [esp], 3CDD8957h 0x0000004e or dword ptr [ebp+122D27C2h], ebx 0x00000054 lea ebx, dword ptr [ebp+1244A33Eh] 0x0000005a push edi 0x0000005b cmc 0x0000005c pop ecx 0x0000005d xchg eax, ebx 0x0000005e pushad 0x0000005f push eax 0x00000060 push edx 0x00000061 jmp 00007F9630EEA8B1h 0x00000066 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 58E615 second address: 58E619 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 58E619 second address: 58E64E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 jmp 00007F9630EEA8B6h 0x0000000c pop ebx 0x0000000d popad 0x0000000e push eax 0x0000000f pushad 0x00000010 jc 00007F9630EEA8ACh 0x00000016 push eax 0x00000017 push edx 0x00000018 jg 00007F9630EEA8A6h 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 58E6C4 second address: 58E772 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jne 00007F96311B0BCCh 0x0000000b popad 0x0000000c mov dword ptr [esp], eax 0x0000000f mov cx, 9444h 0x00000013 push 00000000h 0x00000015 push 00000000h 0x00000017 push eax 0x00000018 call 00007F96311B0BC8h 0x0000001d pop eax 0x0000001e mov dword ptr [esp+04h], eax 0x00000022 add dword ptr [esp+04h], 0000001Ah 0x0000002a inc eax 0x0000002b push eax 0x0000002c ret 0x0000002d pop eax 0x0000002e ret 0x0000002f movzx edx, bx 0x00000032 push 15DEB995h 0x00000037 push ebx 0x00000038 pushad 0x00000039 pushad 0x0000003a popad 0x0000003b push eax 0x0000003c pop eax 0x0000003d popad 0x0000003e pop ebx 0x0000003f xor dword ptr [esp], 15DEB915h 0x00000046 jo 00007F96311B0BCCh 0x0000004c mov dword ptr [ebp+122D2EE7h], eax 0x00000052 push 00000003h 0x00000054 mov di, 0C29h 0x00000058 push 00000000h 0x0000005a mov esi, dword ptr [ebp+122D2BB8h] 0x00000060 push 00000003h 0x00000062 jmp 00007F96311B0BD7h 0x00000067 mov cx, 9C25h 0x0000006b push A0BD3A1Bh 0x00000070 pushad 0x00000071 jmp 00007F96311B0BD5h 0x00000076 push eax 0x00000077 push edx 0x00000078 jc 00007F96311B0BC6h 0x0000007e rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 58E7CB second address: 58E7D9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007F9630EEA8ACh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5AEA1A second address: 5AEA45 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BD8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F96311B0BCAh 0x00000010 push ebx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5AEA45 second address: 5AEA4B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5AEA4B second address: 5AEA50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5AEBB8 second address: 5AEBC6 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jno 00007F9630EEA8A6h 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5AF6FD second address: 5AF704 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5AFAFD second address: 5AFB2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 jns 00007F9630EEA8A6h 0x0000000c je 00007F9630EEA8A6h 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 push eax 0x00000016 pushad 0x00000017 popad 0x00000018 jng 00007F9630EEA8A6h 0x0000001e pop eax 0x0000001f push ebx 0x00000020 pushad 0x00000021 popad 0x00000022 push ebx 0x00000023 pop ebx 0x00000024 pop ebx 0x00000025 popad 0x00000026 pushad 0x00000027 pushad 0x00000028 js 00007F9630EEA8A6h 0x0000002e push eax 0x0000002f pop eax 0x00000030 push eax 0x00000031 push edx 0x00000032 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5AFB2F second address: 5AFB38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5AFB38 second address: 5AFB3C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5AFB3C second address: 5AFB40 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5B0563 second address: 5B0585 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F9630EEA8A6h 0x00000008 jno 00007F9630EEA8A6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 jmp 00007F9630EEA8B2h 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5B0585 second address: 5B05A0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BD6h 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5B05A0 second address: 5B05A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5B08C2 second address: 5B08F2 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F96311B0BC6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F96311B0BCEh 0x0000000f pop esi 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F96311B0BD2h 0x00000017 push eax 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5B08F2 second address: 5B08F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5B08F8 second address: 5B08FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5B3237 second address: 5B323C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5B323C second address: 5B3246 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5B6E04 second address: 5B6E0E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5B6E0E second address: 5B6E14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5B6E14 second address: 5B6E19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 577BB7 second address: 577BBD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5B9756 second address: 5B9765 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 js 00007F9630EEA8A6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5BDBE2 second address: 5BDBE8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5BDBE8 second address: 5BDBEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5BDBEC second address: 5BDBF2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5BDBF2 second address: 5BDBF6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5BD723 second address: 5BD729 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5BD729 second address: 5BD735 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5BD873 second address: 5BD87F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push esi 0x00000008 push esi 0x00000009 pop esi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5BD87F second address: 5BD884 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5BD884 second address: 5BD8A7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F96311B0BCAh 0x00000008 jmp 00007F96311B0BD2h 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5BDA45 second address: 5BDA49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5BDA49 second address: 5BDA4D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5BDA4D second address: 5BDA6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jng 00007F9630EEA8AEh 0x0000000e jo 00007F9630EEA8A6h 0x00000014 pushad 0x00000015 popad 0x00000016 je 00007F9630EEA8C7h 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5BEB15 second address: 5BEB19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5BEB19 second address: 5BEB1F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5BEB8E second address: 5BEB93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5BF479 second address: 5BF4C3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8B7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c push edi 0x0000000d pop edi 0x0000000e popad 0x0000000f popad 0x00000010 push eax 0x00000011 pushad 0x00000012 push edx 0x00000013 jmp 00007F9630EEA8B6h 0x00000018 pop edx 0x00000019 pushad 0x0000001a jmp 00007F9630EEA8ABh 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5BFB11 second address: 5BFB15 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5BFD41 second address: 5BFD46 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C0E6F second address: 5C0E75 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C1F0D second address: 5C1F6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 pushad 0x00000007 popad 0x00000008 pop edi 0x00000009 popad 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push ebx 0x0000000e call 00007F9630EEA8A8h 0x00000013 pop ebx 0x00000014 mov dword ptr [esp+04h], ebx 0x00000018 add dword ptr [esp+04h], 00000015h 0x00000020 inc ebx 0x00000021 push ebx 0x00000022 ret 0x00000023 pop ebx 0x00000024 ret 0x00000025 mov edi, dword ptr [ebp+122D2B0Ch] 0x0000002b mov si, dx 0x0000002e push 00000000h 0x00000030 mov di, cx 0x00000033 push 00000000h 0x00000035 mov di, F366h 0x00000039 xchg eax, ebx 0x0000003a pushad 0x0000003b ja 00007F9630EEA8A8h 0x00000041 pushad 0x00000042 pushad 0x00000043 popad 0x00000044 jmp 00007F9630EEA8AAh 0x00000049 popad 0x0000004a popad 0x0000004b push eax 0x0000004c pushad 0x0000004d jng 00007F9630EEA8ACh 0x00000053 push eax 0x00000054 push edx 0x00000055 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C2B5D second address: 5C2B76 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F96311B0BD5h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C280F second address: 5C2815 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C2815 second address: 5C2819 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C3629 second address: 5C362D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C362D second address: 5C3691 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BCFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F96311B0BD3h 0x0000000e popad 0x0000000f push eax 0x00000010 jmp 00007F96311B0BD1h 0x00000015 nop 0x00000016 mov esi, 54104D66h 0x0000001b mov esi, edi 0x0000001d push 00000000h 0x0000001f jmp 00007F96311B0BD9h 0x00000024 push 00000000h 0x00000026 xchg eax, ebx 0x00000027 push ecx 0x00000028 push eax 0x00000029 push edx 0x0000002a pushad 0x0000002b popad 0x0000002c rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C4C61 second address: 5C4CBA instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F9630EEA8A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007F9630EEA8B1h 0x00000010 push edi 0x00000011 pop edi 0x00000012 popad 0x00000013 popad 0x00000014 nop 0x00000015 push 00000000h 0x00000017 push esi 0x00000018 call 00007F9630EEA8A8h 0x0000001d pop esi 0x0000001e mov dword ptr [esp+04h], esi 0x00000022 add dword ptr [esp+04h], 00000017h 0x0000002a inc esi 0x0000002b push esi 0x0000002c ret 0x0000002d pop esi 0x0000002e ret 0x0000002f push 00000000h 0x00000031 push 00000000h 0x00000033 pushad 0x00000034 mov ax, cx 0x00000037 xor di, 4B00h 0x0000003c popad 0x0000003d push eax 0x0000003e pushad 0x0000003f pushad 0x00000040 js 00007F9630EEA8A6h 0x00000046 push eax 0x00000047 push edx 0x00000048 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C5792 second address: 5C5798 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C5798 second address: 5C57A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C8FA5 second address: 5C9003 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 pop eax 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a jmp 00007F96311B0BCFh 0x0000000f push eax 0x00000010 jmp 00007F96311B0BCAh 0x00000015 pop eax 0x00000016 popad 0x00000017 nop 0x00000018 push 00000000h 0x0000001a push ebx 0x0000001b call 00007F96311B0BC8h 0x00000020 pop ebx 0x00000021 mov dword ptr [esp+04h], ebx 0x00000025 add dword ptr [esp+04h], 00000018h 0x0000002d inc ebx 0x0000002e push ebx 0x0000002f ret 0x00000030 pop ebx 0x00000031 ret 0x00000032 and edi, dword ptr [ebp+122D36E5h] 0x00000038 push 00000000h 0x0000003a movsx edi, dx 0x0000003d push 00000000h 0x0000003f mov di, dx 0x00000042 push eax 0x00000043 push eax 0x00000044 push edx 0x00000045 push eax 0x00000046 pushad 0x00000047 popad 0x00000048 pop eax 0x00000049 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5CA137 second address: 5CA154 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F9630EEA8B1h 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5CE15B second address: 5CE176 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F96311B0BD6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5CE176 second address: 5CE1D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push eax 0x0000000b call 00007F9630EEA8A8h 0x00000010 pop eax 0x00000011 mov dword ptr [esp+04h], eax 0x00000015 add dword ptr [esp+04h], 00000016h 0x0000001d inc eax 0x0000001e push eax 0x0000001f ret 0x00000020 pop eax 0x00000021 ret 0x00000022 push 00000000h 0x00000024 mov bh, C2h 0x00000026 push 00000000h 0x00000028 push 00000000h 0x0000002a push ebp 0x0000002b call 00007F9630EEA8A8h 0x00000030 pop ebp 0x00000031 mov dword ptr [esp+04h], ebp 0x00000035 add dword ptr [esp+04h], 00000017h 0x0000003d inc ebp 0x0000003e push ebp 0x0000003f ret 0x00000040 pop ebp 0x00000041 ret 0x00000042 xchg eax, esi 0x00000043 push eax 0x00000044 push edx 0x00000045 jmp 00007F9630EEA8B2h 0x0000004a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5CE1D6 second address: 5CE1DC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5CC216 second address: 5CC21A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5CD25E second address: 5CD265 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5CE1DC second address: 5CE1EE instructions: 0x00000000 rdtsc 0x00000002 js 00007F9630EEA8A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5CC21A second address: 5CC21E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5CE1EE second address: 5CE1F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5CD265 second address: 5CD2D9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BCAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a je 00007F96311B0BCCh 0x00000010 pushad 0x00000011 pushad 0x00000012 popad 0x00000013 push edi 0x00000014 pop edi 0x00000015 popad 0x00000016 nop 0x00000017 push dword ptr fs:[00000000h] 0x0000001e mov edi, dword ptr [ebp+122D2D96h] 0x00000024 mov dword ptr fs:[00000000h], esp 0x0000002b mov di, 93FEh 0x0000002f mov eax, dword ptr [ebp+122D0BD9h] 0x00000035 push 00000000h 0x00000037 push esi 0x00000038 call 00007F96311B0BC8h 0x0000003d pop esi 0x0000003e mov dword ptr [esp+04h], esi 0x00000042 add dword ptr [esp+04h], 00000014h 0x0000004a inc esi 0x0000004b push esi 0x0000004c ret 0x0000004d pop esi 0x0000004e ret 0x0000004f jmp 00007F96311B0BCDh 0x00000054 add ebx, 0030E807h 0x0000005a push FFFFFFFFh 0x0000005c mov bx, 52F7h 0x00000060 push eax 0x00000061 push ebx 0x00000062 pushad 0x00000063 push eax 0x00000064 push edx 0x00000065 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5CC21E second address: 5CC224 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5CF1ED second address: 5CF2C5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BD5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c push 00000000h 0x0000000e push edx 0x0000000f call 00007F96311B0BC8h 0x00000014 pop edx 0x00000015 mov dword ptr [esp+04h], edx 0x00000019 add dword ptr [esp+04h], 00000016h 0x00000021 inc edx 0x00000022 push edx 0x00000023 ret 0x00000024 pop edx 0x00000025 ret 0x00000026 jnl 00007F96311B0BD2h 0x0000002c push 00000000h 0x0000002e push 00000000h 0x00000030 push eax 0x00000031 call 00007F96311B0BC8h 0x00000036 pop eax 0x00000037 mov dword ptr [esp+04h], eax 0x0000003b add dword ptr [esp+04h], 0000001Ch 0x00000043 inc eax 0x00000044 push eax 0x00000045 ret 0x00000046 pop eax 0x00000047 ret 0x00000048 mov dword ptr [ebp+122D1D9Bh], ecx 0x0000004e push 00000000h 0x00000050 call 00007F96311B0BD2h 0x00000055 or dword ptr [ebp+122D1D1Dh], edx 0x0000005b pop ebx 0x0000005c pushad 0x0000005d call 00007F96311B0BD4h 0x00000062 adc si, 953Fh 0x00000067 pop edi 0x00000068 and esi, dword ptr [ebp+122D2A28h] 0x0000006e popad 0x0000006f xchg eax, esi 0x00000070 jmp 00007F96311B0BD7h 0x00000075 push eax 0x00000076 push eax 0x00000077 push edx 0x00000078 push edi 0x00000079 jo 00007F96311B0BC6h 0x0000007f pop edi 0x00000080 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D019A second address: 5D019F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5CF49B second address: 5CF49F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5CF49F second address: 5CF4A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D036A second address: 5D0370 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D11C9 second address: 5D11D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007F9630EEA8A6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D0370 second address: 5D037A instructions: 0x00000000 rdtsc 0x00000002 jl 00007F96311B0BCCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D31FC second address: 5D3202 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D3202 second address: 5D326A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BD7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e push 00000000h 0x00000010 push ebx 0x00000011 call 00007F96311B0BC8h 0x00000016 pop ebx 0x00000017 mov dword ptr [esp+04h], ebx 0x0000001b add dword ptr [esp+04h], 0000001Dh 0x00000023 inc ebx 0x00000024 push ebx 0x00000025 ret 0x00000026 pop ebx 0x00000027 ret 0x00000028 clc 0x00000029 push 00000000h 0x0000002b mov edi, ecx 0x0000002d push 00000000h 0x0000002f mov di, 829Bh 0x00000033 xchg eax, esi 0x00000034 jmp 00007F96311B0BCDh 0x00000039 push eax 0x0000003a pushad 0x0000003b push eax 0x0000003c push edx 0x0000003d jnp 00007F96311B0BC6h 0x00000043 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D432D second address: 5D4339 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F9630EEA8ACh 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D22C5 second address: 5D22CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D1301 second address: 5D1321 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8ACh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ebx 0x0000000a jo 00007F9630EEA8A6h 0x00000010 pop ebx 0x00000011 popad 0x00000012 push eax 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push ecx 0x00000017 pop ecx 0x00000018 pop eax 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D4339 second address: 5D4343 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push esi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D22CA second address: 5D22D0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D1321 second address: 5D132B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007F96311B0BC6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D4343 second address: 5D43B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop edx 0x00000006 nop 0x00000007 push 00000000h 0x00000009 push ebx 0x0000000a call 00007F9630EEA8A8h 0x0000000f pop ebx 0x00000010 mov dword ptr [esp+04h], ebx 0x00000014 add dword ptr [esp+04h], 0000001Ah 0x0000001c inc ebx 0x0000001d push ebx 0x0000001e ret 0x0000001f pop ebx 0x00000020 ret 0x00000021 push eax 0x00000022 mov di, dx 0x00000025 pop edi 0x00000026 push 00000000h 0x00000028 mov ebx, esi 0x0000002a mov bh, 14h 0x0000002c push 00000000h 0x0000002e jl 00007F9630EEA8ACh 0x00000034 mov edi, dword ptr [ebp+122D1CF7h] 0x0000003a xchg eax, esi 0x0000003b push edx 0x0000003c pushad 0x0000003d jp 00007F9630EEA8A6h 0x00000043 push esi 0x00000044 pop esi 0x00000045 popad 0x00000046 pop edx 0x00000047 push eax 0x00000048 pushad 0x00000049 pushad 0x0000004a jp 00007F9630EEA8A6h 0x00000050 jmp 00007F9630EEA8B3h 0x00000055 popad 0x00000056 push eax 0x00000057 push edx 0x00000058 push eax 0x00000059 push edx 0x0000005a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D132B second address: 5D13BD instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F96311B0BC6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d stc 0x0000000e xor bh, FFFFFFB5h 0x00000011 push dword ptr fs:[00000000h] 0x00000018 push ebx 0x00000019 mov ebx, 4AAE37F2h 0x0000001e pop ebx 0x0000001f mov dword ptr fs:[00000000h], esp 0x00000026 push 00000000h 0x00000028 push ebp 0x00000029 call 00007F96311B0BC8h 0x0000002e pop ebp 0x0000002f mov dword ptr [esp+04h], ebp 0x00000033 add dword ptr [esp+04h], 0000001Bh 0x0000003b inc ebp 0x0000003c push ebp 0x0000003d ret 0x0000003e pop ebp 0x0000003f ret 0x00000040 mov bx, dx 0x00000043 mov eax, dword ptr [ebp+122D1785h] 0x00000049 push 00000000h 0x0000004b push ebp 0x0000004c call 00007F96311B0BC8h 0x00000051 pop ebp 0x00000052 mov dword ptr [esp+04h], ebp 0x00000056 add dword ptr [esp+04h], 0000001Ch 0x0000005e inc ebp 0x0000005f push ebp 0x00000060 ret 0x00000061 pop ebp 0x00000062 ret 0x00000063 jc 00007F96311B0BD2h 0x00000069 jno 00007F96311B0BCCh 0x0000006f push FFFFFFFFh 0x00000071 mov bh, A8h 0x00000073 push eax 0x00000074 pushad 0x00000075 push eax 0x00000076 push edx 0x00000077 push eax 0x00000078 push edx 0x00000079 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D43B3 second address: 5D43B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D13BD second address: 5D13C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D457B second address: 5D457F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D457F second address: 5D4591 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push ecx 0x0000000b jg 00007F96311B0BC6h 0x00000011 pop ecx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D4591 second address: 5D4596 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D669B second address: 5D66A0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D6884 second address: 5D688A instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D688A second address: 5D68A3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jns 00007F96311B0BC6h 0x00000009 js 00007F96311B0BC6h 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D68A3 second address: 5D68BE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8B7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D68BE second address: 5D68C4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D68C4 second address: 5D6953 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F9630EEA8A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d pushad 0x0000000e mov esi, dword ptr [ebp+122D2BCCh] 0x00000014 mov eax, ecx 0x00000016 popad 0x00000017 push dword ptr fs:[00000000h] 0x0000001e mov ebx, dword ptr [ebp+122D2A14h] 0x00000024 pushad 0x00000025 mov ax, si 0x00000028 mov dword ptr [ebp+122D3720h], edx 0x0000002e popad 0x0000002f mov dword ptr fs:[00000000h], esp 0x00000036 movsx edi, di 0x00000039 mov eax, dword ptr [ebp+122D10B5h] 0x0000003f jbe 00007F9630EEA8BBh 0x00000045 je 00007F9630EEA8A8h 0x0000004b mov bl, 4Ch 0x0000004d push FFFFFFFFh 0x0000004f push 00000000h 0x00000051 push edi 0x00000052 call 00007F9630EEA8A8h 0x00000057 pop edi 0x00000058 mov dword ptr [esp+04h], edi 0x0000005c add dword ptr [esp+04h], 00000014h 0x00000064 inc edi 0x00000065 push edi 0x00000066 ret 0x00000067 pop edi 0x00000068 ret 0x00000069 mov edi, 6F470BC3h 0x0000006e nop 0x0000006f je 00007F9630EEA8B4h 0x00000075 pushad 0x00000076 push eax 0x00000077 push edx 0x00000078 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D6953 second address: 5D6964 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F96311B0BC6h 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push esi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D862C second address: 5D86B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 pushad 0x00000007 jnp 00007F9630EEA8A8h 0x0000000d push eax 0x0000000e pop eax 0x0000000f jmp 00007F9630EEA8B6h 0x00000014 popad 0x00000015 nop 0x00000016 and edi, dword ptr [ebp+122D26AAh] 0x0000001c push 00000000h 0x0000001e push 00000000h 0x00000020 push eax 0x00000021 call 00007F9630EEA8A8h 0x00000026 pop eax 0x00000027 mov dword ptr [esp+04h], eax 0x0000002b add dword ptr [esp+04h], 0000001Bh 0x00000033 inc eax 0x00000034 push eax 0x00000035 ret 0x00000036 pop eax 0x00000037 ret 0x00000038 mov dword ptr [ebp+122D24D4h], eax 0x0000003e push 00000000h 0x00000040 push 00000000h 0x00000042 push ebx 0x00000043 call 00007F9630EEA8A8h 0x00000048 pop ebx 0x00000049 mov dword ptr [esp+04h], ebx 0x0000004d add dword ptr [esp+04h], 00000019h 0x00000055 inc ebx 0x00000056 push ebx 0x00000057 ret 0x00000058 pop ebx 0x00000059 ret 0x0000005a xchg eax, esi 0x0000005b push ebx 0x0000005c push eax 0x0000005d push edx 0x0000005e jmp 00007F9630EEA8ABh 0x00000063 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D77A4 second address: 5D77AE instructions: 0x00000000 rdtsc 0x00000002 jo 00007F96311B0BC6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D6964 second address: 5D6969 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D77AE second address: 5D77B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007F96311B0BC6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D6969 second address: 5D696E instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D77B8 second address: 5D7848 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BCDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c mov ebx, dword ptr [ebp+122D2AC0h] 0x00000012 push dword ptr fs:[00000000h] 0x00000019 push 00000000h 0x0000001b push ecx 0x0000001c call 00007F96311B0BC8h 0x00000021 pop ecx 0x00000022 mov dword ptr [esp+04h], ecx 0x00000026 add dword ptr [esp+04h], 00000019h 0x0000002e inc ecx 0x0000002f push ecx 0x00000030 ret 0x00000031 pop ecx 0x00000032 ret 0x00000033 mov bx, CDB2h 0x00000037 mov dword ptr fs:[00000000h], esp 0x0000003e push 00000000h 0x00000040 push ebx 0x00000041 call 00007F96311B0BC8h 0x00000046 pop ebx 0x00000047 mov dword ptr [esp+04h], ebx 0x0000004b add dword ptr [esp+04h], 0000001Dh 0x00000053 inc ebx 0x00000054 push ebx 0x00000055 ret 0x00000056 pop ebx 0x00000057 ret 0x00000058 mov edi, dword ptr [ebp+122D279Dh] 0x0000005e mov eax, dword ptr [ebp+122D178Dh] 0x00000064 mov dword ptr [ebp+1244566Bh], edx 0x0000006a push FFFFFFFFh 0x0000006c mov di, ax 0x0000006f nop 0x00000070 push eax 0x00000071 push edx 0x00000072 push edx 0x00000073 pushad 0x00000074 popad 0x00000075 pop edx 0x00000076 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D7848 second address: 5D785F instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F9630EEA8A8h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 jng 00007F9630EEA8A6h 0x00000016 pop eax 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D785F second address: 5D7865 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D7865 second address: 5D7869 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D8857 second address: 5D8861 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007F96311B0BC6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5D8861 second address: 5D8865 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5E2CFE second address: 5E2D0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edi 0x00000007 pushad 0x00000008 jp 00007F96311B0BC6h 0x0000000e push edx 0x0000000f pop edx 0x00000010 popad 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5E2D0F second address: 5E2D2A instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007F9630EEA8ABh 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop esi 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 push edx 0x00000014 pop edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5E2D2A second address: 5E2D44 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F96311B0BC6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jns 00007F96311B0BCEh 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5E24B0 second address: 5E24B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5E24B6 second address: 5E24C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F96311B0BC6h 0x0000000a popad 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5E24C1 second address: 5E24CB instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F9630EEA8AEh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5E7FF9 second address: 5E801E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop eax 0x00000006 push eax 0x00000007 jnp 00007F96311B0BD5h 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push edi 0x00000015 pop edi 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5E801E second address: 5E805F instructions: 0x00000000 rdtsc 0x00000002 jc 00007F9630EEA8A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop eax 0x0000000b mov eax, dword ptr [eax] 0x0000000d jmp 00007F9630EEA8B5h 0x00000012 mov dword ptr [esp+04h], eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007F9630EEA8B8h 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5E812B second address: 41780A instructions: 0x00000000 rdtsc 0x00000002 jg 00007F96311B0BCCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xor dword ptr [esp], 4A68932Bh 0x00000011 jmp 00007F96311B0BCFh 0x00000016 push dword ptr [ebp+122D0BA5h] 0x0000001c jmp 00007F96311B0BD6h 0x00000021 call dword ptr [ebp+122D371Bh] 0x00000027 pushad 0x00000028 pushad 0x00000029 jc 00007F96311B0BC6h 0x0000002f jmp 00007F96311B0BCCh 0x00000034 popad 0x00000035 add dword ptr [ebp+122D27D1h], edi 0x0000003b xor eax, eax 0x0000003d pushad 0x0000003e mov ax, bx 0x00000041 mov dword ptr [ebp+122D27D1h], ecx 0x00000047 popad 0x00000048 mov edx, dword ptr [esp+28h] 0x0000004c jc 00007F96311B0BDBh 0x00000052 jmp 00007F96311B0BD5h 0x00000057 jmp 00007F96311B0BCEh 0x0000005c mov dword ptr [ebp+122D2A1Ch], eax 0x00000062 jng 00007F96311B0BCCh 0x00000068 mov esi, 0000003Ch 0x0000006d pushad 0x0000006e movsx ecx, si 0x00000071 popad 0x00000072 add esi, dword ptr [esp+24h] 0x00000076 xor dword ptr [ebp+122D27D1h], edx 0x0000007c lodsw 0x0000007e cld 0x0000007f add eax, dword ptr [esp+24h] 0x00000083 jmp 00007F96311B0BD1h 0x00000088 mov ebx, dword ptr [esp+24h] 0x0000008c xor dword ptr [ebp+122D27D1h], esi 0x00000092 nop 0x00000093 push eax 0x00000094 push ebx 0x00000095 push eax 0x00000096 push edx 0x00000097 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5E96E8 second address: 5E96EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5EE6C0 second address: 5EE6FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F96311B0BCEh 0x00000009 jmp 00007F96311B0BD8h 0x0000000e popad 0x0000000f jmp 00007F96311B0BD2h 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5EE6FD second address: 5EE707 instructions: 0x00000000 rdtsc 0x00000002 je 00007F9630EEA8AEh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5EDA55 second address: 5EDA5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 push esi 0x00000009 pop esi 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5EDE2D second address: 5EDE46 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9630EEA8B5h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5EDE46 second address: 5EDE4B instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5EE12A second address: 5EE146 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 jmp 00007F9630EEA8B4h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5EE261 second address: 5EE29A instructions: 0x00000000 rdtsc 0x00000002 jno 00007F96311B0BC6h 0x00000008 jmp 00007F96311B0BD8h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jmp 00007F96311B0BD0h 0x00000014 pushad 0x00000015 pushad 0x00000016 popad 0x00000017 push eax 0x00000018 pop eax 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5EE54E second address: 5EE554 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5EE554 second address: 5EE567 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 ja 00007F96311B0BD6h 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 pop eax 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5F5A5E second address: 5F5A62 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 580287 second address: 58029A instructions: 0x00000000 rdtsc 0x00000002 jo 00007F96311B0BC6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 pop eax 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 58029A second address: 58029E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 58029E second address: 5802A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C69C5 second address: 5C6A48 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F9630EEA8A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jmp 00007F9630EEA8B6h 0x00000010 nop 0x00000011 push 00000000h 0x00000013 push edi 0x00000014 call 00007F9630EEA8A8h 0x00000019 pop edi 0x0000001a mov dword ptr [esp+04h], edi 0x0000001e add dword ptr [esp+04h], 00000014h 0x00000026 inc edi 0x00000027 push edi 0x00000028 ret 0x00000029 pop edi 0x0000002a ret 0x0000002b mov ecx, 06AEDC74h 0x00000030 lea eax, dword ptr [ebp+1248277Ch] 0x00000036 pushad 0x00000037 jno 00007F9630EEA8ACh 0x0000003d mov dword ptr [ebp+122D3713h], ecx 0x00000043 popad 0x00000044 nop 0x00000045 jne 00007F9630EEA8BEh 0x0000004b push eax 0x0000004c push eax 0x0000004d push edx 0x0000004e push eax 0x0000004f push edx 0x00000050 pushad 0x00000051 popad 0x00000052 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C6A48 second address: 5C6A4C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C6A4C second address: 5C6A52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C6A52 second address: 5C6A5C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007F96311B0BC6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C6B54 second address: 5C6B59 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C6C60 second address: 5C6C6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C6C6D second address: 5C6C71 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C6C71 second address: 5C6C77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C7019 second address: 5C7023 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F9630EEA8ACh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C70E4 second address: 5C70E9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C70E9 second address: 5C711B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d jnc 00007F9630EEA8B2h 0x00000013 mov eax, dword ptr [eax] 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F9630EEA8AFh 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C711B second address: 5C7121 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C7121 second address: 5C7125 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C720E second address: 5C7214 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C7294 second address: 5C72C7 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp], esi 0x0000000a pushad 0x0000000b jmp 00007F9630EEA8AEh 0x00000010 ja 00007F9630EEA8A8h 0x00000016 popad 0x00000017 nop 0x00000018 push eax 0x00000019 jnp 00007F9630EEA8A8h 0x0000001f pop eax 0x00000020 push eax 0x00000021 push eax 0x00000022 push edx 0x00000023 push ecx 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C72C7 second address: 5C72CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C72CC second address: 5C72DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9630EEA8AFh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C73BB second address: 5C73DF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BCDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b jmp 00007F96311B0BCDh 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C73DF second address: 5C73E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C73E3 second address: 5C7408 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BD2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e push eax 0x0000000f push edx 0x00000010 jnc 00007F96311B0BC8h 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C761D second address: 5C7681 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 jnc 00007F9630EEA8A8h 0x0000000b popad 0x0000000c nop 0x0000000d push 00000000h 0x0000000f push ebp 0x00000010 call 00007F9630EEA8A8h 0x00000015 pop ebp 0x00000016 mov dword ptr [esp+04h], ebp 0x0000001a add dword ptr [esp+04h], 0000001Bh 0x00000022 inc ebp 0x00000023 push ebp 0x00000024 ret 0x00000025 pop ebp 0x00000026 ret 0x00000027 jmp 00007F9630EEA8B8h 0x0000002c push 00000004h 0x0000002e mov di, B749h 0x00000032 push eax 0x00000033 push eax 0x00000034 push edx 0x00000035 jmp 00007F9630EEA8B1h 0x0000003a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C7681 second address: 5C7687 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C7D3D second address: 5C7D41 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C7D41 second address: 5C7D47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C7DD5 second address: 5C7DD9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C7DD9 second address: 5C7DDF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C7DDF second address: 5C7DE4 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5A3617 second address: 5A361D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5A361D second address: 5A3621 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5A3621 second address: 5A3627 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5F4C4E second address: 5F4C53 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5F55D9 second address: 5F55DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5FB69C second address: 5FB6A3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5FB6A3 second address: 5FB6A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5FA265 second address: 5FA285 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8B0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push edi 0x0000000b push eax 0x0000000c push edx 0x0000000d jp 00007F9630EEA8A6h 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5FA285 second address: 5FA29D instructions: 0x00000000 rdtsc 0x00000002 jns 00007F96311B0BC6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F96311B0BCCh 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5FA41E second address: 5FA42B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jnl 00007F9630EEA8A6h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5FA42B second address: 5FA431 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5FA692 second address: 5FA69B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5FA69B second address: 5FA6A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5FA6A0 second address: 5FA6A7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5FA6A7 second address: 5FA6AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5FAC1B second address: 5FAC24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 push esi 0x00000008 pop esi 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5FAC24 second address: 5FAC28 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5FAC28 second address: 5FAC30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5FADAF second address: 5FADD1 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edi 0x00000009 jmp 00007F96311B0BD5h 0x0000000e pop edi 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5FAF7D second address: 5FAF81 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5F9DC7 second address: 5F9DE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F96311B0BD3h 0x0000000a popad 0x0000000b push esi 0x0000000c push eax 0x0000000d push edx 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5F9DE7 second address: 5F9DFF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8B4h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6006E3 second address: 6006E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 600859 second address: 60086D instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F9630EEA8ACh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6046EE second address: 6046F4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6046F4 second address: 604705 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9630EEA8ADh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 604705 second address: 604719 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jbe 00007F96311B0BC6h 0x0000000e jne 00007F96311B0BC6h 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6067CC second address: 6067DE instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jng 00007F9630EEA8A6h 0x00000009 pop esi 0x0000000a js 00007F9630EEA8ACh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6067DE second address: 6067E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 57CC7B second address: 57CC8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop ecx 0x00000006 push esi 0x00000007 push eax 0x00000008 push edx 0x00000009 push edx 0x0000000a pop edx 0x0000000b jno 00007F9630EEA8A6h 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 60A29F second address: 60A2B5 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jp 00007F96311B0BC6h 0x00000009 js 00007F96311B0BC6h 0x0000000f pop esi 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 pushad 0x00000015 popad 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 60FFFC second address: 610002 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 610002 second address: 61000E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 ja 00007F96311B0BC6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 610166 second address: 61016A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 61016A second address: 610188 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F96311B0BD4h 0x0000000c push edx 0x0000000d pop edx 0x0000000e popad 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6102E1 second address: 6102FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edi 0x00000007 pop edi 0x00000008 pop eax 0x00000009 pushad 0x0000000a jmp 00007F9630EEA8B1h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6105B5 second address: 6105BB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6105BB second address: 6105CF instructions: 0x00000000 rdtsc 0x00000002 jne 00007F9630EEA8ACh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esi 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6154ED second address: 6154F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6154F3 second address: 6154F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6154F7 second address: 6154FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6154FB second address: 615501 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 615501 second address: 615516 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jnl 00007F96311B0BC6h 0x00000009 pushad 0x0000000a popad 0x0000000b pop ebx 0x0000000c pushad 0x0000000d push edi 0x0000000e pop edi 0x0000000f push edx 0x00000010 pop edx 0x00000011 push eax 0x00000012 pop eax 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 614A3A second address: 614A40 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 614A40 second address: 614A6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F96311B0BC6h 0x0000000a popad 0x0000000b push esi 0x0000000c jo 00007F96311B0BC6h 0x00000012 pop esi 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007F96311B0BD1h 0x0000001d pushad 0x0000001e popad 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 614A6B second address: 614A71 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 614A71 second address: 614A77 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 614A77 second address: 614A7B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 614BD4 second address: 614BD8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 614BD8 second address: 614C2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007F9630EEA8A8h 0x0000000c je 00007F9630EEA8BCh 0x00000012 jmp 00007F9630EEA8B6h 0x00000017 popad 0x00000018 pushad 0x00000019 jns 00007F9630EEA8AEh 0x0000001f je 00007F9630EEA8A6h 0x00000025 push esi 0x00000026 pop esi 0x00000027 jmp 00007F9630EEA8B7h 0x0000002c push edx 0x0000002d pushad 0x0000002e popad 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6150E4 second address: 6150E8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6150E8 second address: 6150F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F9630EEA8A6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6150F8 second address: 6150FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6150FE second address: 615102 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 61A113 second address: 61A11A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 619246 second address: 619263 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 jnp 00007F9630EEA8AEh 0x0000000e pushad 0x0000000f popad 0x00000010 jo 00007F9630EEA8A6h 0x00000016 pop edx 0x00000017 pop eax 0x00000018 pushad 0x00000019 push eax 0x0000001a push edx 0x0000001b push ecx 0x0000001c pop ecx 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6193AC second address: 6193B6 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F96311B0BC6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 619520 second address: 619526 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 619526 second address: 61952A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 619970 second address: 61997B instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jno 00007F9630EEA8A6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 619C90 second address: 619CA4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pushad 0x0000000a popad 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jng 00007F96311B0BC6h 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 619CA4 second address: 619CC0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F9630EEA8B1h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 623834 second address: 623851 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 jnp 00007F96311B0BCEh 0x0000000d jbe 00007F96311B0BCEh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 621A6F second address: 621A9C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jno 00007F9630EEA8A6h 0x00000009 jne 00007F9630EEA8A6h 0x0000000f push edx 0x00000010 pop edx 0x00000011 popad 0x00000012 push esi 0x00000013 jmp 00007F9630EEA8AAh 0x00000018 pushad 0x00000019 popad 0x0000001a pop esi 0x0000001b pop edx 0x0000001c pop eax 0x0000001d push eax 0x0000001e push edx 0x0000001f push ebx 0x00000020 jnl 00007F9630EEA8A6h 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 621A9C second address: 621AA1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 621AA1 second address: 621AAB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007F9630EEA8A6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 621AAB second address: 621ABF instructions: 0x00000000 rdtsc 0x00000002 jc 00007F96311B0BC6h 0x00000008 jns 00007F96311B0BC6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 621ABF second address: 621AC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 621AC3 second address: 621AC7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 62211F second address: 622125 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6222AD second address: 6222B8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnc 00007F96311B0BC6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6222B8 second address: 6222C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F9630EEA8A6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 62246C second address: 6224A9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BD1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d jnp 00007F96311B0BC6h 0x00000013 pushad 0x00000014 popad 0x00000015 popad 0x00000016 push ecx 0x00000017 jns 00007F96311B0BC6h 0x0000001d pop ecx 0x0000001e pushad 0x0000001f jmp 00007F96311B0BD0h 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 62286A second address: 622870 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 622870 second address: 62287A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 621618 second address: 621636 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F9630EEA8B8h 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 628F95 second address: 628F9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 628F9B second address: 628FA1 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 628FA1 second address: 628FA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6290F1 second address: 6290FA instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6350D3 second address: 63510D instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jno 00007F96311B0BCCh 0x0000000c ja 00007F96311B0BCEh 0x00000012 popad 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F96311B0BD6h 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 634AE9 second address: 634B00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9630EEA8ACh 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push edx 0x0000000d pop edx 0x0000000e push eax 0x0000000f pop eax 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 634B00 second address: 634B0F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BCBh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 634C4F second address: 634C5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 js 00007F9630EEA8A6h 0x0000000e popad 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 634C5E second address: 634C69 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jne 00007F96311B0BC6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 634C69 second address: 634C6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6368AC second address: 6368B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6368B2 second address: 6368C9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jno 00007F9630EEA8A6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jp 00007F9630EEA8C0h 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6368C9 second address: 6368CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6368CF second address: 6368DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F9630EEA8A6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 639F76 second address: 639F88 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F96311B0BC6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c je 00007F96311B0BC6h 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 639F88 second address: 639F92 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F9630EEA8A6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 63A0F0 second address: 63A10B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BD5h 0x00000007 push eax 0x00000008 push edx 0x00000009 push edi 0x0000000a pop edi 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 646D94 second address: 646DAE instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F9630EEA8A6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c ja 00007F9630EEA8AEh 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 646DAE second address: 646DCD instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F96311B0BCAh 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F96311B0BCFh 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 646DCD second address: 646DD1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 64A11F second address: 64A123 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 649F25 second address: 649F51 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8B8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jno 00007F9630EEA8ACh 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 649F51 second address: 649F5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F96311B0BC6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 649F5B second address: 649F61 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 649F61 second address: 649F6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b push edx 0x0000000c pop edx 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 649F6E second address: 649F8D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8B9h 0x00000007 push esi 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 649F8D second address: 649F9E instructions: 0x00000000 rdtsc 0x00000002 je 00007F96311B0BCCh 0x00000008 jg 00007F96311B0BC6h 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 64F46F second address: 64F480 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push edi 0x00000007 pop edi 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b jnl 00007F9630EEA8A6h 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 64F480 second address: 64F486 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 64F486 second address: 64F496 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jno 00007F9630EEA8A6h 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 64F496 second address: 64F4A4 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F96311B0BC6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d pop eax 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 64F4A4 second address: 64F4A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 655620 second address: 655624 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 655624 second address: 65562C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push edx 0x00000007 pop edx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 655764 second address: 655778 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jbe 00007F96311B0BC6h 0x0000000e jns 00007F96311B0BC6h 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 669982 second address: 669986 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 66983B second address: 669850 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F96311B0BCAh 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e push esi 0x0000000f pop esi 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 669850 second address: 669854 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 669854 second address: 669862 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a push edx 0x0000000b pop edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 669862 second address: 669866 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 66CCE1 second address: 66CCE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 66CCE5 second address: 66CCFA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F9630EEA8ADh 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 66CCFA second address: 66CD04 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007F96311B0BC6h 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 66CD04 second address: 66CD08 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 66CD08 second address: 66CD21 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F96311B0BCBh 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push esi 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 666619 second address: 66662B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9630EEA8ACh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 66662B second address: 66662F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 679EDC second address: 679F05 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8B5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F9630EEA8ACh 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 679F05 second address: 679F11 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jne 00007F96311B0BC6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6A2980 second address: 6A2999 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8B5h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6A2999 second address: 6A29A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6A2B52 second address: 6A2B56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6A2B56 second address: 6A2B6C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BD2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6A2B6C second address: 6A2B7C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F9630EEA8ABh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6A2FFC second address: 6A3013 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BCEh 0x00000007 push eax 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6A3013 second address: 6A3023 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 jl 00007F9630EEA8A6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6A31D8 second address: 6A31DD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6A31DD second address: 6A31E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6A31E3 second address: 6A3228 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F96311B0BCFh 0x00000009 jc 00007F96311B0BC6h 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 jno 00007F96311B0BD0h 0x0000001a push esi 0x0000001b jno 00007F96311B0BC6h 0x00000021 jmp 00007F96311B0BCFh 0x00000026 pop esi 0x00000027 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6A7A96 second address: 6A7AA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6A7AA2 second address: 6A7AAC instructions: 0x00000000 rdtsc 0x00000002 jp 00007F96311B0BC6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6A7B25 second address: 6A7B2F instructions: 0x00000000 rdtsc 0x00000002 je 00007F9630EEA8ACh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6A7B2F second address: 6A7B3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6A7B3B second address: 6A7B58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9630EEA8B8h 0x00000009 popad 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6A7E14 second address: 6A7E30 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jp 00007F96311B0BC6h 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d jl 00007F96311B0BD4h 0x00000013 pushad 0x00000014 jnl 00007F96311B0BC6h 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6A9471 second address: 6A9477 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6A9477 second address: 6A9491 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F96311B0BD2h 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6A9491 second address: 6A9495 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6A9495 second address: 6A94B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F96311B0BD5h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6A94B0 second address: 6A94B5 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6A94B5 second address: 6A94BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6A94BE second address: 6A94C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6AB42B second address: 6AB431 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 6AB431 second address: 6AB46E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9630EEA8B8h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F9630EEA8ACh 0x00000011 jmp 00007F9630EEA8B2h 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4F9079E second address: 4F907FE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F96311B0BD7h 0x00000008 pop ecx 0x00000009 mov esi, ebx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push ebp 0x0000000f jmp 00007F96311B0BD0h 0x00000014 mov dword ptr [esp], ebp 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a mov eax, ebx 0x0000001c pushfd 0x0000001d jmp 00007F96311B0BD9h 0x00000022 jmp 00007F96311B0BCBh 0x00000027 popfd 0x00000028 popad 0x00000029 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4F907FE second address: 4F90804 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4F90804 second address: 4F90808 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4F90808 second address: 4F90870 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F9630EEA8B8h 0x00000013 xor esi, 10258F68h 0x00000019 jmp 00007F9630EEA8ABh 0x0000001e popfd 0x0000001f pushfd 0x00000020 jmp 00007F9630EEA8B8h 0x00000025 jmp 00007F9630EEA8B5h 0x0000002a popfd 0x0000002b popad 0x0000002c rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4F90870 second address: 4F90883 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop esi 0x00000005 mov dx, B80Eh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop ebp 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4F90883 second address: 4F90887 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4F90887 second address: 4F90895 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BCAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4F6001B second address: 4F60058 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8B9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F9630EEA8AEh 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F9630EEA8AEh 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4F60058 second address: 4F6007E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BCBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b pushad 0x0000000c jmp 00007F96311B0BD2h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4F6007E second address: 4F600DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 movzx esi, di 0x00000008 popad 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c mov edx, 0E8208BCh 0x00000011 pushfd 0x00000012 jmp 00007F9630EEA8B5h 0x00000017 xor ecx, 497E8E16h 0x0000001d jmp 00007F9630EEA8B1h 0x00000022 popfd 0x00000023 popad 0x00000024 pop ebp 0x00000025 push eax 0x00000026 push edx 0x00000027 push eax 0x00000028 push edx 0x00000029 jmp 00007F9630EEA8B8h 0x0000002e rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4F600DB second address: 4F600DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4F600DF second address: 4F600E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FD018E second address: 4FD01BC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BCEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F96311B0BD7h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FD01BC second address: 4FD01C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC0DF9 second address: 4FC0E3B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BCCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F96311B0BD0h 0x0000000f push eax 0x00000010 jmp 00007F96311B0BCBh 0x00000015 xchg eax, ebp 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007F96311B0BD0h 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC0E3B second address: 4FC0E4A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8ABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC0E4A second address: 4FC0E50 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA0C64 second address: 4FA0C68 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA0C68 second address: 4FA0C84 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BD8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA0C84 second address: 4FA0C8A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA0C8A second address: 4FA0C8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA0C8E second address: 4FA0C92 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FF03A3 second address: 4FF03A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FF03A7 second address: 4FF03C4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8B9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FF03C4 second address: 4FF03E0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BD1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FF03E0 second address: 4FF03E6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FF03E6 second address: 4FF03EC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FF03EC second address: 4FF03F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FF03F0 second address: 4FF0434 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BCCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007F96311B0BCBh 0x00000011 xchg eax, ebp 0x00000012 jmp 00007F96311B0BD6h 0x00000017 mov ebp, esp 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c mov bx, 3230h 0x00000020 mov edi, 35F5415Ch 0x00000025 popad 0x00000026 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FF0434 second address: 4FF043A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FF043A second address: 4FF043E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FF043E second address: 4FF0458 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F9630EEA8AFh 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FF0458 second address: 4FF045D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FD0E4C second address: 4FD0E50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FD0E50 second address: 4FD0E54 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FD0E54 second address: 4FD0E5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FD0E5A second address: 4FD0E81 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BD2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F96311B0BCEh 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FD0E81 second address: 4FD0E86 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FD0E86 second address: 4FD0ECF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007F96311B0BD7h 0x0000000a xor esi, 68019F0Eh 0x00000010 jmp 00007F96311B0BD9h 0x00000015 popfd 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 xchg eax, ebp 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d movsx ebx, si 0x00000020 mov edi, eax 0x00000022 popad 0x00000023 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FD0ECF second address: 4FD0EDF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9630EEA8ACh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FD0EDF second address: 4FD0EEF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FD0EEF second address: 4FD0EF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FD0EF3 second address: 4FD0F0B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BD4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4F60573 second address: 4F605E1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8ABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F9630EEA8B6h 0x0000000f push eax 0x00000010 pushad 0x00000011 mov ebx, 748535E4h 0x00000016 movsx edx, ax 0x00000019 popad 0x0000001a xchg eax, ebp 0x0000001b pushad 0x0000001c pushfd 0x0000001d jmp 00007F9630EEA8B2h 0x00000022 add esi, 7AFA6898h 0x00000028 jmp 00007F9630EEA8ABh 0x0000002d popfd 0x0000002e mov ah, BEh 0x00000030 popad 0x00000031 mov ebp, esp 0x00000033 pushad 0x00000034 mov edx, 02C8F874h 0x00000039 mov cx, di 0x0000003c popad 0x0000003d pop ebp 0x0000003e push eax 0x0000003f push edx 0x00000040 push eax 0x00000041 push edx 0x00000042 pushad 0x00000043 popad 0x00000044 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4F605E1 second address: 4F605E5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4F605E5 second address: 4F605EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FD04BC second address: 4FD04C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FD04C2 second address: 4FD04E2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8B3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FD04E2 second address: 4FD04E8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FD04E8 second address: 4FD05AC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8ADh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b movzx eax, di 0x0000000e pushfd 0x0000000f jmp 00007F9630EEA8B9h 0x00000014 sub cl, FFFFFFF6h 0x00000017 jmp 00007F9630EEA8B1h 0x0000001c popfd 0x0000001d popad 0x0000001e mov ebp, esp 0x00000020 pushad 0x00000021 push ecx 0x00000022 jmp 00007F9630EEA8B3h 0x00000027 pop eax 0x00000028 mov si, bx 0x0000002b popad 0x0000002c mov eax, dword ptr [ebp+08h] 0x0000002f pushad 0x00000030 push ebx 0x00000031 pushfd 0x00000032 jmp 00007F9630EEA8ACh 0x00000037 adc cx, 2D78h 0x0000003c jmp 00007F9630EEA8ABh 0x00000041 popfd 0x00000042 pop ecx 0x00000043 pushfd 0x00000044 jmp 00007F9630EEA8B9h 0x00000049 xor si, FE16h 0x0000004e jmp 00007F9630EEA8B1h 0x00000053 popfd 0x00000054 popad 0x00000055 and dword ptr [eax], 00000000h 0x00000058 push eax 0x00000059 push edx 0x0000005a pushad 0x0000005b mov ecx, 70A3E195h 0x00000060 popad 0x00000061 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FE011A second address: 4FE0136 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BD1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FE0136 second address: 4FE013A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FE013A second address: 4FE014D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BCFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4F8086B second address: 4F8089B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushfd 0x00000006 jmp 00007F9630EEA8B0h 0x0000000b sub esi, 06BD0578h 0x00000011 jmp 00007F9630EEA8ABh 0x00000016 popfd 0x00000017 popad 0x00000018 xchg eax, ebp 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4F8089B second address: 4F8089F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4F8089F second address: 4F808A3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4F808A3 second address: 4F808A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4F808A9 second address: 4F808D9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8AAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F9630EEA8ABh 0x0000000f xchg eax, ebp 0x00000010 pushad 0x00000011 push eax 0x00000012 mov si, dx 0x00000015 pop ebx 0x00000016 mov ecx, 0F836623h 0x0000001b popad 0x0000001c mov ebp, esp 0x0000001e pushad 0x0000001f push eax 0x00000020 push edx 0x00000021 mov si, FA11h 0x00000025 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FE0BDA second address: 4FE0C6A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F96311B0BD7h 0x00000008 pop ecx 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c xchg eax, ecx 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007F96311B0BD0h 0x00000014 and ecx, 2723AD08h 0x0000001a jmp 00007F96311B0BCBh 0x0000001f popfd 0x00000020 pushfd 0x00000021 jmp 00007F96311B0BD8h 0x00000026 sbb eax, 561A4F68h 0x0000002c jmp 00007F96311B0BCBh 0x00000031 popfd 0x00000032 popad 0x00000033 push eax 0x00000034 jmp 00007F96311B0BD9h 0x00000039 xchg eax, ecx 0x0000003a push eax 0x0000003b push edx 0x0000003c push eax 0x0000003d push edx 0x0000003e push eax 0x0000003f push edx 0x00000040 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FE0C6A second address: 4FE0C6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FE0C6E second address: 4FE0C81 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BCFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FE0C81 second address: 4FE0C87 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FE0C87 second address: 4FE0C8B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FE0C8B second address: 4FE0CC8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [774365FCh] 0x0000000d jmp 00007F9630EEA8B7h 0x00000012 test eax, eax 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F9630EEA8B5h 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FE0CC8 second address: 4FE0CCE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FE0CCE second address: 4FE0CD2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FE0CD2 second address: 4FE0D37 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007F96A3583852h 0x0000000e jmp 00007F96311B0BCFh 0x00000013 mov ecx, eax 0x00000015 jmp 00007F96311B0BD6h 0x0000001a xor eax, dword ptr [ebp+08h] 0x0000001d jmp 00007F96311B0BD1h 0x00000022 and ecx, 1Fh 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 jmp 00007F96311B0BD3h 0x0000002d mov edx, eax 0x0000002f popad 0x00000030 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA000C second address: 4FA0013 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov eax, edx 0x00000006 popad 0x00000007 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA0013 second address: 4FA005E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F96311B0BCAh 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d jmp 00007F96311B0BCCh 0x00000012 jmp 00007F96311B0BD2h 0x00000017 popad 0x00000018 xchg eax, ebp 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007F96311B0BD7h 0x00000020 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA005E second address: 4FA0086 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8B9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e mov dh, FCh 0x00000010 movzx ecx, bx 0x00000013 popad 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA0086 second address: 4FA00EF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F96311B0BCCh 0x00000009 sub esi, 2D5B5D28h 0x0000000f jmp 00007F96311B0BCBh 0x00000014 popfd 0x00000015 mov cx, D21Fh 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c and esp, FFFFFFF8h 0x0000001f pushad 0x00000020 pushfd 0x00000021 jmp 00007F96311B0BD0h 0x00000026 sbb eax, 57AC8F88h 0x0000002c jmp 00007F96311B0BCBh 0x00000031 popfd 0x00000032 push eax 0x00000033 push edx 0x00000034 call 00007F96311B0BD6h 0x00000039 pop ecx 0x0000003a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA00EF second address: 4FA0112 instructions: 0x00000000 rdtsc 0x00000002 mov dh, 5Eh 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xchg eax, ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F9630EEA8B9h 0x0000000f rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA0112 second address: 4FA0130 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BD1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b mov si, dx 0x0000000e push eax 0x0000000f push edx 0x00000010 mov bh, 3Ah 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA0130 second address: 4FA0163 instructions: 0x00000000 rdtsc 0x00000002 mov ax, 75C1h 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 xchg eax, ecx 0x0000000a jmp 00007F9630EEA8ACh 0x0000000f xchg eax, ebx 0x00000010 pushad 0x00000011 mov edi, eax 0x00000013 mov di, cx 0x00000016 popad 0x00000017 push eax 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007F9630EEA8B2h 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA0163 second address: 4FA0175 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F96311B0BCEh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA0175 second address: 4FA019E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebx 0x00000009 jmp 00007F9630EEA8B7h 0x0000000e mov ebx, dword ptr [ebp+10h] 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA019E second address: 4FA01A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA01A2 second address: 4FA01BD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8B7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA01BD second address: 4FA01F3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F96311B0BCBh 0x00000009 sbb ch, FFFFFFBEh 0x0000000c jmp 00007F96311B0BD9h 0x00000011 popfd 0x00000012 popad 0x00000013 pop edx 0x00000014 pop eax 0x00000015 xchg eax, esi 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA01F3 second address: 4FA01F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA01F7 second address: 4FA01FD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA01FD second address: 4FA0250 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8B2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b mov cx, bx 0x0000000e call 00007F9630EEA8ADh 0x00000013 pop edi 0x00000014 popad 0x00000015 xchg eax, esi 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 mov ah, dh 0x0000001b pushfd 0x0000001c jmp 00007F9630EEA8B0h 0x00000021 sbb cx, 2278h 0x00000026 jmp 00007F9630EEA8ABh 0x0000002b popfd 0x0000002c popad 0x0000002d rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA0250 second address: 4FA02B4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F96311B0BCBh 0x00000008 pop ecx 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov esi, dword ptr [ebp+08h] 0x0000000f pushad 0x00000010 pushfd 0x00000011 jmp 00007F96311B0BD5h 0x00000016 adc eax, 2C5255C6h 0x0000001c jmp 00007F96311B0BD1h 0x00000021 popfd 0x00000022 call 00007F96311B0BD0h 0x00000027 mov si, 2281h 0x0000002b pop ecx 0x0000002c popad 0x0000002d push ecx 0x0000002e push eax 0x0000002f push edx 0x00000030 pushad 0x00000031 mov ebx, 580EEB0Ah 0x00000036 popad 0x00000037 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA02B4 second address: 4FA0300 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F9630EEA8ADh 0x00000009 xor esi, 4EB63886h 0x0000000f jmp 00007F9630EEA8B1h 0x00000014 popfd 0x00000015 push esi 0x00000016 pop ebx 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a mov dword ptr [esp], edi 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007F9630EEA8B9h 0x00000024 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA0300 second address: 4FA0326 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BD1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test esi, esi 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F96311B0BCDh 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA0326 second address: 4FA03B2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8B1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F96A32F8B80h 0x0000000f jmp 00007F9630EEA8AEh 0x00000014 cmp dword ptr [esi+08h], DDEEDDEEh 0x0000001b pushad 0x0000001c pushfd 0x0000001d jmp 00007F9630EEA8AEh 0x00000022 and ecx, 3347AA48h 0x00000028 jmp 00007F9630EEA8ABh 0x0000002d popfd 0x0000002e mov esi, 241C2DBFh 0x00000033 popad 0x00000034 je 00007F96A32F8B53h 0x0000003a jmp 00007F9630EEA8B2h 0x0000003f mov edx, dword ptr [esi+44h] 0x00000042 push eax 0x00000043 push edx 0x00000044 jmp 00007F9630EEA8B7h 0x00000049 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA03B2 second address: 4FA03CA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F96311B0BD4h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA03CA second address: 4FA03CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA03CE second address: 4FA043F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 or edx, dword ptr [ebp+0Ch] 0x0000000b jmp 00007F96311B0BD7h 0x00000010 test edx, 61000000h 0x00000016 jmp 00007F96311B0BD6h 0x0000001b jne 00007F96A35BEE42h 0x00000021 jmp 00007F96311B0BD0h 0x00000026 test byte ptr [esi+48h], 00000001h 0x0000002a push eax 0x0000002b push edx 0x0000002c jmp 00007F96311B0BD7h 0x00000031 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA043F second address: 4FA04A1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F9630EEA8AFh 0x00000009 sbb esi, 57CD576Eh 0x0000000f jmp 00007F9630EEA8B9h 0x00000014 popfd 0x00000015 pushfd 0x00000016 jmp 00007F9630EEA8B0h 0x0000001b xor al, FFFFFFE8h 0x0000001e jmp 00007F9630EEA8ABh 0x00000023 popfd 0x00000024 popad 0x00000025 pop edx 0x00000026 pop eax 0x00000027 jne 00007F96A32F8AB2h 0x0000002d push eax 0x0000002e push edx 0x0000002f push eax 0x00000030 push edx 0x00000031 pushad 0x00000032 popad 0x00000033 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA04A1 second address: 4FA04A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA04A5 second address: 4FA04AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA04AB second address: 4FA04C8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F96311B0BD9h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC02F6 second address: 4FC02FC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC02FC second address: 4FC0302 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC0302 second address: 4FC0334 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8B4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c jmp 00007F9630EEA8B0h 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 push eax 0x00000016 pop edi 0x00000017 popad 0x00000018 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC0334 second address: 4FC0339 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC0339 second address: 4FC03B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007F9630EEA8B1h 0x0000000a adc ecx, 465A6D36h 0x00000010 jmp 00007F9630EEA8B1h 0x00000015 popfd 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 xchg eax, ebp 0x0000001a pushad 0x0000001b mov cx, 90C3h 0x0000001f mov ch, 76h 0x00000021 popad 0x00000022 mov ebp, esp 0x00000024 pushad 0x00000025 push eax 0x00000026 push edx 0x00000027 pushfd 0x00000028 jmp 00007F9630EEA8B7h 0x0000002d or ecx, 2A2AEB1Eh 0x00000033 jmp 00007F9630EEA8B9h 0x00000038 popfd 0x00000039 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC03B0 second address: 4FC03EE instructions: 0x00000000 rdtsc 0x00000002 mov dx, si 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov di, si 0x0000000a popad 0x0000000b and esp, FFFFFFF8h 0x0000000e jmp 00007F96311B0BD6h 0x00000013 xchg eax, ebx 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F96311B0BD7h 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC03EE second address: 4FC0406 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9630EEA8B4h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC0406 second address: 4FC0423 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a jmp 00007F96311B0BCCh 0x0000000f push eax 0x00000010 push edx 0x00000011 mov eax, 12217E87h 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC0423 second address: 4FC0466 instructions: 0x00000000 rdtsc 0x00000002 mov cx, 7C23h 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 xchg eax, ebx 0x0000000a jmp 00007F9630EEA8B6h 0x0000000f xchg eax, esi 0x00000010 jmp 00007F9630EEA8B0h 0x00000015 push eax 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007F9630EEA8ADh 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC0466 second address: 4FC046A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC046A second address: 4FC0470 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC0470 second address: 4FC048E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 mov eax, 3BAA7B3Fh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, esi 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F96311B0BCCh 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC048E second address: 4FC0494 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC0494 second address: 4FC04C4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, AFC3h 0x00000007 mov ah, 85h 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov esi, dword ptr [ebp+08h] 0x0000000f jmp 00007F96311B0BCBh 0x00000014 sub ebx, ebx 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007F96311B0BD2h 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC04C4 second address: 4FC0543 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8ABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test esi, esi 0x0000000b pushad 0x0000000c jmp 00007F9630EEA8B4h 0x00000011 mov ax, 6671h 0x00000015 popad 0x00000016 je 00007F96A32D0745h 0x0000001c pushad 0x0000001d mov di, si 0x00000020 pushad 0x00000021 pushfd 0x00000022 jmp 00007F9630EEA8B4h 0x00000027 or ah, 00000078h 0x0000002a jmp 00007F9630EEA8ABh 0x0000002f popfd 0x00000030 mov si, 59AFh 0x00000034 popad 0x00000035 popad 0x00000036 cmp dword ptr [esi+08h], DDEEDDEEh 0x0000003d pushad 0x0000003e call 00007F9630EEA8B0h 0x00000043 pushad 0x00000044 popad 0x00000045 pop eax 0x00000046 push eax 0x00000047 push edx 0x00000048 mov eax, edi 0x0000004a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC0543 second address: 4FC0578 instructions: 0x00000000 rdtsc 0x00000002 mov dx, 0AEEh 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 mov ecx, esi 0x0000000b jmp 00007F96311B0BD5h 0x00000010 je 00007F96A3596A06h 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007F96311B0BCDh 0x0000001d rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC0578 second address: 4FC05E8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx ebx, si 0x00000006 call 00007F9630EEA8B8h 0x0000000b pop esi 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f test byte ptr [77436968h], 00000002h 0x00000016 pushad 0x00000017 pushfd 0x00000018 jmp 00007F9630EEA8B7h 0x0000001d sbb al, 0000000Eh 0x00000020 jmp 00007F9630EEA8B9h 0x00000025 popfd 0x00000026 mov ebx, esi 0x00000028 popad 0x00000029 jne 00007F96A32D0682h 0x0000002f push eax 0x00000030 push edx 0x00000031 pushad 0x00000032 mov dx, 0F46h 0x00000036 popad 0x00000037 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC06F0 second address: 4FC0724 instructions: 0x00000000 rdtsc 0x00000002 call 00007F96311B0BCAh 0x00000007 pop ecx 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b xchg eax, ebx 0x0000000c jmp 00007F96311B0BD1h 0x00000011 push dword ptr [ebp+14h] 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F96311B0BCDh 0x0000001b rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC076A second address: 4FC0770 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC0770 second address: 4FC07A7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BD4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov esp, ebp 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e movsx edx, cx 0x00000011 jmp 00007F96311B0BD6h 0x00000016 popad 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC07A7 second address: 4FC07AD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC07AD second address: 4FC07B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC07B1 second address: 4FC07CB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8ADh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FC07CB second address: 4FC07DE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BCFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 50119D1 second address: 5011A2E instructions: 0x00000000 rdtsc 0x00000002 mov ch, 24h 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xchg eax, ebp 0x00000008 pushad 0x00000009 pushfd 0x0000000a jmp 00007F9630EEA8B3h 0x0000000f and ah, 0000003Eh 0x00000012 jmp 00007F9630EEA8B9h 0x00000017 popfd 0x00000018 mov ecx, 04F95887h 0x0000001d popad 0x0000001e mov ebp, esp 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007F9630EEA8B9h 0x00000027 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5011A2E second address: 5011AA7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BD1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push 0000007Fh 0x0000000b pushad 0x0000000c mov ebx, ecx 0x0000000e pushfd 0x0000000f jmp 00007F96311B0BD8h 0x00000014 adc si, DEF8h 0x00000019 jmp 00007F96311B0BCBh 0x0000001e popfd 0x0000001f popad 0x00000020 push 00000001h 0x00000022 jmp 00007F96311B0BD6h 0x00000027 push dword ptr [ebp+08h] 0x0000002a push eax 0x0000002b push edx 0x0000002c jmp 00007F96311B0BD7h 0x00000031 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5011AD8 second address: 5011AE6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bl, al 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebp 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c mov esi, ebx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5011AE6 second address: 50119D1 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F96311B0BCDh 0x00000008 sub eax, 0BFC1FB6h 0x0000000e jmp 00007F96311B0BD1h 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 movzx ecx, bx 0x00000019 popad 0x0000001a retn 0004h 0x0000001d lea eax, dword ptr [ebp-10h] 0x00000020 push eax 0x00000021 call ebx 0x00000023 mov edi, edi 0x00000025 pushad 0x00000026 jmp 00007F96311B0BD0h 0x0000002b mov ebx, eax 0x0000002d popad 0x0000002e xchg eax, ebp 0x0000002f jmp 00007F96311B0BCCh 0x00000034 push eax 0x00000035 pushad 0x00000036 pushfd 0x00000037 jmp 00007F96311B0BD1h 0x0000003c jmp 00007F96311B0BCBh 0x00000041 popfd 0x00000042 push eax 0x00000043 push edx 0x00000044 mov di, si 0x00000047 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C1AD8 second address: 5C1ADC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C1ADC second address: 5C1B07 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F96311B0BD9h 0x0000000b popad 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 jbe 00007F96311B0BC6h 0x00000017 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C1B07 second address: 5C1B0B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5C1B0B second address: 5C1B11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4F6024E second address: 4F6027B instructions: 0x00000000 rdtsc 0x00000002 mov al, dl 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov di, si 0x00000009 popad 0x0000000a xchg eax, ebp 0x0000000b jmp 00007F9630EEA8B6h 0x00000010 push eax 0x00000011 pushad 0x00000012 mov eax, edx 0x00000014 popad 0x00000015 xchg eax, ebp 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4F6027B second address: 4F60296 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BD7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4F603BC second address: 4F603DE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8B1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test eax, eax 0x0000000b pushad 0x0000000c movzx eax, di 0x0000000f push eax 0x00000010 push edx 0x00000011 mov edi, 3541D18Ah 0x00000016 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4F40BB1 second address: 4F40C3F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edx, 2929046Ah 0x00000008 pushfd 0x00000009 jmp 00007F96311B0BCBh 0x0000000e jmp 00007F96311B0BD3h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 xchg eax, ebp 0x00000018 pushad 0x00000019 call 00007F96311B0BD4h 0x0000001e movzx esi, dx 0x00000021 pop edi 0x00000022 mov cx, FCA3h 0x00000026 popad 0x00000027 push eax 0x00000028 jmp 00007F96311B0BD9h 0x0000002d xchg eax, ebp 0x0000002e jmp 00007F96311B0BCEh 0x00000033 mov ebp, esp 0x00000035 push eax 0x00000036 push edx 0x00000037 jmp 00007F96311B0BD7h 0x0000003c rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4F40C3F second address: 4F40C57 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9630EEA8B4h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4F40C57 second address: 4F40C68 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebp 0x00000009 pushad 0x0000000a mov cx, dx 0x0000000d push eax 0x0000000e push edx 0x0000000f push edx 0x00000010 pop ecx 0x00000011 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FF04C4 second address: 4FF04C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FF04C8 second address: 4FF04E3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BD7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FF04E3 second address: 4FF04FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9630EEA8B4h 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FF04FB second address: 4FF04FF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FF04FF second address: 4FF053F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushfd 0x0000000e jmp 00007F9630EEA8B3h 0x00000013 xor cx, 6C6Eh 0x00000018 jmp 00007F9630EEA8B9h 0x0000001d popfd 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FF053F second address: 4FF0571 instructions: 0x00000000 rdtsc 0x00000002 mov edi, eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov di, cx 0x00000009 popad 0x0000000a pop ebp 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e pushfd 0x0000000f jmp 00007F96311B0BD2h 0x00000014 or ax, 0B18h 0x00000019 jmp 00007F96311B0BCBh 0x0000001e popfd 0x0000001f rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FD00C2 second address: 4FD00C6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FD00C6 second address: 4FD00CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FD00CC second address: 4FD00DC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9630EEA8ACh 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FD00DC second address: 4FD00E0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FD00E0 second address: 4FD0110 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edx 0x00000009 jmp 00007F9630EEA8ACh 0x0000000e mov dword ptr [esp], ebp 0x00000011 jmp 00007F9630EEA8B0h 0x00000016 mov ebp, esp 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FD0110 second address: 4FD0114 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FD0114 second address: 4FD011A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA0E09 second address: 4FA0E50 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop eax 0x00000005 mov bh, 1Ah 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov ebp, esp 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov bx, 8322h 0x00000013 pushfd 0x00000014 jmp 00007F96311B0BD3h 0x00000019 xor ax, D01Eh 0x0000001e jmp 00007F96311B0BD9h 0x00000023 popfd 0x00000024 popad 0x00000025 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA0E50 second address: 4FA0E56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA0E56 second address: 4FA0E5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA0E5A second address: 4FA0E7A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8B3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA0E7A second address: 4FA0E7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA0E7E second address: 4FA0E99 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8B7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA0E99 second address: 4FA0E9F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FA0E9F second address: 4FA0EA3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5030374 second address: 50303BD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BD5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov edx, ecx 0x0000000f pushfd 0x00000010 jmp 00007F96311B0BD6h 0x00000015 sub esi, 79DD2488h 0x0000001b jmp 00007F96311B0BCBh 0x00000020 popfd 0x00000021 popad 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 50303BD second address: 5030455 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F9630EEA8AFh 0x00000008 mov bh, ah 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, ebp 0x0000000e pushad 0x0000000f pushad 0x00000010 mov eax, ebx 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 jmp 00007F9630EEA8B9h 0x0000001a popad 0x0000001b mov ebp, esp 0x0000001d pushad 0x0000001e push ecx 0x0000001f movsx edx, ax 0x00000022 pop esi 0x00000023 push ebx 0x00000024 movzx ecx, bx 0x00000027 pop edx 0x00000028 popad 0x00000029 push dword ptr [ebp+0Ch] 0x0000002c pushad 0x0000002d call 00007F9630EEA8B6h 0x00000032 pushfd 0x00000033 jmp 00007F9630EEA8B2h 0x00000038 jmp 00007F9630EEA8B5h 0x0000003d popfd 0x0000003e pop eax 0x0000003f mov cx, dx 0x00000042 popad 0x00000043 push dword ptr [ebp+08h] 0x00000046 push eax 0x00000047 push edx 0x00000048 push eax 0x00000049 push edx 0x0000004a push eax 0x0000004b push edx 0x0000004c rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5030455 second address: 5030459 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5030459 second address: 503045D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 503045D second address: 5030463 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5030463 second address: 503049E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9630EEA8B7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 call 00007F9630EEA8A9h 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F9630EEA8B5h 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 503049E second address: 50304BA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BD1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 50304BA second address: 50304BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 50304BE second address: 50304C4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 50304C4 second address: 50305A8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F9630EEA8ABh 0x00000009 sub ch, 0000006Eh 0x0000000c jmp 00007F9630EEA8B9h 0x00000011 popfd 0x00000012 mov ebx, eax 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 mov eax, dword ptr [esp+04h] 0x0000001b jmp 00007F9630EEA8ADh 0x00000020 mov eax, dword ptr [eax] 0x00000022 pushad 0x00000023 call 00007F9630EEA8B7h 0x00000028 jmp 00007F9630EEA8B8h 0x0000002d pop eax 0x0000002e pushfd 0x0000002f jmp 00007F9630EEA8ABh 0x00000034 sub ecx, 0906F68Eh 0x0000003a jmp 00007F9630EEA8B9h 0x0000003f popfd 0x00000040 popad 0x00000041 mov dword ptr [esp+04h], eax 0x00000045 pushad 0x00000046 pushfd 0x00000047 jmp 00007F9630EEA8B7h 0x0000004c and cx, 149Eh 0x00000051 jmp 00007F9630EEA8B9h 0x00000056 popfd 0x00000057 push eax 0x00000058 push edx 0x00000059 mov ax, 66BDh 0x0000005d rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 50305A8 second address: 50305AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 50305AC second address: 50305BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 50305BA second address: 50305BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 50305BE second address: 50305C4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5030608 second address: 5030617 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F96311B0BCBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5030617 second address: 5030649 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F9630EEA8AFh 0x00000009 add cl, 0000001Eh 0x0000000c jmp 00007F9630EEA8B9h 0x00000011 popfd 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 5030649 second address: 503066D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 movzx eax, al 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F96311B0BD6h 0x00000013 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 503066D second address: 5030673 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FE05F4 second address: 4FE0601 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 xchg eax, ebp 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FE0601 second address: 4FE0605 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FE0605 second address: 4FE060B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FE060B second address: 4FE064B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F9630EEA8B2h 0x00000009 or cx, 3ED8h 0x0000000e jmp 00007F9630EEA8ABh 0x00000013 popfd 0x00000014 mov dx, si 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a push eax 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007F9630EEA8B0h 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeRDTSC instruction interceptor: First address: 4FE064B second address: 4FE0655 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, 427D80E4h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSpecial instruction interceptor: First address: 41787E instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSpecial instruction interceptor: First address: 5B7A1F instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSpecial instruction interceptor: First address: 41518A instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSpecial instruction interceptor: First address: 5C6BCB instructions caused by: Self-modifying code
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSpecial instruction interceptor: First address: 62B4DF instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: EC787E instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 1067A1F instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: EC518A instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 1076BCB instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 10DB4DF instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 107787E instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 1217A1F instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 107518A instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 1226BCB instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 128B4DF instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeCode function: 0_2_05020CC3 rdtsc 0_2_05020CC3
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeWindow / User API: threadDelayed 506Jump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeWindow / User API: threadDelayed 672Jump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeWindow / User API: threadDelayed 4686Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 2876Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 2836Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 631Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 4870Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1224Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1280Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1266Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1249Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 1280Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 378Jump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-17975
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_6-17489
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exe TID: 1540Thread sleep count: 41 > 30Jump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exe TID: 1540Thread sleep time: -82041s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exe TID: 1424Thread sleep count: 506 > 30Jump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exe TID: 1424Thread sleep time: -1012506s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exe TID: 572Thread sleep count: 119 > 30Jump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exe TID: 5504Thread sleep count: 672 > 30Jump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exe TID: 5504Thread sleep time: -1344672s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exe TID: 572Thread sleep count: 256 > 30Jump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exe TID: 5936Thread sleep count: 4686 > 30Jump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exe TID: 5936Thread sleep time: -9376686s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3052Thread sleep count: 55 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3052Thread sleep time: -110055s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6480Thread sleep count: 56 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6480Thread sleep time: -112056s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5968Thread sleep count: 69 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3196Thread sleep count: 59 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3196Thread sleep time: -118059s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5968Thread sleep count: 318 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5968Thread sleep time: -32118s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2792Thread sleep count: 2876 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 2792Thread sleep time: -5754876s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3088Thread sleep count: 2836 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3088Thread sleep time: -5674836s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1372Thread sleep count: 38 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1372Thread sleep time: -76038s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5492Thread sleep count: 631 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5492Thread sleep time: -1262631s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6860Thread sleep count: 67 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 6860Thread sleep count: 286 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3560Thread sleep count: 4870 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 3560Thread sleep time: -9744870s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6124Thread sleep count: 1224 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6124Thread sleep time: -2449224s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 3784Thread sleep count: 1280 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 3784Thread sleep time: -2561280s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 1080Thread sleep count: 102 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 1080Thread sleep count: 339 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 1080Thread sleep time: -34239s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6904Thread sleep count: 1266 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6904Thread sleep time: -2533266s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 5952Thread sleep count: 1249 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 5952Thread sleep time: -2499249s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6292Thread sleep count: 123 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 4024Thread sleep count: 42 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 4024Thread sleep time: -84042s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6268Thread sleep count: 1280 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6268Thread sleep time: -2561280s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6292Thread sleep count: 378 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 6292Thread sleep time: -38178s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: RageMP131.exe, RageMP131.exe, 0000000C.00000002.3341151629.00000000011F6000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
            Source: RageMP131.exe, 00000008.00000002.3338690809.0000000000967000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&
            Source: hYrJbjnzVc.exe, 00000000.00000002.3343201264.0000000001250000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000J
            Source: hYrJbjnzVc.exe, 00000000.00000003.2142690858.00000000012CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&0000
            Source: hYrJbjnzVc.exe, 00000000.00000002.3341233164.0000000000F5C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}$
            Source: RageMP131.exe, 0000000C.00000002.3338094758.0000000000AFC000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}d
            Source: RageMP131.exe, 0000000C.00000003.2427156911.0000000000D68000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: hYrJbjnzVc.exe, 00000000.00000002.3343201264.0000000001290000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 9e146be9-c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_933EE5DA
            Source: MPGPH131.exe, 00000007.00000003.2210426857.0000000001785000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6b
            Source: MPGPH131.exe, 00000007.00000002.3341384311.0000000001785000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}~
            Source: RageMP131.exe, 0000000C.00000003.2427156911.0000000000D68000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: hYrJbjnzVc.exe, 00000000.00000003.2142690858.00000000012D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b};
            Source: MPGPH131.exe, 00000007.00000002.3341384311.0000000001785000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: k&Ven_VMware&Prod_Virtual_dih
            Source: MPGPH131.exe, 00000006.00000002.3339556281.0000000000987000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllH
            Source: RageMP131.exe, 00000008.00000003.2316246161.000000000097E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: RageMP131.exe, 00000008.00000002.3338352457.00000000006FC000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}4
            Source: hYrJbjnzVc.exe, 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3341333728.0000000001046000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000002.3339709367.0000000001046000.00000040.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000008.00000002.3340597184.00000000011F6000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000C.00000002.3341151629.00000000011F6000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
            Source: MPGPH131.exe, 00000007.00000002.3341384311.000000000171B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000q
            Source: RageMP131.exe, 0000000C.00000003.2427156911.0000000000D68000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
            Source: hYrJbjnzVc.exe, 00000000.00000002.3343201264.00000000012BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3341384311.000000000176D000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3338690809.0000000000967000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3338900504.0000000000D4F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: RageMP131.exe, 00000008.00000002.3338690809.000000000097C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 3c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_933EE5DA
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeSystem information queried: ModuleInformationJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeProcess information queried: ProcessInformationJump to behavior

            Anti Debugging

            barindex
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: gbdyllo
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: ollydbg
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: NTICE
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: SICE
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: SIWVID
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeCode function: 0_2_05020CC3 rdtsc 0_2_05020CC3
            Source: hYrJbjnzVc.exe, hYrJbjnzVc.exe, 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmp, RageMP131.exe, RageMP131.exe, 0000000C.00000002.3341151629.00000000011F6000.00000040.00000001.01000000.00000006.sdmpBinary or memory string: >Program Manager
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeCode function: 0_2_002B360D GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,0_2_002B360D
            Source: C:\Users\user\Desktop\hYrJbjnzVc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: Process Memory Space: hYrJbjnzVc.exe PID: 1968, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 6976, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 6864, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 3992, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 7080, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: Process Memory Space: hYrJbjnzVc.exe PID: 1968, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 6976, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 6864, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 3992, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 7080, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Command and Scripting Interpreter
            1
            Scheduled Task/Job
            2
            Process Injection
            1
            Masquerading
            OS Credential Dumping1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Scheduled Task/Job
            1
            Registry Run Keys / Startup Folder
            1
            Scheduled Task/Job
            24
            Virtualization/Sandbox Evasion
            LSASS Memory641
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAt1
            DLL Side-Loading
            1
            Registry Run Keys / Startup Folder
            2
            Process Injection
            Security Account Manager24
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive1
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            NTDS2
            Process Discovery
            Distributed Component Object ModelInput Capture1
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
            Obfuscated Files or Information
            LSA Secrets1
            Application Window Discovery
            SSHKeylogging1
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
            Software Packing
            Cached Domain Credentials1
            System Network Configuration Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSync214
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1435364 Sample: hYrJbjnzVc.exe Startdate: 02/05/2024 Architecture: WINDOWS Score: 100 31 ipinfo.io 2->31 35 Snort IDS alert for network traffic 2->35 37 Multi AV Scanner detection for submitted file 2->37 39 Yara detected RisePro Stealer 2->39 41 3 other signatures 2->41 8 hYrJbjnzVc.exe 1 9 2->8         started        13 RageMP131.exe 2 2->13         started        15 MPGPH131.exe 2 2->15         started        17 2 other processes 2->17 signatures3 process4 dnsIp5 33 147.45.47.93, 49710, 49712, 49713 FREE-NET-ASFREEnetEU Russian Federation 8->33 27 C:\Users\user\AppData\Local\...\RageMP131.exe, PE32 8->27 dropped 29 C:\ProgramData\MPGPH131\MPGPH131.exe, PE32 8->29 dropped 43 Detected unpacking (changes PE section rights) 8->43 45 Found stalling execution ending in API Sleep call 8->45 47 Uses schtasks.exe or at.exe to add and modify task schedules 8->47 49 Tries to detect virtualization through RDTSC time measurements 8->49 19 schtasks.exe 1 8->19         started        21 schtasks.exe 1 8->21         started        51 Multi AV Scanner detection for dropped file 13->51 53 Tries to detect sandboxes and other dynamic analysis tools (window names) 13->53 55 Machine Learning detection for dropped file 13->55 57 Tries to evade debugger and weak emulator (self modifying code) 15->57 59 Hides threads from debuggers 15->59 61 Tries to detect sandboxes / dynamic malware analysis system (registry check) 15->61 file6 signatures7 process8 process9 23 conhost.exe 19->23         started        25 conhost.exe 21->25         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            hYrJbjnzVc.exe53%ReversingLabsWin32.Trojan.RisePro
            hYrJbjnzVc.exe51%VirustotalBrowse
            hYrJbjnzVc.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe100%Joe Sandbox ML
            C:\ProgramData\MPGPH131\MPGPH131.exe100%Joe Sandbox ML
            C:\ProgramData\MPGPH131\MPGPH131.exe53%ReversingLabsWin32.Trojan.RisePro
            C:\ProgramData\MPGPH131\MPGPH131.exe51%VirustotalBrowse
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe53%ReversingLabsWin32.Trojan.RisePro
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe51%VirustotalBrowse
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            ipinfo.io
            34.117.186.192
            truefalse
              high
              NameSourceMaliciousAntivirus DetectionReputation
              https://ipinfo.io/widget/demo/191.96.150.225T5hYrJbjnzVc.exe, 00000000.00000002.3343201264.00000000012BA000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://ipinfo.io/g_EntriesRageMP131.exe, 00000008.00000002.3338690809.0000000000937000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://ipinfo.io/RageMP131.exe, RageMP131.exe, 0000000C.00000002.3338900504.0000000000D25000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3338900504.0000000000D3F000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://www.maxmind.com/en/locate-my-ip-addressRageMP131.exefalse
                      high
                      https://ipinfo.io/tGRageMP131.exe, 00000008.00000002.3338690809.000000000094D000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://ipinfo.io/5RageMP131.exe, 0000000C.00000002.3338900504.0000000000D3F000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://ipinfo.io/M%MPGPH131.exe, 00000006.00000002.3339556281.0000000000957000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dllhYrJbjnzVc.exe, 00000000.00000003.2086229029.0000000004EF0000.00000004.00001000.00020000.00000000.sdmp, hYrJbjnzVc.exe, 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3340659649.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000003.2169961403.0000000004B20000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3338357309.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000003.2169331680.0000000005620000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 00000008.00000003.2272253211.0000000004C40000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000C.00000003.2364731644.0000000005020000.00000004.00001000.00020000.00000000.sdmpfalse
                              high
                              http://www.winimage.com/zLibDllhYrJbjnzVc.exe, 00000000.00000003.2086229029.0000000004EF0000.00000004.00001000.00020000.00000000.sdmp, hYrJbjnzVc.exe, 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000006.00000002.3340659649.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000006.00000003.2169961403.0000000004B20000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3338357309.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, MPGPH131.exe, 00000007.00000003.2169331680.0000000005620000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 00000008.00000003.2272253211.0000000004C40000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, RageMP131.exe, 0000000C.00000003.2364731644.0000000005020000.00000004.00001000.00020000.00000000.sdmpfalse
                                high
                                https://ipinfo.io/widget/demo/191.96.150.225hYrJbjnzVc.exe, 00000000.00000002.3343201264.00000000012BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3339556281.0000000000987000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3341384311.000000000177C000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3341384311.000000000171B000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3338690809.0000000000967000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3338900504.0000000000D30000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://t.me/RiseProSUPPORThYrJbjnzVc.exe, 00000000.00000002.3343201264.000000000125E000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3339556281.000000000092E000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000007.00000002.3341384311.000000000171B000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000008.00000002.3338690809.000000000090E000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000C.00000002.3338900504.0000000000CFB000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://t.me/RiseProSUPPORTDMPGPH131.exe, 00000007.00000002.3341384311.000000000171B000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://ipinfo.io/ameSpace=hYrJbjnzVc.exe, 00000000.00000002.3343201264.0000000001290000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://ipinfo.io/widget/demo/191.96.150.225r2GhYrJbjnzVc.exe, 00000000.00000002.3343201264.00000000012BA000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://ipinfo.io/widget/demo/191.96.150.225RRageMP131.exe, 00000008.00000002.3338690809.0000000000967000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            147.45.47.93
                                            unknownRussian Federation
                                            2895FREE-NET-ASFREEnetEUtrue
                                            Joe Sandbox version:40.0.0 Tourmaline
                                            Analysis ID:1435364
                                            Start date and time:2024-05-02 15:48:06 +02:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 8m 46s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:14
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:hYrJbjnzVc.exe
                                            renamed because original name is a hash value
                                            Original Sample Name:adb680e5c7586df1d183ad1ef4807648.exe
                                            Detection:MAL
                                            Classification:mal100.troj.evad.winEXE@11/5@1/1
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HCA Information:Failed
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                            • Not all processes where analyzed, report is missing behavior information
                                            TimeTypeDescription
                                            15:49:01Task SchedulerRun new task: MPGPH131 HR path: C:\ProgramData\MPGPH131\MPGPH131.exe
                                            15:49:01Task SchedulerRun new task: MPGPH131 LG path: C:\ProgramData\MPGPH131\MPGPH131.exe
                                            15:49:01AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                            15:49:12AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                            15:49:25API Interceptor1226503x Sleep call for process: hYrJbjnzVc.exe modified
                                            15:49:34API Interceptor1422309x Sleep call for process: MPGPH131.exe modified
                                            15:49:44API Interceptor950349x Sleep call for process: RageMP131.exe modified
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            147.45.47.934yFaZU8fhT.exeGet hashmaliciousRisePro StealerBrowse
                                              RY5YJaMEWE.exeGet hashmaliciousRisePro StealerBrowse
                                                OUZXNOqKXg.exeGet hashmaliciousRisePro StealerBrowse
                                                  0BzQNa8hYd.exeGet hashmaliciousRisePro StealerBrowse
                                                    3CkMJ4UkNy.exeGet hashmaliciousRisePro StealerBrowse
                                                      SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeGet hashmaliciousRisePro StealerBrowse
                                                        file.exeGet hashmaliciousRisePro StealerBrowse
                                                          SecuriteInfo.com.Win32.PWSX-gen.2624.6335.exeGet hashmaliciousRisePro StealerBrowse
                                                            tZvjMg3Hw9.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro Stealer, Vidar, zgRATBrowse
                                                              2zdult23rz.exeGet hashmaliciousRisePro StealerBrowse
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                ipinfo.io4yFaZU8fhT.exeGet hashmaliciousRisePro StealerBrowse
                                                                • 34.117.186.192
                                                                RY5YJaMEWE.exeGet hashmaliciousRisePro StealerBrowse
                                                                • 34.117.186.192
                                                                OUZXNOqKXg.exeGet hashmaliciousRisePro StealerBrowse
                                                                • 34.117.186.192
                                                                0BzQNa8hYd.exeGet hashmaliciousRisePro StealerBrowse
                                                                • 34.117.186.192
                                                                3CkMJ4UkNy.exeGet hashmaliciousRisePro StealerBrowse
                                                                • 34.117.186.192
                                                                SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeGet hashmaliciousRisePro StealerBrowse
                                                                • 34.117.186.192
                                                                file.exeGet hashmaliciousRisePro StealerBrowse
                                                                • 34.117.186.192
                                                                831107010C8578AD95A12C5498B03755EAC398B5BBC0D.exeGet hashmaliciousRisePro StealerBrowse
                                                                • 34.117.186.192
                                                                SecuriteInfo.com.Win32.PWSX-gen.2624.6335.exeGet hashmaliciousRisePro StealerBrowse
                                                                • 34.117.186.192
                                                                tZvjMg3Hw9.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro Stealer, Vidar, zgRATBrowse
                                                                • 34.117.186.192
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                FREE-NET-ASFREEnetEUKhbShPK91I.exeGet hashmaliciousUnknownBrowse
                                                                • 193.233.132.56
                                                                4yFaZU8fhT.exeGet hashmaliciousRisePro StealerBrowse
                                                                • 147.45.47.93
                                                                RY5YJaMEWE.exeGet hashmaliciousRisePro StealerBrowse
                                                                • 147.45.47.93
                                                                MejqsB9tx9.exeGet hashmaliciousAmadeyBrowse
                                                                • 193.233.132.56
                                                                OUZXNOqKXg.exeGet hashmaliciousRisePro StealerBrowse
                                                                • 147.45.47.93
                                                                0BzQNa8hYd.exeGet hashmaliciousRisePro StealerBrowse
                                                                • 147.45.47.93
                                                                3CkMJ4UkNy.exeGet hashmaliciousRisePro StealerBrowse
                                                                • 147.45.47.93
                                                                U8uFcjIjAR.exeGet hashmaliciousLummaC, Amadey, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLineBrowse
                                                                • 193.233.132.234
                                                                SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeGet hashmaliciousRisePro StealerBrowse
                                                                • 147.45.47.93
                                                                file.exeGet hashmaliciousRisePro StealerBrowse
                                                                • 147.45.47.93
                                                                No context
                                                                No context
                                                                Process:C:\Users\user\Desktop\hYrJbjnzVc.exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):2372608
                                                                Entropy (8bit):7.919032959088412
                                                                Encrypted:false
                                                                SSDEEP:49152:JGY5918NqwTEgTcQnMbHNnl3sUngdXzd+DDLosT0ByPhO3l:GhTPMbFK5+DDLLWyPw
                                                                MD5:ADB680E5C7586DF1D183AD1EF4807648
                                                                SHA1:DF9C9E796C877100EBE80A457D57D9358401BE50
                                                                SHA-256:597E094A98F56C0EF8B89CEDD7C96D14FCA1F5DD25E6E120525246D47DE6BA96
                                                                SHA-512:D3B8383DE7A18EA724CBC3CDFEE753C45C0FF7289E338863492D8C7FFA9FB3193A7311A65E631156444E2516C515F679851E8EF7FA8F58344AE2B881EB6FFA0F
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                • Antivirus: ReversingLabs, Detection: 53%
                                                                • Antivirus: Virustotal, Detection: 51%, Browse
                                                                Reputation:low
                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L.....2f...............'..............\...........@...........................\......Z$...@.................................^0..r....p......................8.[...............................[.................................@................... . .`..........................@....rsrc........p......................@....idata .....0......................@... ..*..@......................@...rtycizfs.P...PC..D..................@...ybcmmseg......\.......$.............@....taggant.0....\.."....$.............@...........................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\hYrJbjnzVc.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):26
                                                                Entropy (8bit):3.95006375643621
                                                                Encrypted:false
                                                                SSDEEP:3:ggPYV:rPYV
                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                Malicious:false
                                                                Reputation:high, very likely benign file
                                                                Preview:[ZoneTransfer]....ZoneId=0
                                                                Process:C:\Users\user\Desktop\hYrJbjnzVc.exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):2372608
                                                                Entropy (8bit):7.919032959088412
                                                                Encrypted:false
                                                                SSDEEP:49152:JGY5918NqwTEgTcQnMbHNnl3sUngdXzd+DDLosT0ByPhO3l:GhTPMbFK5+DDLLWyPw
                                                                MD5:ADB680E5C7586DF1D183AD1EF4807648
                                                                SHA1:DF9C9E796C877100EBE80A457D57D9358401BE50
                                                                SHA-256:597E094A98F56C0EF8B89CEDD7C96D14FCA1F5DD25E6E120525246D47DE6BA96
                                                                SHA-512:D3B8383DE7A18EA724CBC3CDFEE753C45C0FF7289E338863492D8C7FFA9FB3193A7311A65E631156444E2516C515F679851E8EF7FA8F58344AE2B881EB6FFA0F
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                • Antivirus: ReversingLabs, Detection: 53%
                                                                • Antivirus: Virustotal, Detection: 51%, Browse
                                                                Reputation:low
                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L.....2f...............'..............\...........@...........................\......Z$...@.................................^0..r....p......................8.[...............................[.................................@................... . .`..........................@....rsrc........p......................@....idata .....0......................@... ..*..@......................@...rtycizfs.P...PC..D..................@...ybcmmseg......\.......$.............@....taggant.0....\.."....$.............@...........................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\hYrJbjnzVc.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):26
                                                                Entropy (8bit):3.95006375643621
                                                                Encrypted:false
                                                                SSDEEP:3:ggPYV:rPYV
                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                Malicious:false
                                                                Reputation:high, very likely benign file
                                                                Preview:[ZoneTransfer]....ZoneId=0
                                                                Process:C:\Users\user\Desktop\hYrJbjnzVc.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:modified
                                                                Size (bytes):13
                                                                Entropy (8bit):3.0269868333592873
                                                                Encrypted:false
                                                                SSDEEP:3:LuTSyW:KHW
                                                                MD5:EE8B418DF543DCFB14DBB6C7519D8A7A
                                                                SHA1:1B04FAA0A7A3D4DFB8CBB4EA4F216E06079EAB31
                                                                SHA-256:CE48C61ECBB0CC98FA7AAAA38C30B5287292A53E49CA7D73ECE624EDE62FD1A9
                                                                SHA-512:F11F13CF79812936FE18F2C2485D4D7E9219513D3CBA9B46D0854538BCA2225D8FE1D486F9637C500085C62C2CDF2D8C3D1E7B56161EAA61231D5F7916EC4C60
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:1714663095323
                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Entropy (8bit):7.919032959088412
                                                                TrID:
                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                File name:hYrJbjnzVc.exe
                                                                File size:2'372'608 bytes
                                                                MD5:adb680e5c7586df1d183ad1ef4807648
                                                                SHA1:df9c9e796c877100ebe80a457d57d9358401be50
                                                                SHA256:597e094a98f56c0ef8b89cedd7c96d14fca1f5dd25e6e120525246d47de6ba96
                                                                SHA512:d3b8383de7a18ea724cbc3cdfee753c45c0ff7289e338863492d8c7ffa9fb3193a7311a65e631156444e2516c515f679851e8ef7fa8f58344ae2b881eb6ffa0f
                                                                SSDEEP:49152:JGY5918NqwTEgTcQnMbHNnl3sUngdXzd+DDLosT0ByPhO3l:GhTPMbFK5+DDLLWyPw
                                                                TLSH:4CB533999F400DF3F5251D7811A1D77E92758DA7AB84C13B7AC67E2FBE36D80AA31008
                                                                File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s...../.s
                                                                Icon Hash:4c4d96ec0ce6c600
                                                                Entrypoint:0x9cb000
                                                                Entrypoint Section:.taggant
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x663202DB [Wed May 1 08:52:43 2024 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:6
                                                                OS Version Minor:0
                                                                File Version Major:6
                                                                File Version Minor:0
                                                                Subsystem Version Major:6
                                                                Subsystem Version Minor:0
                                                                Import Hash:2eabe9054cad5152567f0699947a2c5b
                                                                Instruction
                                                                jmp 00007F96307F2D7Ah
                                                                movlps xmm4, qword ptr [eax+eax]
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                jmp 00007F96307F4D75h
                                                                add byte ptr [edi], al
                                                                or al, byte ptr [eax]
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], dh
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax+edx*4+4D980FDDh], dh
                                                                xchg dword ptr [ebx], ebx
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                pop es
                                                                or al, byte ptr [eax]
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], cl
                                                                add byte ptr [eax], 00000000h
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                adc byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                push es
                                                                or al, byte ptr [eax]
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x19305e0x72.idata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1870000xb2a0.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x5be3380x10rtycizfs
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x5be2e80x18rtycizfs
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x1803c40x40
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                0x10000x1860000xaa0004d98df1064933d15e0a499c9306a9302False0.9882769416360294Encore unsupported executable not stripped - version 88877.924289235236996IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rsrc0x1870000xb2a00x1600b2cc9fe16da2fe3883ed9d19a930ab13False0.9412286931818182data7.715353488316914IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .idata 0x1930000x10000x2008c29efdfbff94ae979a616a79e50cbd3False0.1640625data1.180504109820196IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                0x1940000x2a10000x200f8889dc20c1d91e42593b253897ffdfaunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                rtycizfs0x4350000x1950000x194400f376192d78e3e1cf7ad58b68460f20dcFalse0.9708051899737168data7.911667279717006IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                ybcmmseg0x5ca0000x10000x4003b768ebd7847f76ac531056f1e75e381False0.7744140625data6.093256920081115IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .taggant0x5cb0000x30000x220086d2e08022f947422d806d63a54a2d69False0.06043198529411765DOS executable (COM)0.7066680315415986IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                RT_ICON0x5be3480x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024RussianRussia0.1320921985815603
                                                                RT_ICON0x5be7b00x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 1600RussianRussia0.10465116279069768
                                                                RT_ICON0x5bee680x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304RussianRussia0.08770491803278689
                                                                RT_ICON0x5bf7f00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096RussianRussia0.05722326454033771
                                                                RT_ICON0x5c08980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216RussianRussia0.03475103734439834
                                                                RT_ICON0x5c2e400x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384RussianRussia0.02509447331128956
                                                                RT_ICON0x5c70680x1aaePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedRussianRussia0.39780380673499266
                                                                RT_GROUP_ICON0x5c8b160x68dataRussianRussia0.7596153846153846
                                                                RT_VERSION0x5c8b7e0x398OpenPGP Public KeyRussianRussia0.42282608695652174
                                                                RT_MANIFEST0x5c8f160x2e6XML 1.0 document, ASCII text, with CRLF line terminators0.45417789757412397
                                                                RT_MANIFEST0x5c91fc0x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                                                DLLImport
                                                                kernel32.dlllstrcpy
                                                                Language of compilation systemCountry where language is spokenMap
                                                                RussianRussia
                                                                EnglishUnited States
                                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                05/02/24-15:51:00.791980TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4971258709192.168.2.6147.45.47.93
                                                                05/02/24-15:51:00.553596TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4971058709192.168.2.6147.45.47.93
                                                                05/02/24-15:51:01.432598TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4972158709192.168.2.6147.45.47.93
                                                                05/02/24-15:49:19.512222TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)5870949719147.45.47.93192.168.2.6
                                                                05/02/24-15:50:31.741030TCP2046267ET TROJAN [ANY.RUN] RisePro TCP (External IP)5870949712147.45.47.93192.168.2.6
                                                                05/02/24-15:50:32.037911TCP2046267ET TROJAN [ANY.RUN] RisePro TCP (External IP)5870949719147.45.47.93192.168.2.6
                                                                05/02/24-15:50:32.590411TCP2046267ET TROJAN [ANY.RUN] RisePro TCP (External IP)5870949721147.45.47.93192.168.2.6
                                                                05/02/24-15:49:30.619527TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)5870949721147.45.47.93192.168.2.6
                                                                05/02/24-15:50:31.373536TCP2046267ET TROJAN [ANY.RUN] RisePro TCP (External IP)5870949710147.45.47.93192.168.2.6
                                                                05/02/24-15:50:31.755257TCP2046267ET TROJAN [ANY.RUN] RisePro TCP (External IP)5870949713147.45.47.93192.168.2.6
                                                                05/02/24-15:49:01.484930TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)5870949710147.45.47.93192.168.2.6
                                                                05/02/24-15:49:08.939674TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)5870949712147.45.47.93192.168.2.6
                                                                05/02/24-15:49:08.962696TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)5870949713147.45.47.93192.168.2.6
                                                                05/02/24-15:49:02.615417TCP2049060ET TROJAN RisePro TCP Heartbeat Packet4971058709192.168.2.6147.45.47.93
                                                                05/02/24-15:51:01.135824TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4971958709192.168.2.6147.45.47.93
                                                                05/02/24-15:51:00.823298TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4971358709192.168.2.6147.45.47.93
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                May 2, 2024 15:49:01.105108023 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:01.294599056 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:01.294759989 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:01.484930038 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:01.525527000 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:02.615417004 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:02.852906942 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:05.448077917 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:05.681322098 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:08.562479973 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:08.562593937 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:08.750951052 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:08.750974894 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:08.751198053 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:08.751216888 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:08.773525000 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:08.777484894 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:08.939673901 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:08.962696075 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:08.994292974 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:09.009563923 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:09.009666920 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:09.088063955 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:12.658190966 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:12.721848011 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:12.900110006 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:12.963700056 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:19.134862900 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:19.323769093 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:19.323904991 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:19.355957985 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:19.512222052 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:19.587899923 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:19.713074923 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:22.636055946 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:22.868841887 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:30.242886066 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:30.431123972 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:30.431241989 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:30.446367025 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:30.619527102 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:30.681150913 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:30.697559118 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:33.760082960 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:33.994079113 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:35.729940891 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:35.962344885 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:41.979027987 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:41.979057074 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:41.979188919 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:42.212614059 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:42.212651014 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:42.212685108 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:45.103898048 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:45.337368011 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:48.300113916 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:48.365923882 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:48.366051912 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:48.540981054 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:48.602973938 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:48.603166103 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:51.760468960 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:51.760575056 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:51.760679960 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:51.760922909 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:51.993690014 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:51.993709087 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:51.993724108 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:51.993736982 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:54.903541088 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:54.907385111 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:54.907533884 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:55.134660959 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:55.149810076 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:55.149912119 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:58.026196957 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:58.026305914 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:58.026444912 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:58.026570082 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:49:58.259433985 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:58.259480000 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:58.259494066 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:49:58.259505987 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:00.307130098 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:00.540874958 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:01.167133093 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:01.167815924 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:01.167953014 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:01.399893999 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:01.399929047 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:01.399944067 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:04.291541100 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:04.291601896 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:04.291737080 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:04.291892052 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:04.524826050 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:04.524844885 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:04.525060892 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:04.525124073 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:06.572905064 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:06.806058884 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:07.416544914 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:07.416673899 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:07.416785002 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:07.416910887 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:07.650450945 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:07.650532961 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:07.650548935 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:07.650562048 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:09.698009014 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:09.931466103 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:10.557240009 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:10.557431936 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:10.557480097 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:10.557568073 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:10.790654898 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:10.790673971 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:10.790765047 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:10.790781021 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:12.823220015 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:13.056544065 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:13.697936058 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:13.697946072 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:13.698072910 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:13.698117971 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:13.931515932 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:13.931536913 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:13.931549072 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:13.931577921 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:15.963551998 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:16.196960926 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:16.838622093 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:16.838661909 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:16.838773966 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:16.838854074 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:17.073420048 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:17.073447943 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:17.073467970 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:17.073483944 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:19.104368925 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:19.337547064 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:19.964004993 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:19.964135885 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:19.964135885 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:19.964555025 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:20.212697983 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:20.212723017 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:20.212737083 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:20.212752104 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:22.229852915 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:22.468734980 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:23.104432106 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:23.104471922 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:23.104624987 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:23.104728937 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:23.337932110 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:23.337977886 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:23.338009119 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:23.338025093 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:25.354458094 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:25.587424040 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:26.229588032 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:26.229752064 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:26.229854107 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:26.229958057 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:26.463057041 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:26.463150978 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:26.463166952 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:26.463180065 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:28.495663881 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:28.728229046 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:29.355046034 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:29.355072021 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:29.355201960 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:29.355305910 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:29.587729931 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:29.587749004 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:29.587762117 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:29.587776899 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:31.373536110 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:31.448256016 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:31.638736010 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:31.741029978 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:31.755256891 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:31.838067055 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:31.868712902 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:31.869290113 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:32.037910938 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:32.228704929 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:32.590410948 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:32.666224003 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:34.510443926 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:34.743598938 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:34.870377064 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:34.870526075 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:35.103018045 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:35.103086948 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:35.167814016 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:35.399795055 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:35.729207039 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:35.962615967 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:37.635680914 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:37.868902922 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:38.010745049 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:38.010858059 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:38.243655920 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:38.243683100 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:38.292013884 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:38.525005102 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:38.870091915 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:39.104069948 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:40.244997025 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:40.343044043 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:40.511384010 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:40.526246071 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:40.666172981 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:40.728668928 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:40.820094109 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:41.041363001 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:41.138465881 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:41.275547028 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:43.370382071 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:43.602946997 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:43.651788950 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:43.670703888 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:43.884371996 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:43.899974108 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:43.948056936 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:44.181128979 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:44.276345968 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:44.509121895 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:45.932764053 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:45.978682995 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:46.200059891 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:46.215944052 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:46.275561094 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:46.338124037 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:46.479414940 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:46.541198969 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:46.761140108 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:46.969578981 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:49.057537079 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:49.290666103 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:49.338742018 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:49.354475975 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:49.572262049 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:49.587696075 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:49.604809999 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:49.837330103 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:49.897403002 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:50.134561062 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:52.182605028 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:52.415523052 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:52.479414940 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:52.494889975 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:52.712845087 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:52.728379965 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:52.744843960 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:52.978435993 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:53.010783911 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:53.243623972 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:54.264110088 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:54.436111927 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:54.526140928 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:54.541898012 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:54.728682041 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:54.775562048 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:54.863718033 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:55.041260004 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:55.170578003 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:55.275547028 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:57.401369095 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:57.634262085 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:57.651287079 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:57.682887077 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:57.884376049 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:57.915651083 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:57.995009899 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:58.227976084 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:50:58.291731119 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:50:58.525197983 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:00.553596020 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:00.790746927 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:00.791980028 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:00.823297977 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:01.024991035 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:01.056323051 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:01.135823965 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:01.368822098 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:01.432598114 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:01.666587114 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:08.702586889 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:08.805951118 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:09.200347900 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:09.216547012 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:09.244590044 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:09.275522947 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:10.198496103 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:10.244277954 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:14.527427912 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:14.599062920 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:18.604089022 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:18.681781054 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:18.919809103 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:18.934602976 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:18.978657007 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:19.041157007 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:19.432429075 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:19.478677034 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:19.759485006 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:19.931808949 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:25.104531050 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:25.181818008 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:25.354137897 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:25.370846987 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:25.431787014 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:25.478684902 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:25.685748100 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:25.744503021 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:26.104383945 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:26.181945086 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:30.292193890 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:30.369422913 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:30.560349941 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:30.577419996 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:30.681817055 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:30.744357109 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:30.775691986 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:30.931864977 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:30.994515896 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:31.181863070 CEST4972158709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:38.088047981 CEST5870949710147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:38.151268005 CEST5870949712147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:38.166227102 CEST4971058709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:38.166512012 CEST5870949713147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:38.228877068 CEST4971258709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:38.275569916 CEST4971358709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:38.358599901 CEST5870949719147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:38.513964891 CEST5870949721147.45.47.93192.168.2.6
                                                                May 2, 2024 15:51:38.541318893 CEST4971958709192.168.2.6147.45.47.93
                                                                May 2, 2024 15:51:38.598227978 CEST4972158709192.168.2.6147.45.47.93
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                May 2, 2024 15:51:03.077815056 CEST4977853192.168.2.61.1.1.1
                                                                May 2, 2024 15:51:03.167844057 CEST53497781.1.1.1192.168.2.6
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                May 2, 2024 15:51:03.077815056 CEST192.168.2.61.1.1.10xf0dcStandard query (0)ipinfo.ioA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                May 2, 2024 15:51:03.167844057 CEST1.1.1.1192.168.2.60xf0dcNo error (0)ipinfo.io34.117.186.192A (IP address)IN (0x0001)false

                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:15:48:53
                                                                Start date:02/05/2024
                                                                Path:C:\Users\user\Desktop\hYrJbjnzVc.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\hYrJbjnzVc.exe"
                                                                Imagebase:0x280000
                                                                File size:2'372'608 bytes
                                                                MD5 hash:ADB680E5C7586DF1D183AD1EF4807648
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:low
                                                                Has exited:false

                                                                Target ID:2
                                                                Start time:15:48:59
                                                                Start date:02/05/2024
                                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
                                                                Imagebase:0xf50000
                                                                File size:187'904 bytes
                                                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:3
                                                                Start time:15:48:59
                                                                Start date:02/05/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff66e660000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:4
                                                                Start time:15:48:59
                                                                Start date:02/05/2024
                                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
                                                                Imagebase:0xf50000
                                                                File size:187'904 bytes
                                                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:5
                                                                Start time:15:48:59
                                                                Start date:02/05/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff66e660000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:6
                                                                Start time:15:49:01
                                                                Start date:02/05/2024
                                                                Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                                                                Imagebase:0xd30000
                                                                File size:2'372'608 bytes
                                                                MD5 hash:ADB680E5C7586DF1D183AD1EF4807648
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Antivirus matches:
                                                                • Detection: 100%, Joe Sandbox ML
                                                                • Detection: 53%, ReversingLabs
                                                                • Detection: 51%, Virustotal, Browse
                                                                Reputation:low
                                                                Has exited:false

                                                                Target ID:7
                                                                Start time:15:49:01
                                                                Start date:02/05/2024
                                                                Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                                                                Imagebase:0xd30000
                                                                File size:2'372'608 bytes
                                                                MD5 hash:ADB680E5C7586DF1D183AD1EF4807648
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:low
                                                                Has exited:false

                                                                Target ID:8
                                                                Start time:15:49:11
                                                                Start date:02/05/2024
                                                                Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                                                                Imagebase:0xee0000
                                                                File size:2'372'608 bytes
                                                                MD5 hash:ADB680E5C7586DF1D183AD1EF4807648
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Antivirus matches:
                                                                • Detection: 100%, Joe Sandbox ML
                                                                • Detection: 53%, ReversingLabs
                                                                • Detection: 51%, Virustotal, Browse
                                                                Reputation:low
                                                                Has exited:false

                                                                Target ID:12
                                                                Start time:15:49:21
                                                                Start date:02/05/2024
                                                                Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                                                                Imagebase:0xee0000
                                                                File size:2'372'608 bytes
                                                                MD5 hash:ADB680E5C7586DF1D183AD1EF4807648
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Reputation:low
                                                                Has exited:false

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:3.3%
                                                                  Dynamic/Decrypted Code Coverage:4.2%
                                                                  Signature Coverage:2.3%
                                                                  Total number of Nodes:1893
                                                                  Total number of Limit Nodes:30
                                                                  execution_graph 19865 5020902 19866 5020922 19865->19866 19869 50209da 19866->19869 19871 50209ed 19869->19871 19872 5020a29 19871->19872 19873 5020a2d 19871->19873 19874 5020a3e 19873->19874 19886 5020ab1 19874->19886 19887 5020acc 19886->19887 19896 5020ba1 19887->19896 19897 5020bbb 19896->19897 19904 5020c67 19897->19904 19905 5020c6b 19904->19905 19910 5020cb1 19905->19910 19915 5020cc3 19910->19915 19916 5020cce GetCurrentHwProfileW 19915->19916 19918 5020d39 19916->19918 17953 344eb0 17954 34527c 17953->17954 17972 344eee std::ios_base::_Ios_base_dtor __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 17953->17972 17955 344f37 setsockopt recv 17955->17972 17957 345267 Sleep 17957->17954 17957->17972 17958 3451c5 recv 17960 34525f Sleep 17958->17960 17960->17957 17962 344fdd recv 17963 344ffe recv 17962->17963 17962->17972 17963->17972 17966 345291 18062 2b8c60 17966->18062 17968 345086 setsockopt recv 17968->17972 17969 298dc0 2 API calls 17969->17968 17972->17954 17972->17955 17972->17957 17972->17958 17972->17960 17972->17966 17972->17968 17972->17969 17973 345940 WSAStartup 17972->17973 17979 298dc0 17972->17979 17988 2963b0 17972->17988 17993 3452a0 17972->17993 18049 2b3059 17972->18049 18052 289280 17972->18052 17974 345978 17973->17974 17977 345a36 17973->17977 17975 345a04 socket 17974->17975 17974->17977 17976 345a1a connect 17975->17976 17975->17977 17976->17977 17978 345a2c closesocket 17976->17978 17977->17972 17978->17975 17978->17977 17981 298de2 std::locale::_Setgloballocale 17979->17981 17982 298e11 17979->17982 17980 298ef8 17981->17962 17982->17980 18065 2832d0 17982->18065 17984 298e66 std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 17985 298ecb std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 17984->17985 18079 282fe0 17984->18079 17985->17962 17987 298eb8 17987->17962 17990 2963d8 17988->17990 17989 2963e7 17989->17972 17990->17989 17991 2832d0 std::_Throw_Cpp_error 2 API calls 17990->17991 17992 29642a std::locale::_Locimp::_Locimp 17991->17992 17992->17972 17994 34531c 17993->17994 17995 3452ee 17993->17995 17997 345324 17994->17997 17998 34533e 17994->17998 17996 282cf0 std::_Throw_Cpp_error 2 API calls 17995->17996 18001 345300 17996->18001 18002 296290 2 API calls 17997->18002 17999 345346 17998->17999 18000 345360 17998->18000 18003 296290 2 API calls 17999->18003 18004 345385 18000->18004 18005 345368 18000->18005 18006 289280 3 API calls 18001->18006 18045 345314 18002->18045 18003->18045 18007 34538d 18004->18007 18010 3453ab 18004->18010 18005->18045 18234 296290 18005->18234 18006->18045 18275 2c12a7 18007->18275 18011 345670 18010->18011 18012 3453cb 18010->18012 18010->18045 18014 345678 18011->18014 18015 3456cb 18011->18015 18238 285400 18012->18238 18304 29b430 18014->18304 18017 345726 18015->18017 18018 3456d3 18015->18018 18020 345781 18017->18020 18021 34572e 18017->18021 18019 29b430 3 API calls 18018->18019 18019->18045 18023 3457dc 18020->18023 18024 345789 18020->18024 18022 29b430 3 API calls 18021->18022 18022->18045 18025 345834 18023->18025 18026 3457e4 18023->18026 18028 29b430 3 API calls 18024->18028 18025->18045 18311 2d8af0 18025->18311 18029 29b430 3 API calls 18026->18029 18028->18045 18029->18045 18032 3453f0 18033 3454bb 18032->18033 18032->18045 18248 282cf0 18032->18248 18252 29ace0 18032->18252 18255 282d30 18033->18255 18037 3454f0 18038 345562 18037->18038 18040 345595 18037->18040 18039 2963b0 std::_Throw_Cpp_error 2 API calls 18038->18039 18041 34557e 18039->18041 18272 2b9810 18040->18272 18281 34c630 18041->18281 18045->17972 19856 2b360d 18049->19856 18053 2963b0 std::_Throw_Cpp_error 2 API calls 18052->18053 18055 2892d4 18053->18055 18054 298dc0 2 API calls 18056 289523 std::locale::_Locimp::_Locimp 18054->18056 18055->18054 18055->18056 18057 2896e2 std::ios_base::_Ios_base_dtor 18056->18057 18059 2896b6 WSASend 18056->18059 18058 28975d std::ios_base::_Ios_base_dtor 18057->18058 18060 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 18057->18060 18058->17972 18059->18056 18059->18057 18061 28979c 18060->18061 18061->17972 18063 2b8b9c ___std_exception_copy RtlAllocateHeap 18062->18063 18064 2b8c6f __Getctype 18063->18064 18066 2832e2 18065->18066 18068 283306 18065->18068 18069 2832e9 18066->18069 18070 28331f 18066->18070 18067 283318 18067->17984 18068->18067 18071 2b3662 std::_Facet_Register 2 API calls 18068->18071 18084 2b3662 18069->18084 18092 282b50 18070->18092 18075 283310 18071->18075 18074 2832ef 18076 2832f8 18074->18076 18077 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 18074->18077 18075->17984 18076->17984 18078 283329 18077->18078 18080 283017 std::ios_base::_Ios_base_dtor 18079->18080 18081 283007 18079->18081 18080->17987 18081->18080 18082 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 18081->18082 18083 283036 18082->18083 18087 2b3667 std::_Facet_Register 18084->18087 18086 2b3681 18086->18074 18087->18086 18089 282b50 Concurrency::cancel_current_task 18087->18089 18096 2c23dc 18087->18096 18088 2b368d 18088->18088 18089->18088 18102 2b4b05 18089->18102 18093 282b5e Concurrency::cancel_current_task 18092->18093 18094 2b4b05 ___std_exception_copy 2 API calls 18093->18094 18095 282bac 18094->18095 18095->18074 18097 2cb086 __Getctype std::_Facet_Register 18096->18097 18098 2cb0c4 18097->18098 18100 2cb0af RtlAllocateHeap 18097->18100 18110 2c16ef 18098->18110 18100->18097 18101 2cb0c2 18100->18101 18101->18087 18103 2b4b12 18102->18103 18109 282bac 18102->18109 18104 2c23dc ___std_exception_copy 2 API calls 18103->18104 18103->18109 18105 2b4b2f 18104->18105 18106 2b4b3f 18105->18106 18172 2c9995 18105->18172 18181 2c1c86 18106->18181 18109->18074 18113 2c9f85 18110->18113 18114 2c9f8e __Getctype 18113->18114 18121 2c16f4 18114->18121 18124 2ca64c 18114->18124 18116 2c9fd2 __Getctype 18117 2c9fda __Getctype 18116->18117 18118 2ca012 18116->18118 18128 2cb00c 18117->18128 18132 2c9c60 18118->18132 18121->18101 18123 2cb00c __freea RtlAllocateHeap 18123->18121 18127 2ca659 __Getctype std::_Facet_Register 18124->18127 18125 2ca684 RtlAllocateHeap 18126 2ca697 __floor_pentium4 18125->18126 18125->18127 18126->18116 18127->18125 18127->18126 18129 2cb017 __freea 18128->18129 18131 2cb041 18128->18131 18130 2c16ef __floor_pentium4 RtlAllocateHeap 18129->18130 18129->18131 18130->18131 18131->18121 18133 2c9cce __Getctype 18132->18133 18136 2c9c06 18133->18136 18135 2c9cf7 18135->18123 18137 2c9c12 std::_Lockit::_Lockit std::_Locinfo::_Locinfo_dtor 18136->18137 18140 2c9de7 18137->18140 18139 2c9c34 __Getctype 18139->18135 18141 2c9e1d __Getctype 18140->18141 18142 2c9df6 __Getctype 18140->18142 18141->18139 18142->18141 18144 2d2134 18142->18144 18146 2d21b4 18144->18146 18147 2d214a 18144->18147 18145 2d22a5 __Getctype RtlAllocateHeap 18169 2d2210 18145->18169 18148 2cb00c __freea RtlAllocateHeap 18146->18148 18171 2d2202 18146->18171 18147->18146 18152 2cb00c __freea RtlAllocateHeap 18147->18152 18168 2d217d 18147->18168 18149 2d21d6 18148->18149 18150 2cb00c __freea RtlAllocateHeap 18149->18150 18153 2d21e9 18150->18153 18151 2cb00c __freea RtlAllocateHeap 18154 2d21a9 18151->18154 18156 2d2172 18152->18156 18158 2cb00c __freea RtlAllocateHeap 18153->18158 18159 2cb00c __freea RtlAllocateHeap 18154->18159 18155 2d2270 18160 2cb00c __freea RtlAllocateHeap 18155->18160 18161 2d1438 __Getctype RtlAllocateHeap 18156->18161 18157 2cb00c __freea RtlAllocateHeap 18163 2d2194 18157->18163 18164 2d21f7 18158->18164 18159->18146 18167 2d2276 18160->18167 18161->18168 18162 2cb00c RtlAllocateHeap __freea 18162->18169 18165 2d1897 __Getctype RtlAllocateHeap 18163->18165 18166 2cb00c __freea RtlAllocateHeap 18164->18166 18170 2d219f 18165->18170 18166->18171 18167->18141 18168->18157 18168->18170 18169->18155 18169->18162 18170->18151 18171->18145 18173 2c99a3 18172->18173 18175 2c99b1 18172->18175 18173->18175 18179 2c99c9 18173->18179 18174 2c16ef __floor_pentium4 RtlAllocateHeap 18176 2c99b9 18174->18176 18175->18174 18184 2b8c50 18176->18184 18177 2c99c3 18177->18106 18179->18177 18180 2c16ef __floor_pentium4 RtlAllocateHeap 18179->18180 18180->18176 18182 2cb00c __freea RtlAllocateHeap 18181->18182 18183 2c1c9e 18182->18183 18183->18109 18187 2b8b9c 18184->18187 18188 2b8bae ___std_exception_copy 18187->18188 18193 2b8bd3 18188->18193 18190 2b8bc6 18200 2b898c 18190->18200 18194 2b8be3 18193->18194 18197 2b8bea ___std_exception_copy __Getctype 18193->18197 18206 2b89f1 18194->18206 18196 2b8bf8 18196->18190 18197->18196 18198 2b8b9c ___std_exception_copy RtlAllocateHeap 18197->18198 18199 2b8c5c 18198->18199 18199->18190 18201 2b8998 18200->18201 18202 2b89af 18201->18202 18221 2b8a37 18201->18221 18203 2b89c2 18202->18203 18205 2b8a37 ___std_exception_copy RtlAllocateHeap 18202->18205 18203->18177 18205->18203 18207 2b8a00 18206->18207 18210 2ca036 18207->18210 18211 2ca049 __Getctype 18210->18211 18212 2b8a22 18211->18212 18213 2ca64c __Getctype RtlAllocateHeap 18211->18213 18212->18197 18214 2ca079 __Getctype 18213->18214 18215 2ca0b5 18214->18215 18216 2ca081 __Getctype 18214->18216 18217 2c9c60 __Getctype RtlAllocateHeap 18215->18217 18218 2cb00c __freea RtlAllocateHeap 18216->18218 18219 2ca0c0 18217->18219 18218->18212 18220 2cb00c __freea RtlAllocateHeap 18219->18220 18220->18212 18222 2b8a4a 18221->18222 18223 2b8a41 18221->18223 18222->18202 18224 2b89f1 ___std_exception_copy RtlAllocateHeap 18223->18224 18225 2b8a46 18224->18225 18225->18222 18228 2c41b6 18225->18228 18227 2b8a53 18229 2c41bb std::locale::_Setgloballocale 18228->18229 18230 2cf653 std::locale::_Setgloballocale RtlAllocateHeap 18229->18230 18232 2c41c6 std::locale::_Setgloballocale 18229->18232 18230->18232 18231 2c36d2 std::locale::_Setgloballocale RtlAllocateHeap 18233 2c41f9 __Getctype std::locale::_Setgloballocale 18231->18233 18232->18231 18233->18227 18235 2962b1 18234->18235 18236 29629d 18234->18236 18235->18045 18316 296130 18236->18316 18336 2b2b89 18238->18336 18241 285410 18242 285419 18241->18242 18244 2b2524 std::_Throw_Cpp_error 3 API calls 18241->18244 18242->18032 18245 285430 18244->18245 18345 2b952c 18245->18345 18249 282d13 18248->18249 18249->18249 18250 283040 std::_Throw_Cpp_error 2 API calls 18249->18250 18251 282d25 18250->18251 18251->18032 18253 29ad10 18252->18253 18253->18253 18653 29fbf0 18253->18653 18256 283040 std::_Throw_Cpp_error 2 API calls 18255->18256 18257 282d55 18256->18257 18258 353670 18257->18258 18259 353708 18258->18259 18271 353711 std::locale::_Setgloballocale 18258->18271 18662 29e4b0 18259->18662 18262 3538ff 18263 296130 2 API calls 18262->18263 18265 353903 18262->18265 18263->18265 18266 353930 std::ios_base::_Ios_base_dtor 18265->18266 18267 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 18265->18267 18266->18037 18268 35397e 18267->18268 18269 2b3059 __Xtime_get_ticks GetSystemTimePreciseAsFileTime 18268->18269 18270 353986 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 18269->18270 18270->18037 18271->18262 18271->18265 18685 371ae0 18271->18685 18696 2a4160 18271->18696 18840 2b974e 18272->18840 18274 2b9822 18274->18045 18292 2c1618 18274->18292 18276 2c12ba ___std_exception_copy 18275->18276 18864 2bd695 18276->18864 18278 2c12d4 18279 2b898c ___std_exception_copy RtlAllocateHeap 18278->18279 18280 2c12e1 18279->18280 18280->18045 18282 34c6a6 std::locale::_Setgloballocale 18281->18282 19023 29ab20 18282->19023 18285 298f00 std::_Throw_Cpp_error 2 API calls 18286 34c82f 18285->18286 19028 283440 18286->19028 18288 34c93b std::ios_base::_Ios_base_dtor 18288->18045 18290 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 18291 34c97e 18290->18291 18291->18045 18293 2c162b ___std_exception_copy 18292->18293 19269 2c13fa 18293->19269 18295 2c1640 18296 2b898c ___std_exception_copy RtlAllocateHeap 18295->18296 18297 2c164d 18296->18297 18298 2bd098 18297->18298 18299 2bd0ab ___std_exception_copy 18298->18299 19371 2bcf73 18299->19371 18301 2bd0b7 18302 2b898c ___std_exception_copy RtlAllocateHeap 18301->18302 18303 2bd0c3 18302->18303 18303->18045 19441 297ef0 18304->19441 18306 29b48d 19458 2a2100 18306->19458 18310 29b503 18310->18045 19825 2d8ba0 18311->19825 18313 2d8b21 std::locale::_Locimp::_Locimp 18314 283040 std::_Throw_Cpp_error 2 API calls 18313->18314 18315 2d8b6c 18314->18315 18315->18045 18317 296174 18316->18317 18319 296143 std::locale::_Locimp::_Locimp 18316->18319 18318 296180 18317->18318 18320 296200 18317->18320 18321 2832d0 std::_Throw_Cpp_error 2 API calls 18318->18321 18319->18235 18320->18320 18327 298f00 18320->18327 18325 2961bf std::locale::_Locimp::_Locimp 18321->18325 18323 296232 18323->18235 18324 2961ed 18324->18235 18325->18324 18326 282fe0 std::_Throw_Cpp_error RtlAllocateHeap 18325->18326 18326->18324 18328 298f4f 18327->18328 18329 298f22 std::locale::_Locimp::_Locimp 18327->18329 18330 2832d0 std::_Throw_Cpp_error 2 API calls 18328->18330 18331 29902f std::ios_base::_Ios_base_dtor 18328->18331 18329->18323 18332 298fa4 std::locale::_Locimp::_Locimp 18330->18332 18331->18323 18333 299002 std::locale::_Locimp::_Locimp 18332->18333 18334 282fe0 std::_Throw_Cpp_error RtlAllocateHeap 18332->18334 18333->18323 18335 298fef 18334->18335 18335->18323 18351 2b2bb8 18336->18351 18338 285409 18338->18241 18339 2b2524 18338->18339 18340 2b253a std::_Throw_Cpp_error 18339->18340 18358 2b24d7 18340->18358 18343 2b254a __EH_prolog3 std::_Throw_Cpp_error Concurrency::cancel_current_task 18364 299cb0 18343->18364 18344 2b25b7 std::_Throw_Cpp_error 18344->18241 18346 2b953f ___std_exception_copy 18345->18346 18637 2b93cb 18346->18637 18348 2b954e 18349 2b898c ___std_exception_copy RtlAllocateHeap 18348->18349 18350 285450 18349->18350 18350->18032 18352 2b2bd2 18351->18352 18353 2b2be2 _ValidateLocalCookies 18352->18353 18355 2b301b 18352->18355 18353->18338 18356 2b3059 __Xtime_get_ticks GetSystemTimePreciseAsFileTime 18355->18356 18357 2b3026 __aulldiv __aullrem 18356->18357 18357->18352 18359 2b24e3 __EH_prolog3_GS 18358->18359 18360 282cf0 std::_Throw_Cpp_error 2 API calls 18359->18360 18361 2b24f7 18360->18361 18375 2836e0 18361->18375 18363 2b250c std::_Throw_Cpp_error 18363->18343 18393 284900 18364->18393 18366 299d26 18367 2b3662 std::_Facet_Register 2 API calls 18366->18367 18368 299d2d 18367->18368 18398 2b2719 18368->18398 18370 299d39 18406 29a060 18370->18406 18372 299d76 18373 299dc7 std::_Throw_Cpp_error 18372->18373 18374 284900 std::_Throw_Cpp_error 2 API calls 18372->18374 18373->18344 18374->18373 18376 2963b0 std::_Throw_Cpp_error 2 API calls 18375->18376 18377 283731 18376->18377 18378 298f00 std::_Throw_Cpp_error 2 API calls 18377->18378 18379 28375a 18377->18379 18378->18379 18380 298f00 std::_Throw_Cpp_error 2 API calls 18379->18380 18381 28378a 18380->18381 18382 2b4b05 ___std_exception_copy 2 API calls 18381->18382 18384 28381e 18382->18384 18383 28385f std::ios_base::_Ios_base_dtor 18383->18363 18384->18383 18385 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 18384->18385 18386 2838b0 18385->18386 18389 2b4b68 18386->18389 18388 2838f5 std::ios_base::_Ios_base_dtor 18388->18363 18390 2b4b7c 18389->18390 18391 2b4b75 18389->18391 18390->18388 18392 2c1c86 __freea RtlAllocateHeap 18391->18392 18392->18390 18394 284922 18393->18394 18395 28491a std::_Throw_Cpp_error Concurrency::cancel_current_task 18393->18395 18394->18366 18418 2847f0 18395->18418 18397 284968 std::ios_base::_Ios_base_dtor Concurrency::cancel_current_task 18397->18366 18399 2b2725 __EH_prolog3 std::_Lockit::_Lockit 18398->18399 18405 2b2761 std::_Throw_Cpp_error std::_Lockit::~_Lockit 18399->18405 18436 2b287c 18399->18436 18401 2b2743 18442 2b289f 18401->18442 18405->18370 18408 29a0a2 std::_Throw_Cpp_error std::_Lockit::~_Lockit std::_Lockit::_Lockit 18406->18408 18407 29a144 std::_Lockit::~_Lockit 18407->18372 18408->18407 18409 2b3662 std::_Facet_Register 2 API calls 18408->18409 18410 29a152 18409->18410 18507 284040 18410->18507 18416 29a1f1 18542 2b26e7 18416->18542 18419 284851 18418->18419 18419->18419 18430 283040 18419->18430 18421 284865 18422 2836e0 std::_Throw_Cpp_error 2 API calls 18421->18422 18424 28487b 18422->18424 18423 2848a5 std::ios_base::_Ios_base_dtor 18423->18397 18424->18423 18425 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 18424->18425 18427 2848f7 std::_Throw_Cpp_error Concurrency::cancel_current_task 18425->18427 18426 284922 18426->18397 18427->18426 18428 2847f0 std::_Throw_Cpp_error 2 API calls 18427->18428 18429 284968 std::ios_base::_Ios_base_dtor Concurrency::cancel_current_task 18428->18429 18429->18397 18431 283052 18430->18431 18432 2830c8 18430->18432 18433 283057 std::locale::_Locimp::_Locimp 18431->18433 18434 2832d0 std::_Throw_Cpp_error 2 API calls 18431->18434 18432->18421 18433->18421 18435 2830a3 std::locale::_Locimp::_Locimp 18434->18435 18435->18421 18437 2b3662 std::_Facet_Register 2 API calls 18436->18437 18438 2b2887 18437->18438 18439 2b289b 18438->18439 18452 2b2601 18438->18452 18439->18401 18443 2b28ab 18442->18443 18445 2b274b 18442->18445 18455 2b332a 18443->18455 18446 295a60 18445->18446 18447 295ab3 std::locale::_Locimp::_Locimp 18446->18447 18448 295a86 18446->18448 18447->18405 18449 295a90 18448->18449 18450 2c1c86 __freea RtlAllocateHeap 18448->18450 18449->18447 18451 2c23dc ___std_exception_copy 2 API calls 18449->18451 18450->18449 18451->18447 18453 295a60 std::locale::_Locimp::_Locimp 2 API calls 18452->18453 18454 2b263b 18453->18454 18454->18401 18456 2b333a std::locale::_Setgloballocale 18455->18456 18456->18445 18459 2c41c6 std::locale::_Setgloballocale 18456->18459 18461 2cf653 18456->18461 18482 2c36d2 18459->18482 18460 2c41f9 __Getctype std::locale::_Setgloballocale 18460->18445 18465 2cf65f std::_Locinfo::_Locinfo_dtor 18461->18465 18462 2cf690 std::locale::_Setgloballocale 18464 2cf6af 18462->18464 18467 2cf6c1 std::_Lockit::_Lockit std::locale::_Setgloballocale 18462->18467 18481 2cf699 18462->18481 18463 2c9f85 std::locale::_Setgloballocale RtlAllocateHeap 18463->18462 18466 2c16ef __floor_pentium4 RtlAllocateHeap 18464->18466 18465->18462 18465->18463 18465->18464 18465->18467 18468 2cf6b4 18466->18468 18470 2cf734 18467->18470 18471 2cf831 std::_Lockit::~_Lockit 18467->18471 18472 2cf762 std::locale::_Setgloballocale 18467->18472 18469 2b8c50 ___std_exception_copy RtlAllocateHeap 18468->18469 18469->18481 18470->18472 18485 2c9e32 18470->18485 18473 2c36d2 std::locale::_Setgloballocale RtlAllocateHeap 18471->18473 18476 2c9e32 __Getctype RtlAllocateHeap 18472->18476 18479 2cf7b7 18472->18479 18472->18481 18475 2cf844 18473->18475 18476->18479 18478 2c9e32 __Getctype RtlAllocateHeap 18478->18472 18480 2c9e32 __Getctype RtlAllocateHeap 18479->18480 18479->18481 18480->18481 18481->18459 18499 2c3542 18482->18499 18484 2c36e3 18484->18460 18486 2c9e3b __Getctype 18485->18486 18487 2ca64c __Getctype RtlAllocateHeap 18486->18487 18489 2c9e52 18486->18489 18491 2c9e7f __Getctype 18487->18491 18488 2c9e87 __Getctype 18495 2cb00c __freea RtlAllocateHeap 18488->18495 18490 2c9ee2 18489->18490 18492 2c41b6 __Getctype RtlAllocateHeap 18489->18492 18490->18478 18491->18488 18493 2c9ebf 18491->18493 18494 2c9eec 18492->18494 18496 2c9c60 __Getctype RtlAllocateHeap 18493->18496 18495->18489 18497 2c9eca 18496->18497 18498 2cb00c __freea RtlAllocateHeap 18497->18498 18498->18489 18501 2c356f std::locale::_Setgloballocale 18499->18501 18503 2c33d3 18501->18503 18502 2c35b8 std::locale::_Setgloballocale 18502->18484 18504 2c33df std::_Lockit::_Lockit std::_Locinfo::_Locinfo_dtor 18503->18504 18505 2c345a std::locale::_Setgloballocale RtlAllocateHeap 18504->18505 18506 2c33f6 std::locale::_Setgloballocale 18505->18506 18506->18502 18508 284066 std::_Lockit::_Lockit 18507->18508 18509 2840c2 18508->18509 18510 2840e6 18508->18510 18545 2b2817 18509->18545 18554 2b1d3a 18510->18554 18514 2840f0 18515 2b2ce4 18586 2c3ce8 18515->18586 18517 2b2ced __Getctype 18518 2b2d07 18517->18518 18519 2b2d25 18517->18519 18591 2c453e 18518->18591 18521 2c453e __Getctype RtlAllocateHeap 18519->18521 18522 2b2d0e 18521->18522 18596 2c3d32 18522->18596 18524 29a1ca 18527 284100 18524->18527 18633 2b2862 18527->18633 18530 284140 18532 28415b 18530->18532 18534 2c1c86 __freea RtlAllocateHeap 18530->18534 18531 2c1c86 __freea RtlAllocateHeap 18531->18530 18533 284176 18532->18533 18535 2c1c86 __freea RtlAllocateHeap 18532->18535 18536 284191 18533->18536 18537 2c1c86 __freea RtlAllocateHeap 18533->18537 18534->18532 18535->18533 18538 2c1c86 __freea RtlAllocateHeap 18536->18538 18539 2841ac 18536->18539 18537->18536 18538->18539 18540 2c1c86 __freea RtlAllocateHeap 18539->18540 18541 2841c7 std::_Lockit::~_Lockit 18539->18541 18540->18541 18541->18416 18543 2b3662 std::_Facet_Register 2 API calls 18542->18543 18544 2b26f2 18543->18544 18544->18407 18557 2c4506 18545->18557 18548 295a60 std::locale::_Locimp::_Locimp 2 API calls 18549 2b283b 18548->18549 18550 2c4506 std::_Locinfo::_Locinfo_dtor 2 API calls 18549->18550 18552 2b284b 18549->18552 18550->18552 18551 295a60 std::locale::_Locimp::_Locimp 2 API calls 18553 2840c9 18551->18553 18552->18551 18553->18515 18583 283540 18554->18583 18556 2b1d4b Concurrency::cancel_current_task 18556->18514 18558 2c4513 std::_Lockit::_Lockit 18557->18558 18561 2c42b1 18558->18561 18560 2b2823 18560->18548 18562 2c42bd std::_Lockit::_Lockit std::_Locinfo::_Locinfo_dtor 18561->18562 18565 2c430c 18562->18565 18564 2c42d8 std::_Locinfo::_Locinfo_dtor 18564->18560 18566 2c446b std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 18565->18566 18567 2c4327 18566->18567 18568 2c9e32 __Getctype RtlAllocateHeap 18567->18568 18574 2c4360 __Getctype 18567->18574 18569 2c4334 18568->18569 18570 2c3369 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 18569->18570 18571 2c4359 18570->18571 18572 2cb086 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 18571->18572 18571->18574 18573 2c4385 18572->18573 18573->18574 18575 2c3369 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 18573->18575 18574->18564 18576 2c43a1 18575->18576 18577 2c43a8 18576->18577 18578 2c43c3 18576->18578 18577->18574 18579 2cb00c __freea RtlAllocateHeap 18577->18579 18580 2cb00c __freea RtlAllocateHeap 18578->18580 18581 2c43ee 18578->18581 18579->18574 18580->18581 18581->18574 18582 2cb00c __freea RtlAllocateHeap 18581->18582 18582->18574 18584 2b4b05 ___std_exception_copy 2 API calls 18583->18584 18585 283585 18584->18585 18585->18556 18587 2c9e32 __Getctype RtlAllocateHeap 18586->18587 18588 2c3cf3 18587->18588 18607 2ca11f 18588->18607 18592 2c9e32 __Getctype RtlAllocateHeap 18591->18592 18593 2c4549 18592->18593 18594 2ca11f __Getctype RtlAllocateHeap 18593->18594 18595 2c4559 18594->18595 18595->18522 18597 2c9e32 __Getctype RtlAllocateHeap 18596->18597 18598 2c3d3d 18597->18598 18599 2ca11f __Getctype RtlAllocateHeap 18598->18599 18600 2b2d36 18599->18600 18600->18524 18601 2c4562 18600->18601 18602 2c456f 18601->18602 18606 2c45a3 __Getctype 18601->18606 18602->18602 18603 2c23dc ___std_exception_copy 2 API calls 18602->18603 18604 2c4592 18603->18604 18604->18606 18624 2ce2e2 18604->18624 18606->18524 18608 2c3d03 18607->18608 18609 2ca132 18607->18609 18608->18517 18609->18608 18611 2d2380 18609->18611 18612 2d238c std::_Locinfo::_Locinfo_dtor 18611->18612 18613 2c9e32 __Getctype RtlAllocateHeap 18612->18613 18615 2d2395 std::_Lockit::_Lockit 18613->18615 18614 2d23db 18614->18608 18615->18614 18620 2d2401 18615->18620 18617 2d23c4 __Getctype 18617->18614 18618 2c41b6 __Getctype RtlAllocateHeap 18617->18618 18619 2d2400 18618->18619 18621 2d240f __Getctype 18620->18621 18622 2d241c 18620->18622 18621->18622 18623 2d2134 __Getctype RtlAllocateHeap 18621->18623 18622->18617 18623->18622 18625 2ce2f0 18624->18625 18626 2ce2fe 18624->18626 18625->18626 18631 2ce318 18625->18631 18627 2c16ef __floor_pentium4 RtlAllocateHeap 18626->18627 18628 2ce308 18627->18628 18629 2b8c50 ___std_exception_copy RtlAllocateHeap 18628->18629 18630 2ce312 18629->18630 18630->18606 18631->18630 18632 2c16ef __floor_pentium4 RtlAllocateHeap 18631->18632 18632->18628 18634 28412c 18633->18634 18635 2b286e 18633->18635 18634->18530 18634->18531 18636 2c4506 std::_Locinfo::_Locinfo_dtor 2 API calls 18635->18636 18636->18634 18638 2b93d7 std::_Locinfo::_Locinfo_dtor 18637->18638 18639 2b93e0 18638->18639 18641 2b9404 18638->18641 18640 2b8bd3 ___std_exception_copy RtlAllocateHeap 18639->18640 18645 2b93f9 18640->18645 18642 2b9422 18641->18642 18646 2ca1db 18641->18646 18644 2b8bd3 ___std_exception_copy RtlAllocateHeap 18642->18644 18642->18645 18644->18645 18645->18348 18647 2ca1fc 18646->18647 18648 2ca1e7 18646->18648 18647->18642 18649 2c16ef __floor_pentium4 RtlAllocateHeap 18648->18649 18650 2ca1ec 18649->18650 18651 2b8c50 ___std_exception_copy RtlAllocateHeap 18650->18651 18652 2ca1f7 18651->18652 18652->18642 18655 29fc8d 18653->18655 18658 29fc12 std::locale::_Locimp::_Locimp 18653->18658 18654 29fd5e 18655->18654 18656 2832d0 std::_Throw_Cpp_error 2 API calls 18655->18656 18659 29fce1 std::locale::_Locimp::_Locimp 18656->18659 18657 29fd3a std::locale::_Locimp::_Locimp 18659->18657 18660 282fe0 std::_Throw_Cpp_error RtlAllocateHeap 18659->18660 18661 29fd27 18660->18661 18663 29e528 18662->18663 18664 29e4c2 18662->18664 18764 283330 18663->18764 18666 29e4f9 18664->18666 18667 29e4ca 18664->18667 18670 29e516 18666->18670 18673 2b3662 std::_Facet_Register 2 API calls 18666->18673 18668 29e52d 18667->18668 18669 29e4d1 18667->18669 18671 282b50 Concurrency::cancel_current_task 2 API calls 18668->18671 18672 2b3662 std::_Facet_Register 2 API calls 18669->18672 18670->18271 18674 29e4d7 18671->18674 18672->18674 18675 29e503 18673->18675 18676 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 18674->18676 18677 29e4e0 18674->18677 18675->18271 18678 29e537 18676->18678 18677->18271 18767 296ad0 18678->18767 18680 29e574 18681 284900 std::_Throw_Cpp_error 2 API calls 18680->18681 18682 29e5fb 18681->18682 18683 29e613 18682->18683 18771 299b60 18682->18771 18683->18271 18686 371ae7 18685->18686 18687 371aec 18685->18687 18686->18271 18688 2c23dc ___std_exception_copy 2 API calls 18687->18688 18694 371b2f 18687->18694 18688->18694 18689 371b42 18689->18271 18690 371bf7 18690->18271 18691 2c1c86 __freea RtlAllocateHeap 18692 371be7 18691->18692 18692->18271 18693 371ba1 18693->18690 18693->18691 18694->18689 18694->18693 18695 2c1c86 __freea RtlAllocateHeap 18694->18695 18695->18693 18697 2a4288 18696->18697 18698 2a4195 18696->18698 18699 283330 2 API calls 18697->18699 18700 2a41b1 18698->18700 18701 2a4202 18698->18701 18702 2a41f2 18698->18702 18703 2a428d 18699->18703 18704 2b3662 std::_Facet_Register 2 API calls 18700->18704 18708 2b3662 std::_Facet_Register 2 API calls 18701->18708 18713 2a41cf std::locale::_Locimp::_Locimp std::locale::_Setgloballocale 18701->18713 18702->18700 18702->18703 18705 282b50 Concurrency::cancel_current_task 2 API calls 18703->18705 18706 2a41c4 18704->18706 18707 2a4292 18705->18707 18706->18707 18706->18713 18709 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 18707->18709 18708->18713 18710 2a4297 18709->18710 18711 2a42fa 18710->18711 18712 2a43e9 18710->18712 18811 2a6ff0 18711->18811 18714 283330 2 API calls 18712->18714 18806 2a77d0 18713->18806 18715 2a43ee 18714->18715 18718 2a445a 18715->18718 18719 2a4549 18715->18719 18722 2a6ff0 2 API calls 18718->18722 18720 283330 2 API calls 18719->18720 18729 2a454e 18720->18729 18721 2a425e 18721->18271 18724 2a4496 18722->18724 18723 2a470b 18726 283330 2 API calls 18723->18726 18728 2963b0 std::_Throw_Cpp_error 2 API calls 18724->18728 18725 2a4706 18730 282b50 Concurrency::cancel_current_task 2 API calls 18725->18730 18751 2a46af 18726->18751 18727 2a4336 18819 2a7830 18727->18819 18740 2a44c4 18728->18740 18729->18723 18729->18725 18731 2a45ee 18729->18731 18732 2a4615 18729->18732 18730->18723 18731->18725 18734 2a45f9 18731->18734 18739 2b3662 std::_Facet_Register 2 API calls 18732->18739 18748 2a45ff 18732->18748 18733 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 18735 2a4715 18733->18735 18736 2b3662 std::_Facet_Register 2 API calls 18734->18736 18831 29d010 18735->18831 18736->18748 18739->18748 18744 2a7830 RtlAllocateHeap 18740->18744 18741 2a43b0 18741->18271 18745 2a4510 18744->18745 18745->18271 18746 2a4798 18752 282b50 Concurrency::cancel_current_task 2 API calls 18746->18752 18747 2a472f Concurrency::cancel_current_task 18747->18746 18749 2a475b 18747->18749 18750 2a477f 18747->18750 18748->18751 18755 2a46d1 std::ios_base::_Ios_base_dtor 18748->18755 18824 2b1f8c 18748->18824 18749->18746 18753 2a4762 18749->18753 18754 2a4791 18750->18754 18759 2b3662 std::_Facet_Register 2 API calls 18750->18759 18751->18733 18751->18755 18756 2a4768 18752->18756 18758 2b3662 std::_Facet_Register 2 API calls 18753->18758 18754->18271 18755->18271 18757 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 18756->18757 18763 2a4771 18756->18763 18761 2a47a2 18757->18761 18758->18756 18762 2a4789 18759->18762 18762->18271 18763->18271 18775 2b1cda 18764->18775 18769 296b02 18767->18769 18768 296b1d 18768->18680 18769->18768 18795 2950e0 18769->18795 18772 299bbb 18771->18772 18773 299b96 18771->18773 18772->18683 18773->18772 18803 2988a0 18773->18803 18782 2b1a8f 18775->18782 18777 2b1ceb Concurrency::cancel_current_task 18785 2b1ae4 18777->18785 18779 2b1d0b Concurrency::cancel_current_task 18788 2b1b27 18779->18788 18781 2b1d2b Concurrency::cancel_current_task 18792 2834e0 18782->18792 18786 2834e0 std::regex_error::regex_error 2 API calls 18785->18786 18787 2b1af6 18786->18787 18787->18779 18789 2b1b3b std::regex_error::regex_error 18788->18789 18790 2834e0 std::regex_error::regex_error 2 API calls 18789->18790 18791 2b1b44 18790->18791 18791->18781 18793 2b4b05 ___std_exception_copy 2 API calls 18792->18793 18794 283522 18793->18794 18794->18777 18796 295117 18795->18796 18800 2951b5 18795->18800 18797 296ad0 2 API calls 18796->18797 18799 295120 18797->18799 18798 29519d 18798->18800 18802 299b60 2 API calls 18798->18802 18799->18798 18801 284900 std::_Throw_Cpp_error 2 API calls 18799->18801 18800->18768 18801->18798 18802->18800 18804 284900 std::_Throw_Cpp_error 2 API calls 18803->18804 18805 2988bf 18804->18805 18805->18772 18807 2a77f9 std::ios_base::_Ios_base_dtor 18806->18807 18808 2a77dc 18806->18808 18807->18721 18808->18807 18809 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 18808->18809 18810 2a7824 18809->18810 18812 2a6ff9 18811->18812 18813 2a703c 18811->18813 18812->18813 18814 2a7013 18812->18814 18816 2b3662 std::_Facet_Register 2 API calls 18812->18816 18813->18813 18815 2a701c 18814->18815 18817 2b3662 std::_Facet_Register 2 API calls 18814->18817 18815->18727 18816->18814 18818 2a7035 18817->18818 18818->18727 18820 2a7882 std::ios_base::_Ios_base_dtor 18819->18820 18821 2a783d 18819->18821 18820->18741 18821->18820 18822 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 18821->18822 18823 2a78b6 18822->18823 18825 2b1fa2 18824->18825 18826 2b1f95 18824->18826 18825->18748 18826->18825 18827 2c41b6 __Getctype RtlAllocateHeap 18826->18827 18828 2b1fab 18827->18828 18829 2b1f8c RtlAllocateHeap 18828->18829 18830 2b1fba 18829->18830 18830->18748 18832 29d02e 18831->18832 18834 29d01a 18831->18834 18835 299910 18832->18835 18833 2b1f8c RtlAllocateHeap 18833->18834 18834->18832 18834->18833 18836 299938 std::ios_base::_Ios_base_dtor 18835->18836 18837 299928 18835->18837 18836->18747 18837->18836 18838 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 18837->18838 18839 29994d 18838->18839 18843 2b975a std::_Locinfo::_Locinfo_dtor 18840->18843 18841 2b9761 18842 2c16ef __floor_pentium4 RtlAllocateHeap 18841->18842 18844 2b9766 18842->18844 18843->18841 18845 2b9781 18843->18845 18846 2b8c50 ___std_exception_copy RtlAllocateHeap 18844->18846 18847 2b9793 18845->18847 18848 2b9786 18845->18848 18853 2b9771 18846->18853 18854 2ca8e1 18847->18854 18849 2c16ef __floor_pentium4 RtlAllocateHeap 18848->18849 18849->18853 18851 2b979c 18852 2c16ef __floor_pentium4 RtlAllocateHeap 18851->18852 18851->18853 18852->18853 18853->18274 18855 2ca8ed std::_Lockit::_Lockit std::_Locinfo::_Locinfo_dtor 18854->18855 18858 2ca985 18855->18858 18857 2ca908 18857->18851 18863 2ca9a8 18858->18863 18859 2ca64c __Getctype RtlAllocateHeap 18860 2caa09 18859->18860 18861 2cb00c __freea RtlAllocateHeap 18860->18861 18862 2ca9ee std::locale::_Setgloballocale 18861->18862 18862->18857 18863->18859 18863->18862 18878 2bce69 18864->18878 18866 2bd6ef 18872 2bd713 18866->18872 18885 2be1c0 18866->18885 18867 2bd6bc 18869 2b8bd3 ___std_exception_copy RtlAllocateHeap 18867->18869 18868 2bd6a7 18868->18866 18868->18867 18877 2bd6d7 std::_Locinfo::_Locinfo_dtor 18868->18877 18869->18877 18874 2bd737 18872->18874 18892 2bce84 18872->18892 18873 2bd7bf 18875 2bce12 RtlAllocateHeap 18873->18875 18874->18873 18899 2bce12 18874->18899 18875->18877 18877->18278 18879 2bce6e 18878->18879 18880 2bce81 18878->18880 18881 2c16ef __floor_pentium4 RtlAllocateHeap 18879->18881 18880->18868 18882 2bce73 18881->18882 18883 2b8c50 ___std_exception_copy RtlAllocateHeap 18882->18883 18884 2bce7e 18883->18884 18884->18868 18886 2b8a37 ___std_exception_copy RtlAllocateHeap 18885->18886 18887 2be1d0 18886->18887 18905 2ca14c 18887->18905 18893 2bce90 18892->18893 18897 2bcea6 18892->18897 18894 2c453e __Getctype RtlAllocateHeap 18893->18894 18896 2bce9b std::_Locinfo::_Locinfo_dtor 18894->18896 18895 2bceb6 18895->18872 18896->18872 18897->18895 19007 2c9a29 18897->19007 18900 2bce23 18899->18900 18901 2bce37 18899->18901 18900->18901 18902 2c16ef __floor_pentium4 RtlAllocateHeap 18900->18902 18901->18873 18903 2bce2c 18902->18903 18904 2b8c50 ___std_exception_copy RtlAllocateHeap 18903->18904 18904->18901 18906 2be1ed 18905->18906 18907 2ca163 18905->18907 18909 2ca1aa 18906->18909 18907->18906 18908 2d2380 __Getctype RtlAllocateHeap 18907->18908 18908->18906 18910 2be1fa 18909->18910 18911 2ca1c1 18909->18911 18910->18872 18911->18910 18913 2d06ab 18911->18913 18914 2c9e32 __Getctype RtlAllocateHeap 18913->18914 18915 2d06b0 18914->18915 18918 2d05c3 18915->18918 18917 2d06bb 18917->18910 18921 2d05cf std::_Lockit::_Lockit std::_Locinfo::_Locinfo_dtor 18918->18921 18919 2d05e9 std::_Locinfo::_Locinfo_dtor 18920 2d05f0 18919->18920 18922 2c41b6 __Getctype RtlAllocateHeap 18919->18922 18920->18917 18921->18919 18926 2cb00c __freea RtlAllocateHeap 18921->18926 18923 2d0662 18922->18923 18924 2d069e 18923->18924 18929 2c9eed 18923->18929 18924->18917 18926->18919 18930 2c9ef8 __Getctype 18929->18930 18931 2c9f04 18930->18931 18934 2ca64c __Getctype RtlAllocateHeap 18930->18934 18932 2c41b6 __Getctype RtlAllocateHeap 18931->18932 18933 2c9f09 18931->18933 18935 2c9f82 18932->18935 18943 2d046e 18933->18943 18936 2c9f28 __Getctype 18934->18936 18937 2c9f64 18936->18937 18938 2c9f30 __Getctype 18936->18938 18940 2c9c60 __Getctype RtlAllocateHeap 18937->18940 18939 2cb00c __freea RtlAllocateHeap 18938->18939 18939->18931 18941 2c9f6f 18940->18941 18942 2cb00c __freea RtlAllocateHeap 18941->18942 18942->18933 18944 2d05c3 std::_Locinfo::_Locinfo_dtor 2 API calls 18943->18944 18945 2d0498 18944->18945 18966 2d01f5 18945->18966 18948 2d04b1 18948->18924 18951 2d04d8 18975 2d06be 18951->18975 18952 2d04ca 18953 2cb00c __freea RtlAllocateHeap 18952->18953 18953->18948 18955 2d0505 18956 2d0510 18955->18956 18960 2d052b std::_Locinfo::_Locinfo_dtor 18955->18960 18957 2c16ef __floor_pentium4 RtlAllocateHeap 18956->18957 18959 2d0515 18957->18959 18958 2d0557 18961 2d05a0 18958->18961 18980 2d00e7 18958->18980 18962 2cb00c __freea RtlAllocateHeap 18959->18962 18960->18958 18963 2cb00c __freea RtlAllocateHeap 18960->18963 18965 2cb00c __freea RtlAllocateHeap 18961->18965 18962->18948 18963->18958 18965->18948 18984 2b959e 18966->18984 18969 2cb086 18970 2cb0c4 18969->18970 18971 2cb094 __Getctype std::_Facet_Register 18969->18971 18972 2c16ef __floor_pentium4 RtlAllocateHeap 18970->18972 18971->18970 18973 2cb0af RtlAllocateHeap 18971->18973 18974 2cb0c2 18972->18974 18973->18971 18973->18974 18974->18951 18974->18952 18976 2d01f5 std::_Locinfo::_Locinfo_dtor 2 API calls 18975->18976 18978 2d06de std::_Locinfo::_Locinfo_dtor std::locale::_Setgloballocale 18976->18978 18977 2d07e3 std::_Locinfo::_Locinfo_dtor _ValidateLocalCookies 18977->18955 18978->18977 18992 2d02c9 18978->18992 18981 2d00f3 std::_Lockit::_Lockit std::_Locinfo::_Locinfo_dtor 18980->18981 19000 2d0134 18981->19000 18983 2d010a std::_Locinfo::_Locinfo_dtor 18983->18961 18985 2b95bc 18984->18985 18991 2b95b5 18984->18991 18986 2c9e32 __Getctype RtlAllocateHeap 18985->18986 18985->18991 18987 2b95dd 18986->18987 18988 2ca11f __Getctype RtlAllocateHeap 18987->18988 18989 2b95f3 18988->18989 18990 2ca17d std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 18989->18990 18990->18991 18991->18948 18991->18969 18994 2d02f1 18992->18994 18999 2d03ba _ValidateLocalCookies 18992->18999 18993 2cf43b std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 18995 2d0371 18993->18995 18994->18993 18994->18999 18996 2ca898 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 18995->18996 18997 2d0392 18996->18997 18998 2ca898 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 18997->18998 18998->18999 18999->18977 19001 2bcedb std::_Locinfo::_Locinfo_dtor RtlAllocateHeap 19000->19001 19002 2d0156 19001->19002 19003 2bcedb std::_Locinfo::_Locinfo_dtor RtlAllocateHeap 19002->19003 19004 2d0175 19003->19004 19005 2d019c 19004->19005 19006 2cb00c __freea RtlAllocateHeap 19004->19006 19005->18983 19006->19005 19008 2b959e std::_Locinfo::_Locinfo_dtor 2 API calls 19007->19008 19009 2c9a46 19008->19009 19011 2c9a56 _ValidateLocalCookies 19009->19011 19012 2cf43b 19009->19012 19011->18895 19013 2b959e std::_Locinfo::_Locinfo_dtor 2 API calls 19012->19013 19014 2cf45b std::_Locinfo::_Locinfo_dtor 19013->19014 19016 2cb086 std::_Locinfo::_Locinfo_dtor 2 API calls 19014->19016 19017 2cf517 _ValidateLocalCookies 19014->19017 19018 2cf4ad std::_Locinfo::_Locinfo_dtor std::locale::_Setgloballocale 19014->19018 19016->19018 19017->19011 19019 2b3265 19018->19019 19020 2b326f 19019->19020 19021 2b3280 19019->19021 19020->19021 19022 2c1c86 __freea RtlAllocateHeap 19020->19022 19021->19017 19022->19021 19024 29ab55 19023->19024 19025 29aba3 19024->19025 19032 29e8a0 19024->19032 19027 29ab83 19027->18285 19029 283459 19028->19029 19036 2c0dc7 19029->19036 19033 29e8ce 19032->19033 19035 29e8f8 std::locale::_Locimp::_Locimp 19032->19035 19034 2832d0 std::_Throw_Cpp_error 2 API calls 19033->19034 19034->19035 19035->19027 19037 2c0ddb ___std_exception_copy 19036->19037 19042 2be555 19037->19042 19039 2c0df6 19040 2b898c ___std_exception_copy RtlAllocateHeap 19039->19040 19041 283467 19040->19041 19041->18288 19041->18290 19043 2be581 19042->19043 19044 2be5a4 19042->19044 19045 2b8bd3 ___std_exception_copy RtlAllocateHeap 19043->19045 19044->19043 19046 2be5ac 19044->19046 19047 2be599 _ValidateLocalCookies 19045->19047 19051 2bfa97 19046->19051 19047->19039 19069 2c0afd 19051->19069 19054 2bfabc 19055 2b8bd3 ___std_exception_copy RtlAllocateHeap 19054->19055 19056 2be62d 19055->19056 19066 2bf27d 19056->19066 19059 2be1c0 std::_Locinfo::_Locinfo_dtor 2 API calls 19061 2bfae4 std::_Locinfo::_Locinfo_dtor 19059->19061 19061->19056 19061->19059 19062 2bfbc0 19061->19062 19073 2bf48b 19061->19073 19076 2bfec4 19061->19076 19108 2c035f 19061->19108 19063 2b8bd3 ___std_exception_copy RtlAllocateHeap 19062->19063 19064 2bfbda 19063->19064 19065 2b8bd3 ___std_exception_copy RtlAllocateHeap 19064->19065 19065->19056 19067 2cb00c __freea RtlAllocateHeap 19066->19067 19068 2bf28d 19067->19068 19068->19047 19070 2bfab1 19069->19070 19071 2c0b08 19069->19071 19070->19054 19070->19056 19070->19061 19072 2b8bd3 ___std_exception_copy RtlAllocateHeap 19071->19072 19072->19070 19135 2be832 19073->19135 19075 2bf4c6 19075->19061 19077 2bfecb 19076->19077 19078 2bfee2 19076->19078 19079 2c03e4 19077->19079 19080 2c0384 19077->19080 19091 2bff21 19077->19091 19081 2b8bd3 ___std_exception_copy RtlAllocateHeap 19078->19081 19078->19091 19085 2c041d 19079->19085 19086 2c03e9 19079->19086 19082 2c040a 19080->19082 19083 2c038a 19080->19083 19084 2bff16 19081->19084 19170 2bebec 19082->19170 19096 2c038f 19083->19096 19099 2c03db 19083->19099 19084->19061 19087 2c043a 19085->19087 19088 2c0422 19085->19088 19089 2c03eb 19086->19089 19090 2c0416 19086->19090 19181 2c0a3d 19087->19181 19088->19082 19088->19099 19106 2c03b5 19088->19106 19098 2c039e 19089->19098 19101 2c03fa 19089->19101 19177 2c0a20 19090->19177 19091->19061 19097 2c03c8 19096->19097 19096->19098 19096->19106 19107 2c0443 _ValidateLocalCookies 19097->19107 19155 2c0906 19097->19155 19098->19107 19145 2c0775 19098->19145 19099->19107 19159 2bed79 19099->19159 19101->19082 19102 2c03fe 19101->19102 19102->19107 19166 2c099b 19102->19166 19106->19107 19184 2cc5ac 19106->19184 19107->19061 19109 2c03e4 19108->19109 19110 2c0384 19108->19110 19113 2c041d 19109->19113 19114 2c03e9 19109->19114 19111 2c040a 19110->19111 19112 2c038a 19110->19112 19120 2bebec 2 API calls 19111->19120 19124 2c038f 19112->19124 19125 2c03db 19112->19125 19115 2c043a 19113->19115 19116 2c0422 19113->19116 19117 2c03eb 19114->19117 19118 2c0416 19114->19118 19119 2c0a3d 2 API calls 19115->19119 19116->19111 19116->19125 19133 2c03b5 19116->19133 19122 2c039e 19117->19122 19128 2c03fa 19117->19128 19121 2c0a20 2 API calls 19118->19121 19119->19133 19120->19133 19121->19133 19123 2c0775 2 API calls 19122->19123 19132 2c0443 _ValidateLocalCookies 19122->19132 19123->19133 19124->19122 19126 2c03c8 19124->19126 19124->19133 19127 2bed79 2 API calls 19125->19127 19125->19132 19130 2c0906 2 API calls 19126->19130 19126->19132 19127->19133 19128->19111 19129 2c03fe 19128->19129 19131 2c099b RtlAllocateHeap 19129->19131 19129->19132 19130->19133 19131->19133 19132->19061 19133->19132 19134 2cc5ac 2 API calls 19133->19134 19134->19133 19136 2bce69 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap 19135->19136 19138 2be844 19136->19138 19137 2be859 19139 2b8bd3 ___std_exception_copy RtlAllocateHeap 19137->19139 19138->19137 19141 2be88c 19138->19141 19144 2be874 std::_Locinfo::_Locinfo_dtor 19138->19144 19139->19144 19140 2be923 19142 2bce12 RtlAllocateHeap 19140->19142 19141->19140 19143 2bce12 RtlAllocateHeap 19141->19143 19142->19144 19143->19140 19144->19075 19146 2c078f 19145->19146 19190 2be780 19146->19190 19148 2c07ce 19201 2cc42b 19148->19201 19151 2be1c0 std::_Locinfo::_Locinfo_dtor 2 API calls 19152 2c0885 19151->19152 19153 2be1c0 std::_Locinfo::_Locinfo_dtor 2 API calls 19152->19153 19154 2c08b8 19152->19154 19153->19154 19154->19106 19154->19154 19156 2c0921 19155->19156 19157 2c0957 19156->19157 19158 2cc5ac 2 API calls 19156->19158 19157->19106 19158->19157 19160 2bed8e 19159->19160 19161 2bedb0 19160->19161 19163 2bedd7 19160->19163 19162 2b8bd3 ___std_exception_copy RtlAllocateHeap 19161->19162 19165 2bedcd 19162->19165 19164 2be780 2 API calls 19163->19164 19163->19165 19164->19165 19165->19106 19169 2c09b1 19166->19169 19167 2b8bd3 ___std_exception_copy RtlAllocateHeap 19168 2c09d2 19167->19168 19168->19106 19169->19167 19169->19168 19171 2bec01 19170->19171 19172 2bec4a 19171->19172 19173 2bec23 19171->19173 19175 2bec40 19172->19175 19176 2be780 2 API calls 19172->19176 19174 2b8bd3 ___std_exception_copy RtlAllocateHeap 19173->19174 19174->19175 19175->19106 19176->19175 19178 2c0a2c 19177->19178 19262 2bea5f 19178->19262 19180 2c0a3c 19180->19106 19182 2bed79 2 API calls 19181->19182 19183 2c0a52 19182->19183 19183->19106 19185 2cc5c1 19184->19185 19186 2be1c0 std::_Locinfo::_Locinfo_dtor 2 API calls 19185->19186 19188 2cc5c5 std::_Locinfo::_Locinfo_dtor std::locale::_Setgloballocale 19185->19188 19189 2cc5ee std::_Locinfo::_Locinfo_dtor std::locale::_Setgloballocale 19185->19189 19186->19189 19187 2b8bd3 ___std_exception_copy RtlAllocateHeap 19187->19188 19188->19106 19189->19187 19189->19188 19191 2be7a7 19190->19191 19192 2be795 19190->19192 19191->19192 19193 2cb086 std::_Locinfo::_Locinfo_dtor 2 API calls 19191->19193 19192->19148 19194 2be7cb 19193->19194 19195 2be7de 19194->19195 19196 2be7d3 19194->19196 19220 2bf297 19195->19220 19197 2cb00c __freea RtlAllocateHeap 19196->19197 19197->19192 19200 2cb00c __freea RtlAllocateHeap 19200->19192 19202 2cc460 19201->19202 19203 2cc43c 19201->19203 19202->19203 19205 2cc493 19202->19205 19204 2b8bd3 ___std_exception_copy RtlAllocateHeap 19203->19204 19214 2c0861 19204->19214 19206 2cc4fb 19205->19206 19207 2cc4cc 19205->19207 19208 2cc524 19206->19208 19209 2cc529 19206->19209 19223 2cc2cf 19207->19223 19212 2cc58b 19208->19212 19213 2cc551 19208->19213 19228 2cbb58 19209->19228 19255 2cbe85 19212->19255 19215 2cc556 19213->19215 19216 2cc571 19213->19216 19214->19151 19214->19152 19238 2cc200 19215->19238 19248 2cc07c 19216->19248 19221 2cb00c __freea RtlAllocateHeap 19220->19221 19222 2be7e9 19221->19222 19222->19200 19224 2cc2e5 19223->19224 19225 2cc2f0 19223->19225 19224->19214 19226 2c9995 ___std_exception_copy RtlAllocateHeap 19225->19226 19227 2cc34b __Getctype 19226->19227 19227->19214 19229 2cbb6b 19228->19229 19230 2cbb9c 19229->19230 19231 2cbb7a 19229->19231 19233 2cbbb1 19230->19233 19235 2cbc04 19230->19235 19232 2b8bd3 ___std_exception_copy RtlAllocateHeap 19231->19232 19237 2cbb92 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z std::locale::_Setgloballocale __allrem _strrchr 19232->19237 19234 2cbe85 RtlAllocateHeap RtlAllocateHeap 19233->19234 19234->19237 19236 2be1c0 std::_Locinfo::_Locinfo_dtor RtlAllocateHeap RtlAllocateHeap 19235->19236 19235->19237 19236->19237 19237->19214 19239 2d47ad RtlAllocateHeap 19238->19239 19240 2cc230 19239->19240 19241 2d46b3 RtlAllocateHeap 19240->19241 19242 2cc26e 19241->19242 19243 2cc2ae 19242->19243 19245 2cc287 19242->19245 19246 2cc275 19242->19246 19244 2cbf29 RtlAllocateHeap RtlAllocateHeap 19243->19244 19244->19246 19245->19245 19247 2cc112 RtlAllocateHeap RtlAllocateHeap 19245->19247 19246->19214 19247->19246 19249 2d47ad RtlAllocateHeap 19248->19249 19250 2cc0ab 19249->19250 19251 2d46b3 RtlAllocateHeap 19250->19251 19252 2cc0ec 19251->19252 19253 2cc0f3 19252->19253 19254 2cc112 RtlAllocateHeap RtlAllocateHeap 19252->19254 19253->19214 19254->19253 19256 2d47ad RtlAllocateHeap 19255->19256 19257 2cbeaf 19256->19257 19258 2d46b3 RtlAllocateHeap 19257->19258 19259 2cbefd 19258->19259 19260 2cbf04 19259->19260 19261 2cbf29 RtlAllocateHeap RtlAllocateHeap 19259->19261 19260->19214 19261->19260 19263 2bea74 19262->19263 19264 2bea96 19263->19264 19266 2beabd 19263->19266 19265 2b8bd3 ___std_exception_copy RtlAllocateHeap 19264->19265 19268 2beab3 19265->19268 19267 2be780 2 API calls 19266->19267 19266->19268 19267->19268 19268->19180 19270 2c1408 19269->19270 19271 2c1430 19269->19271 19270->19271 19272 2c1415 19270->19272 19273 2c1437 19270->19273 19271->18295 19275 2b8bd3 ___std_exception_copy RtlAllocateHeap 19272->19275 19277 2c1353 19273->19277 19275->19271 19276 2c146f 19276->18295 19278 2c135f std::_Locinfo::_Locinfo_dtor 19277->19278 19281 2c13ae 19278->19281 19280 2c137a 19280->19276 19288 2cc89c 19281->19288 19308 2cc85e 19288->19308 19290 2cc8ad 19291 2c13c6 19290->19291 19292 2cb086 std::_Locinfo::_Locinfo_dtor 2 API calls 19290->19292 19295 2c1471 19291->19295 19293 2cc906 19292->19293 19294 2cb00c __freea RtlAllocateHeap 19293->19294 19294->19291 19297 2c1483 19295->19297 19299 2c13e4 19295->19299 19296 2c1491 19298 2b8bd3 ___std_exception_copy RtlAllocateHeap 19296->19298 19297->19296 19297->19299 19302 2c14c7 std::locale::_Locimp::_Locimp 19297->19302 19298->19299 19304 2cc947 19299->19304 19301 2ca1db RtlAllocateHeap 19301->19302 19302->19299 19302->19301 19325 2b9a81 19302->19325 19331 2c9668 19302->19331 19305 2cc952 19304->19305 19306 2c13f0 19304->19306 19305->19306 19307 2b9a81 4 API calls 19305->19307 19306->19280 19307->19306 19310 2cc86a 19308->19310 19309 2cc898 19309->19290 19310->19309 19311 2cc894 19310->19311 19312 2ca1db RtlAllocateHeap 19310->19312 19311->19290 19313 2cc885 19312->19313 19316 2d3bd1 19313->19316 19315 2cc88b 19315->19290 19317 2d3bde 19316->19317 19319 2d3beb 19316->19319 19318 2c16ef __floor_pentium4 RtlAllocateHeap 19317->19318 19320 2d3be3 19318->19320 19321 2d3bf7 19319->19321 19322 2c16ef __floor_pentium4 RtlAllocateHeap 19319->19322 19320->19315 19321->19315 19323 2d3c18 19322->19323 19324 2b8c50 ___std_exception_copy RtlAllocateHeap 19323->19324 19324->19320 19326 2b9a9a 19325->19326 19327 2b9ac1 19325->19327 19326->19327 19328 2ca1db RtlAllocateHeap 19326->19328 19327->19302 19329 2b9ab6 19328->19329 19330 2c9668 4 API calls 19329->19330 19330->19327 19333 2c9674 std::_Locinfo::_Locinfo_dtor 19331->19333 19332 2c967c 19332->19302 19333->19332 19334 2c96b5 19333->19334 19336 2c96fb 19333->19336 19335 2b8bd3 ___std_exception_copy RtlAllocateHeap 19334->19335 19335->19332 19336->19332 19338 2c9779 19336->19338 19339 2c97a1 19338->19339 19351 2c97c4 19338->19351 19340 2c97a5 19339->19340 19342 2c9800 19339->19342 19341 2b8bd3 ___std_exception_copy RtlAllocateHeap 19340->19341 19341->19351 19343 2c981e 19342->19343 19357 2c262d 19342->19357 19352 2c92be 19343->19352 19347 2c987d 19349 2c98e6 WriteFile 19347->19349 19347->19351 19348 2c9836 19348->19351 19360 2c8e8f 19348->19360 19349->19351 19351->19332 19353 2d3bd1 RtlAllocateHeap 19352->19353 19354 2c92d0 19353->19354 19355 2be1c0 std::_Locinfo::_Locinfo_dtor 2 API calls 19354->19355 19356 2c92fe 19354->19356 19355->19356 19356->19347 19356->19348 19366 2c250c 19357->19366 19359 2c2646 19359->19343 19361 2c8ef7 19360->19361 19362 2be1c0 std::_Locinfo::_Locinfo_dtor 2 API calls 19361->19362 19363 2c8f08 std::_Locinfo::_Locinfo_dtor std::locale::_Locimp::_Locimp 19361->19363 19362->19363 19364 2cc716 RtlAllocateHeap RtlAllocateHeap 19363->19364 19365 2c91be _ValidateLocalCookies 19363->19365 19364->19363 19365->19351 19365->19365 19367 2ce92e RtlAllocateHeap 19366->19367 19368 2c251e 19367->19368 19369 2c253a SetFilePointerEx 19368->19369 19370 2c2526 19368->19370 19369->19370 19370->19359 19372 2bcf7f std::_Locinfo::_Locinfo_dtor 19371->19372 19373 2bcf89 19372->19373 19376 2bcfac 19372->19376 19374 2b8bd3 ___std_exception_copy RtlAllocateHeap 19373->19374 19375 2bcfa4 19374->19375 19375->18301 19376->19375 19378 2bd00a 19376->19378 19379 2bd03a 19378->19379 19380 2bd017 19378->19380 19382 2bd032 19379->19382 19383 2b9a81 4 API calls 19379->19383 19381 2b8bd3 ___std_exception_copy RtlAllocateHeap 19380->19381 19381->19382 19382->19375 19384 2bd052 19383->19384 19392 2cb046 19384->19392 19387 2ca1db RtlAllocateHeap 19388 2bd066 19387->19388 19396 2c8d1c 19388->19396 19391 2cb00c __freea RtlAllocateHeap 19391->19382 19393 2cb05d 19392->19393 19395 2bd05a 19392->19395 19394 2cb00c __freea RtlAllocateHeap 19393->19394 19393->19395 19394->19395 19395->19387 19397 2c8d45 19396->19397 19402 2bd06d 19396->19402 19398 2c8d94 19397->19398 19400 2c8d6c 19397->19400 19399 2b8bd3 ___std_exception_copy RtlAllocateHeap 19398->19399 19399->19402 19403 2c8c8b 19400->19403 19402->19382 19402->19391 19404 2c8c97 std::_Locinfo::_Locinfo_dtor 19403->19404 19406 2c8cd6 19404->19406 19407 2c8def 19404->19407 19406->19402 19419 2ce92e 19407->19419 19409 2c8e05 19432 2ce89d 19409->19432 19410 2c8dff 19410->19409 19411 2c8e37 19410->19411 19413 2ce92e RtlAllocateHeap 19410->19413 19411->19409 19414 2ce92e RtlAllocateHeap 19411->19414 19415 2c8e2e 19413->19415 19416 2c8e43 FindCloseChangeNotification 19414->19416 19417 2ce92e RtlAllocateHeap 19415->19417 19416->19409 19417->19411 19418 2c8e5d 19418->19406 19420 2ce93b 19419->19420 19421 2ce950 19419->19421 19438 2c16dc 19420->19438 19424 2c16dc RtlAllocateHeap 19421->19424 19426 2ce975 19421->19426 19427 2ce980 19424->19427 19425 2c16ef __floor_pentium4 RtlAllocateHeap 19428 2ce948 19425->19428 19426->19410 19429 2c16ef __floor_pentium4 RtlAllocateHeap 19427->19429 19428->19410 19430 2ce988 19429->19430 19431 2b8c50 ___std_exception_copy RtlAllocateHeap 19430->19431 19431->19428 19433 2ce8ac 19432->19433 19434 2c16ef __floor_pentium4 RtlAllocateHeap 19433->19434 19437 2ce8d6 19433->19437 19435 2ce918 19434->19435 19436 2c16dc RtlAllocateHeap 19435->19436 19436->19437 19437->19418 19439 2c9f85 std::locale::_Setgloballocale RtlAllocateHeap 19438->19439 19440 2c16e1 19439->19440 19440->19425 19442 297f1d 19441->19442 19443 298034 19441->19443 19444 297fcb 19442->19444 19445 297f2b 19442->19445 19446 297f7c 19442->19446 19447 297f83 19442->19447 19448 297f24 19442->19448 19453 282cf0 std::_Throw_Cpp_error 2 API calls 19443->19453 19454 297f29 19443->19454 19444->18306 19452 2b3662 std::_Facet_Register 2 API calls 19445->19452 19521 29cf80 19446->19521 19450 2b3662 std::_Facet_Register 2 API calls 19447->19450 19516 29c3a0 19448->19516 19450->19454 19452->19454 19455 29804f 19453->19455 19454->18306 19526 287f90 19455->19526 19457 298062 Concurrency::cancel_current_task 19459 2a215f 19458->19459 19583 2c132b 19459->19583 19463 29b4f0 19464 29db10 19463->19464 19465 29de3d 19464->19465 19466 29db56 19464->19466 19469 29fd70 2 API calls 19465->19469 19635 29ebb0 19466->19635 19468 29dba4 19472 29fd70 2 API calls 19468->19472 19470 29de87 19469->19470 19471 29eda0 3 API calls 19470->19471 19473 29df4f std::ios_base::_Ios_base_dtor 19470->19473 19474 29dee2 19471->19474 19475 29dbc1 19472->19475 19476 297ef0 2 API calls 19473->19476 19492 29dfc7 19473->19492 19500 29e0a1 Concurrency::cancel_current_task 19473->19500 19477 2875c0 2 API calls 19474->19477 19515 29dcc3 std::ios_base::_Ios_base_dtor 19475->19515 19641 29eda0 19475->19641 19476->19492 19478 29df06 19477->19478 19483 29f440 3 API calls 19478->19483 19480 29dcec 19485 297ef0 2 API calls 19480->19485 19481 29dd82 19488 297ef0 2 API calls 19481->19488 19493 29dd9f 19481->19493 19482 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 19486 29e06f 19482->19486 19498 29df1f 19483->19498 19484 29dc1c 19688 2875c0 19484->19688 19510 29dd01 19485->19510 19737 2990b0 19486->19737 19488->19493 19490 29e093 19496 2990b0 2 API calls 19490->19496 19491 29dc40 19718 29f440 19491->19718 19492->19482 19513 29de38 std::ios_base::_Ios_base_dtor 19492->19513 19497 2935b0 RtlAllocateHeap 19493->19497 19494 29e07d Concurrency::cancel_current_task 19504 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 19494->19504 19496->19500 19501 29dd6c 19497->19501 19498->19490 19502 287a20 RtlAllocateHeap 19498->19502 19499 29dc56 19499->19486 19503 29dc6b 19499->19503 19505 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 19500->19505 19507 2935b0 RtlAllocateHeap 19501->19507 19502->19473 19727 287a20 19503->19727 19504->19490 19509 29e0b7 19505->19509 19511 29de26 19507->19511 19732 2935b0 19510->19732 19512 2935b0 RtlAllocateHeap 19511->19512 19512->19513 19513->18310 19514 29dc86 19514->19494 19514->19515 19515->19480 19515->19481 19517 2b3662 std::_Facet_Register 2 API calls 19516->19517 19518 29c3c3 19517->19518 19519 2b3662 std::_Facet_Register 2 API calls 19518->19519 19520 29c3ec 19519->19520 19520->19454 19522 2b3662 std::_Facet_Register 2 API calls 19521->19522 19523 29cfb7 19522->19523 19524 283040 std::_Throw_Cpp_error 2 API calls 19523->19524 19525 29cfee 19524->19525 19525->19454 19537 287350 19526->19537 19528 288029 19555 29ad80 19528->19555 19530 28803d 19531 288076 std::ios_base::_Ios_base_dtor 19530->19531 19533 2880df 19530->19533 19559 2872b0 19531->19559 19535 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 19533->19535 19534 2880aa 19534->19457 19536 2880e4 19535->19536 19536->19457 19562 284d70 19537->19562 19546 298f00 std::_Throw_Cpp_error 2 API calls 19547 2873e6 19546->19547 19548 287476 std::ios_base::_Ios_base_dtor 19547->19548 19549 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 19547->19549 19548->19528 19550 2874c4 19549->19550 19551 2b4b68 ___std_exception_destroy RtlAllocateHeap 19550->19551 19552 287511 19551->19552 19553 2b4b68 ___std_exception_destroy RtlAllocateHeap 19552->19553 19554 287527 std::ios_base::_Ios_base_dtor 19553->19554 19554->19528 19556 29adb4 19555->19556 19557 298f00 std::_Throw_Cpp_error 2 API calls 19556->19557 19558 29adbf 19557->19558 19558->19530 19560 2b4b05 ___std_exception_copy 2 API calls 19559->19560 19561 28731a 19560->19561 19561->19534 19564 284da6 19562->19564 19563 284dd8 19566 29ac50 19563->19566 19564->19563 19565 283040 std::_Throw_Cpp_error 2 API calls 19564->19565 19565->19563 19567 29ac81 19566->19567 19568 29acd3 19567->19568 19569 29e8a0 2 API calls 19567->19569 19570 2873af 19569->19570 19571 29abb0 19570->19571 19572 29abe1 19571->19572 19572->19572 19573 298f00 std::_Throw_Cpp_error 2 API calls 19572->19573 19574 2873c2 19573->19574 19575 29ae20 19574->19575 19578 29e710 19575->19578 19577 2873d1 19577->19546 19579 29e753 19578->19579 19580 2832d0 std::_Throw_Cpp_error 2 API calls 19579->19580 19581 29e758 std::locale::_Locimp::_Locimp 19579->19581 19582 29e843 std::locale::_Locimp::_Locimp 19580->19582 19581->19577 19582->19577 19584 2c9e32 __Getctype RtlAllocateHeap 19583->19584 19585 2c1336 19584->19585 19586 2ca11f __Getctype RtlAllocateHeap 19585->19586 19587 2a225f 19586->19587 19588 29fd70 19587->19588 19591 29fde4 19588->19591 19592 29fd84 19588->19592 19590 29ff6c 19590->19463 19597 29fe74 19591->19597 19624 2a01e0 19591->19624 19595 29fdc2 19592->19595 19602 2a9e20 19592->19602 19595->19591 19596 2a9e20 2 API calls 19595->19596 19599 29fe58 19595->19599 19596->19599 19597->19463 19598 29fecc 19598->19590 19601 2a9e20 2 API calls 19598->19601 19628 2a08f0 19598->19628 19599->19597 19620 2a1430 19599->19620 19601->19598 19603 2a9e62 19602->19603 19604 2a9f76 19602->19604 19606 2a9e7c 19603->19606 19607 2a9eca 19603->19607 19608 2a9eba 19603->19608 19605 283330 2 API calls 19604->19605 19609 2a9f7b 19605->19609 19610 2b3662 std::_Facet_Register 2 API calls 19606->19610 19613 2b3662 std::_Facet_Register 2 API calls 19607->19613 19617 2a9e9a std::locale::_Locimp::_Locimp 19607->19617 19608->19606 19608->19609 19611 282b50 Concurrency::cancel_current_task 2 API calls 19609->19611 19612 2a9e8f 19610->19612 19614 2a9f80 19611->19614 19612->19614 19612->19617 19613->19617 19615 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 19614->19615 19616 2a9f85 19615->19616 19618 2a77d0 RtlAllocateHeap 19617->19618 19619 2a9f47 19618->19619 19619->19595 19621 2a1443 19620->19621 19622 2a1471 19621->19622 19623 2a9e20 2 API calls 19621->19623 19622->19591 19623->19622 19625 2a01f0 19624->19625 19626 2a9e20 2 API calls 19625->19626 19627 2a0260 19625->19627 19626->19625 19627->19598 19629 2a1430 2 API calls 19628->19629 19632 2a08fc 19629->19632 19630 2a9e20 RtlAllocateHeap RtlAllocateHeap 19634 2a0995 19630->19634 19631 2a090a 19631->19598 19632->19631 19633 2a9e20 2 API calls 19632->19633 19632->19634 19633->19632 19634->19630 19634->19631 19636 29ec6d 19635->19636 19637 297ef0 2 API calls 19636->19637 19638 29ec8d 19637->19638 19740 2a16c0 19638->19740 19640 29ecdf 19640->19468 19642 29ee46 19641->19642 19665 29ef1f std::ios_base::_Ios_base_dtor 19641->19665 19643 29f425 19642->19643 19646 29e8a0 2 API calls 19642->19646 19648 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 19643->19648 19644 298f00 std::_Throw_Cpp_error 2 API calls 19645 29ef5b 19644->19645 19647 29ef6a 19645->19647 19655 29f191 19645->19655 19649 29ee79 19646->19649 19650 29f440 3 API calls 19647->19650 19651 29f42f 19648->19651 19652 298f00 std::_Throw_Cpp_error 2 API calls 19649->19652 19653 29ef79 19650->19653 19656 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 19651->19656 19654 29ee93 19652->19654 19660 283040 std::_Throw_Cpp_error 2 API calls 19653->19660 19657 298f00 std::_Throw_Cpp_error 2 API calls 19654->19657 19655->19655 19661 283040 std::_Throw_Cpp_error 2 API calls 19655->19661 19658 29f434 19656->19658 19659 29eee3 19657->19659 19662 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 19658->19662 19659->19643 19659->19665 19663 29efba 19660->19663 19664 29f1c9 19661->19664 19687 29f375 std::ios_base::_Ios_base_dtor 19662->19687 19666 298f00 std::_Throw_Cpp_error 2 API calls 19663->19666 19667 29fbf0 2 API calls 19664->19667 19665->19644 19669 29efcd 19666->19669 19670 29f1e0 19667->19670 19668 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 19671 29f43e 19668->19671 19672 29e710 2 API calls 19669->19672 19673 298f00 std::_Throw_Cpp_error 2 API calls 19670->19673 19674 29f019 19672->19674 19677 29f22f std::ios_base::_Ios_base_dtor 19673->19677 19675 298f00 std::_Throw_Cpp_error 2 API calls 19674->19675 19676 29f032 19675->19676 19678 298f00 std::_Throw_Cpp_error 2 API calls 19676->19678 19677->19658 19679 29f161 std::ios_base::_Ios_base_dtor 19677->19679 19682 29f081 std::ios_base::_Ios_base_dtor 19678->19682 19679->19679 19680 283040 std::_Throw_Cpp_error 2 API calls 19679->19680 19686 29f3f2 std::ios_base::_Ios_base_dtor 19679->19686 19681 29f30c 19680->19681 19683 29fbf0 2 API calls 19681->19683 19682->19651 19682->19679 19684 29f323 19683->19684 19685 298f00 std::_Throw_Cpp_error 2 API calls 19684->19685 19685->19687 19686->19484 19687->19668 19687->19686 19809 284e30 19688->19809 19691 284e30 2 API calls 19692 28762b 19691->19692 19693 29ace0 2 API calls 19692->19693 19694 287640 19693->19694 19695 29abb0 2 API calls 19694->19695 19696 287656 19695->19696 19697 29e710 2 API calls 19696->19697 19699 28766d std::ios_base::_Ios_base_dtor 19697->19699 19698 287a09 19700 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 19698->19700 19699->19698 19701 28770a std::ios_base::_Ios_base_dtor 19699->19701 19702 287a0e 19700->19702 19704 287350 2 API calls 19701->19704 19703 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 19702->19703 19705 287a13 19703->19705 19706 2877a4 19704->19706 19707 298f00 std::_Throw_Cpp_error 2 API calls 19706->19707 19708 2877b9 19707->19708 19709 29e710 2 API calls 19708->19709 19710 28780c 19709->19710 19711 298f00 std::_Throw_Cpp_error 2 API calls 19710->19711 19712 287828 19711->19712 19713 29ad80 2 API calls 19712->19713 19714 287879 std::ios_base::_Ios_base_dtor 19713->19714 19714->19702 19715 287975 std::ios_base::_Ios_base_dtor 19714->19715 19716 2872b0 2 API calls 19715->19716 19717 2879ca 19716->19717 19717->19491 19719 29f630 19718->19719 19725 29f4c9 std::ios_base::_Ios_base_dtor std::locale::_Locimp::_Locimp 19718->19725 19719->19499 19721 29f647 19724 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 19721->19724 19722 2832d0 std::_Throw_Cpp_error 2 API calls 19722->19725 19723 298f00 std::_Throw_Cpp_error 2 API calls 19723->19725 19726 29f651 19724->19726 19725->19719 19725->19721 19725->19722 19725->19723 19813 2834a0 19725->19813 19726->19499 19728 2b4b68 ___std_exception_destroy RtlAllocateHeap 19727->19728 19729 287a61 19728->19729 19730 2b4b68 ___std_exception_destroy RtlAllocateHeap 19729->19730 19731 287a77 19730->19731 19731->19514 19733 2935d1 19732->19733 19734 2935f1 std::ios_base::_Ios_base_dtor 19732->19734 19733->19734 19735 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 19733->19735 19734->19501 19736 293625 19735->19736 19736->19501 19820 296590 19737->19820 19743 2a17d0 19740->19743 19742 2a16da std::locale::_Setgloballocale 19742->19640 19744 2a1809 19743->19744 19750 2a1838 19743->19750 19745 2a1923 19744->19745 19748 2a181b 19744->19748 19760 2a1990 19745->19760 19748->19750 19751 2a9f90 19748->19751 19750->19742 19752 2a9fc2 19751->19752 19753 2aa0a3 19751->19753 19770 2ad180 19752->19770 19754 283330 2 API calls 19753->19754 19758 2aa000 std::locale::_Locimp::_Locimp 19754->19758 19756 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 19757 2aa0ad 19756->19757 19758->19756 19759 2aa05f std::ios_base::_Ios_base_dtor 19758->19759 19759->19750 19761 2b1cda 2 API calls 19760->19761 19763 2a199a 19761->19763 19762 2a1928 19763->19762 19764 282cf0 std::_Throw_Cpp_error 2 API calls 19763->19764 19765 2a1a03 19764->19765 19766 29ace0 2 API calls 19765->19766 19767 2a1a18 19766->19767 19778 287cf0 19767->19778 19769 2a1a2d Concurrency::cancel_current_task 19771 2ad1c9 19770->19771 19773 2ad189 19770->19773 19771->19771 19772 2ad1a0 19774 2ad1a9 19772->19774 19776 2b3662 std::_Facet_Register 2 API calls 19772->19776 19773->19771 19773->19772 19775 2b3662 std::_Facet_Register 2 API calls 19773->19775 19774->19758 19775->19772 19777 2ad1c2 19776->19777 19777->19758 19779 287350 2 API calls 19778->19779 19780 287d80 19779->19780 19781 29ad80 2 API calls 19780->19781 19782 287d94 19781->19782 19783 287dcd std::ios_base::_Ios_base_dtor 19782->19783 19786 287e33 19782->19786 19784 2872b0 2 API calls 19783->19784 19785 287dfd 19784->19785 19785->19769 19787 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 19786->19787 19788 287e38 19787->19788 19789 287350 2 API calls 19788->19789 19790 287ece 19789->19790 19791 29ad80 2 API calls 19790->19791 19792 287ee2 19791->19792 19793 287f1b std::ios_base::_Ios_base_dtor 19792->19793 19796 287f81 19792->19796 19794 2872b0 2 API calls 19793->19794 19795 287f4b 19794->19795 19795->19769 19797 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 19796->19797 19798 287f86 19797->19798 19799 287350 2 API calls 19798->19799 19800 288029 19799->19800 19801 29ad80 2 API calls 19800->19801 19802 28803d 19801->19802 19803 288076 std::ios_base::_Ios_base_dtor 19802->19803 19805 2880df 19802->19805 19804 2872b0 2 API calls 19803->19804 19806 2880aa 19804->19806 19807 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 19805->19807 19806->19769 19808 2880e4 19807->19808 19808->19769 19810 284e66 19809->19810 19811 284ea8 19810->19811 19812 283040 std::_Throw_Cpp_error 2 API calls 19810->19812 19811->19691 19812->19811 19816 283380 19813->19816 19817 283399 19816->19817 19818 2c0dc7 2 API calls 19817->19818 19819 2833a7 19818->19819 19819->19725 19821 2b4b05 ___std_exception_copy 2 API calls 19820->19821 19822 2965ce 19821->19822 19823 2b4b05 ___std_exception_copy 2 API calls 19822->19823 19824 296601 19823->19824 19824->19494 19826 2d8e07 19825->19826 19830 2d8bf8 19825->19830 19826->18313 19828 2d8d28 std::locale::_Setgloballocale 19828->19826 19829 283130 2 API calls 19828->19829 19829->19828 19830->19828 19832 2b87a0 19830->19832 19841 283130 19830->19841 19833 2b87d3 19832->19833 19838 2b87b7 19832->19838 19834 2c9e32 __Getctype RtlAllocateHeap 19833->19834 19835 2b87d8 19834->19835 19836 2ca11f __Getctype RtlAllocateHeap 19835->19836 19837 2b87e8 19836->19837 19837->19838 19839 2c9a29 2 API calls 19837->19839 19838->19830 19840 2b881a 19839->19840 19840->19830 19842 28316f 19841->19842 19843 2832b3 19841->19843 19845 283189 19842->19845 19847 2831d7 19842->19847 19848 2831c7 19842->19848 19844 283330 2 API calls 19843->19844 19846 2832b8 19844->19846 19850 2b3662 std::_Facet_Register 2 API calls 19845->19850 19849 282b50 Concurrency::cancel_current_task 2 API calls 19846->19849 19851 2b3662 std::_Facet_Register 2 API calls 19847->19851 19854 28319c std::locale::_Locimp::_Locimp 19847->19854 19848->19845 19848->19846 19849->19854 19850->19854 19851->19854 19852 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 19853 2832c2 19852->19853 19854->19852 19855 28326b std::ios_base::_Ios_base_dtor 19854->19855 19855->19830 19857 2b3067 19856->19857 19858 2b363d GetSystemTimePreciseAsFileTime 19856->19858 19857->17972 19858->19857 20489 5020c86 20490 5020c98 20489->20490 20491 5020cb1 2 API calls 20490->20491 20492 5020c9e GetCurrentHwProfileW 20491->20492 20494 5020d39 20492->20494 19860 5020d17 GetCurrentHwProfileW 19861 5020d39 19860->19861 20519 5020c95 20520 5020ca5 GetCurrentHwProfileW 20519->20520 20522 5020d39 20520->20522 20761 5020ad5 20762 5020a7b 20761->20762 20765 5020a9e 20761->20765 20763 5020ab1 5 API calls 20762->20763 20763->20765 20764 5020a5d 20765->20764 20766 5020ba1 4 API calls 20765->20766 20767 5020b8e 20766->20767 20768 5020c67 3 API calls 20767->20768 20769 5020c58 20768->20769 20770 5020cb1 2 API calls 20769->20770 20771 5020c9e GetCurrentHwProfileW 20770->20771 20773 5020d39 20771->20773 20523 2a47b0 20524 2a48ed 20523->20524 20525 2a47ed 20523->20525 20526 283330 2 API calls 20524->20526 20529 2a4a30 2 API calls 20525->20529 20527 2a48f2 20526->20527 20528 2a4a23 20527->20528 20530 2a493d 20527->20530 20531 283330 2 API calls 20528->20531 20536 2a4827 20529->20536 20533 2a4a30 2 API calls 20530->20533 20532 2a4a28 20531->20532 20534 2a4977 20533->20534 20542 293d50 20534->20542 20537 29e1e0 RtlAllocateHeap 20536->20537 20538 2a48b4 20537->20538 20539 2a499f 20540 29e1e0 RtlAllocateHeap 20539->20540 20541 2a49ea 20540->20541 20543 293d8f 20542->20543 20569 293df7 std::locale::_Locimp::_Locimp 20542->20569 20544 293e69 20543->20544 20545 293f7d 20543->20545 20546 293f1e 20543->20546 20547 293d96 20543->20547 20543->20569 20549 2b3662 std::_Facet_Register 2 API calls 20544->20549 20551 2b3662 std::_Facet_Register 2 API calls 20545->20551 20614 297e80 20546->20614 20550 2b3662 std::_Facet_Register 2 API calls 20547->20550 20552 293e73 20549->20552 20553 293da0 20550->20553 20554 293f8a 20551->20554 20552->20569 20575 2abf20 20552->20575 20555 2b3662 std::_Facet_Register 2 API calls 20553->20555 20558 29408e 20554->20558 20559 293fd3 20554->20559 20554->20569 20557 293dd2 20555->20557 20602 2af450 20557->20602 20561 283330 2 API calls 20558->20561 20562 293fdb 20559->20562 20563 294004 20559->20563 20564 294093 20561->20564 20562->20564 20565 293fe6 20562->20565 20566 2b3662 std::_Facet_Register 2 API calls 20563->20566 20567 282b50 Concurrency::cancel_current_task 2 API calls 20564->20567 20568 2b3662 std::_Facet_Register 2 API calls 20565->20568 20566->20569 20570 293fec 20567->20570 20568->20570 20569->20539 20570->20569 20573 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 20570->20573 20571 293d50 6 API calls 20572 293eb1 20571->20572 20572->20569 20572->20571 20574 29409d 20573->20574 20576 2abf9b 20575->20576 20577 2abf32 20575->20577 20578 283330 2 API calls 20576->20578 20579 2abf6c 20577->20579 20580 2abf3d 20577->20580 20581 2abfa0 20578->20581 20583 2abf89 20579->20583 20586 2b3662 std::_Facet_Register 2 API calls 20579->20586 20580->20581 20582 2abf44 20580->20582 20584 282b50 Concurrency::cancel_current_task 2 API calls 20581->20584 20585 2b3662 std::_Facet_Register 2 API calls 20582->20585 20583->20572 20587 2abf4a 20584->20587 20585->20587 20588 2abf76 20586->20588 20589 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 20587->20589 20590 2abf53 20587->20590 20588->20572 20591 2abfaa 20589->20591 20590->20572 20592 2abffc 20591->20592 20593 2ac067 20591->20593 20596 2ac003 std::locale::_Locimp::_Locimp 20591->20596 20619 29fab0 20592->20619 20595 283330 2 API calls 20593->20595 20597 2ac06c 20595->20597 20596->20572 20598 2b3662 std::_Facet_Register 2 API calls 20597->20598 20599 2ac09e 20598->20599 20600 283040 std::_Throw_Cpp_error 2 API calls 20599->20600 20601 2ac0e2 20600->20601 20601->20572 20603 2af488 20602->20603 20613 2af52f 20602->20613 20604 2b3662 std::_Facet_Register 2 API calls 20603->20604 20605 2af4aa 20604->20605 20606 2963b0 std::_Throw_Cpp_error 2 API calls 20605->20606 20607 2af4c0 20606->20607 20608 293d50 6 API calls 20607->20608 20609 2af4d0 20608->20609 20610 2af450 6 API calls 20609->20610 20611 2af521 20610->20611 20612 2af450 6 API calls 20611->20612 20612->20613 20613->20569 20615 2b3662 std::_Facet_Register 2 API calls 20614->20615 20616 297ea6 20615->20616 20617 2963b0 std::_Throw_Cpp_error 2 API calls 20616->20617 20618 297ec5 20617->20618 20618->20569 20620 29fb2b 20619->20620 20621 29fac2 20619->20621 20624 282b50 Concurrency::cancel_current_task 2 API calls 20620->20624 20622 29facd 20621->20622 20623 29fafc 20621->20623 20622->20620 20625 29fad4 20622->20625 20626 29fb19 20623->20626 20629 2b3662 std::_Facet_Register 2 API calls 20623->20629 20627 29fada 20624->20627 20628 2b3662 std::_Facet_Register 2 API calls 20625->20628 20626->20596 20630 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 20627->20630 20633 29fae3 20627->20633 20628->20627 20631 29fb06 20629->20631 20634 29fb35 20630->20634 20631->20596 20632 29fb5b std::locale::_Setgloballocale 20632->20596 20633->20596 20634->20632 20637 2a9c70 20634->20637 20636 29fb7f 20636->20596 20638 2a9dc4 20637->20638 20643 2a9ca2 20637->20643 20639 283330 2 API calls 20638->20639 20652 2a9d04 std::locale::_Locimp::_Locimp 20639->20652 20640 2a9dbf 20641 282b50 Concurrency::cancel_current_task 2 API calls 20640->20641 20641->20638 20642 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 20644 2a9dce 20642->20644 20643->20640 20645 2a9d1d 20643->20645 20646 2a9cf3 20643->20646 20654 299950 20644->20654 20649 2b3662 std::_Facet_Register 2 API calls 20645->20649 20645->20652 20646->20640 20648 2a9cfe 20646->20648 20651 2b3662 std::_Facet_Register 2 API calls 20648->20651 20649->20652 20650 2a9dd9 Concurrency::cancel_current_task 20651->20652 20652->20642 20653 2a9d8f std::ios_base::_Ios_base_dtor 20652->20653 20653->20636 20655 299968 20654->20655 20656 299978 std::ios_base::_Ios_base_dtor 20654->20656 20655->20656 20657 2b8c60 std::_Throw_Cpp_error RtlAllocateHeap 20655->20657 20656->20650 20658 29998d 20657->20658 20659 299a4f 20658->20659 20666 2b2b64 20658->20666 20659->20650 20665 299a04 20665->20650 20667 2b2ae7 20666->20667 20668 2999cc 20667->20668 20688 2b9805 20667->20688 20668->20659 20674 2983b0 20668->20674 20670 2b2b33 20670->20668 20702 2bd5e6 20670->20702 20673 2bd098 5 API calls 20673->20668 20675 29843c 20674->20675 20676 298463 20674->20676 20728 2c11fa 20675->20728 20678 29c430 20676->20678 20679 29c45f std::_Throw_Cpp_error std::_Lockit::~_Lockit std::_Lockit::_Lockit 20678->20679 20680 2b3662 std::_Facet_Register 2 API calls 20679->20680 20687 29c4f8 std::_Lockit::~_Lockit 20679->20687 20681 29c506 20680->20681 20682 284040 std::_Throw_Cpp_error 3 API calls 20681->20682 20683 29c536 20682->20683 20684 284100 std::_Throw_Cpp_error 2 API calls 20683->20684 20685 29c592 20684->20685 20686 2b26e7 std::_Facet_Register 2 API calls 20685->20686 20686->20687 20687->20665 20690 2b974e std::_Locinfo::_Locinfo_dtor 20688->20690 20689 2b9761 20691 2c16ef __floor_pentium4 RtlAllocateHeap 20689->20691 20690->20689 20693 2b9781 20690->20693 20692 2b9766 20691->20692 20694 2b8c50 ___std_exception_copy RtlAllocateHeap 20692->20694 20695 2b9793 20693->20695 20696 2b9786 20693->20696 20701 2b9771 20694->20701 20698 2ca8e1 RtlAllocateHeap 20695->20698 20697 2c16ef __floor_pentium4 RtlAllocateHeap 20696->20697 20697->20701 20699 2b979c 20698->20699 20700 2c16ef __floor_pentium4 RtlAllocateHeap 20699->20700 20699->20701 20700->20701 20701->20670 20703 2bd5f9 ___std_exception_copy 20702->20703 20708 2bd33d 20703->20708 20705 2bd60e 20706 2b898c ___std_exception_copy RtlAllocateHeap 20705->20706 20707 2b2b4e 20706->20707 20707->20668 20707->20673 20709 2bd349 std::_Locinfo::_Locinfo_dtor 20708->20709 20710 2bd34f 20709->20710 20712 2bd392 20709->20712 20711 2b8bd3 ___std_exception_copy RtlAllocateHeap 20710->20711 20714 2bd36a 20711->20714 20715 2bd4c0 20712->20715 20714->20705 20716 2bd4d3 20715->20716 20717 2bd4e6 20715->20717 20716->20714 20724 2bd3e7 20717->20724 20719 2bd509 20720 2b9a81 4 API calls 20719->20720 20723 2bd597 20719->20723 20721 2bd537 20720->20721 20722 2c262d 2 API calls 20721->20722 20722->20723 20723->20714 20725 2bd450 20724->20725 20726 2bd3f8 20724->20726 20725->20719 20726->20725 20727 2c25ed SetFilePointerEx RtlAllocateHeap 20726->20727 20727->20725 20729 2c1206 20728->20729 20731 2c121b 20728->20731 20730 2c16ef __floor_pentium4 RtlAllocateHeap 20729->20730 20732 2c120b 20730->20732 20731->20676 20733 2b8c50 ___std_exception_copy RtlAllocateHeap 20732->20733 20734 2c1216 20733->20734 20734->20676 19999 5020b67 20000 5020b73 19999->20000 20001 5020ba1 4 API calls 20000->20001 20002 5020b8e 20000->20002 20001->20002 20003 5020c67 3 API calls 20002->20003 20004 5020c58 20003->20004 20005 5020cb1 2 API calls 20004->20005 20006 5020c9e GetCurrentHwProfileW 20005->20006 20008 5020d39 20006->20008 19923 5020d28 19924 5020cce GetCurrentHwProfileW 19923->19924 19926 5020d35 19923->19926 19924->19926 20051 5020bb4 20052 5020bda 20051->20052 20053 5020c67 3 API calls 20052->20053 20054 5020c58 20053->20054 20055 5020cb1 2 API calls 20054->20055 20056 5020c9e GetCurrentHwProfileW 20055->20056 20058 5020d39 20056->20058 20778 5020aff 20779 5020ac9 20778->20779 20780 5020ba1 4 API calls 20779->20780 20781 5020b8e 20780->20781 20782 5020c67 3 API calls 20781->20782 20783 5020c58 20782->20783 20784 5020cb1 2 API calls 20783->20784 20785 5020c9e GetCurrentHwProfileW 20784->20785 20787 5020d39 20785->20787 20395 5020a3c 20396 5020a4f 20395->20396 20397 5020ab1 5 API calls 20396->20397 20399 5020a9e 20397->20399 20398 5020a5d 20399->20398 20400 5020ba1 4 API calls 20399->20400 20401 5020b8e 20400->20401 20402 5020c67 3 API calls 20401->20402 20403 5020c58 20402->20403 20404 5020cb1 2 API calls 20403->20404 20405 5020c9e GetCurrentHwProfileW 20404->20405 20407 5020d39 20405->20407

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 251 345940-345972 WSAStartup 252 345a46-345a4f 251->252 253 345978-3459a2 call 3677d0 * 2 251->253 258 3459a4-3459a8 253->258 259 3459ae-3459f4 253->259 258->252 258->259 261 3459f6-3459fc 259->261 262 345a40 259->262 263 345a54-345a5e 261->263 264 3459fe 261->264 262->252 263->262 270 345a60-345a68 263->270 265 345a04-345a18 socket 264->265 265->262 266 345a1a-345a2a connect 265->266 268 345a50 266->268 269 345a2c-345a34 closesocket 266->269 268->263 269->265 271 345a36-345a3a 269->271 271->262
                                                                  APIs
                                                                  • WSAStartup.WS2_32 ref: 0034596B
                                                                  • socket.WS2_32(?,?,?,?,?,?,00406328,?,?), ref: 00345A0E
                                                                  • connect.WS2_32(00000000,003D6B31,?,?,?,?,00406328,?,?), ref: 00345A21
                                                                  • closesocket.WS2_32(00000000), ref: 00345A2D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: Startupclosesocketconnectsocket
                                                                  • String ID:
                                                                  • API String ID: 3098855095-0
                                                                  • Opcode ID: 9355f352cdf47716fdc6f7621c71dab46e5aa4935f006fa8da9fa15bb3554b82
                                                                  • Instruction ID: 30aeb2ab63d7cbd9d8eadfa2b99a1cb8096988e4f17596f82ebf30d09249b4d3
                                                                  • Opcode Fuzzy Hash: 9355f352cdf47716fdc6f7621c71dab46e5aa4935f006fa8da9fa15bb3554b82
                                                                  • Instruction Fuzzy Hash: 3431E4329157016BD7229F648C85B6BB7E5FFCA334F015F19F9A89B2D1E370A8048692
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(00000000), ref: 05020D1E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352765037.0000000005020000.00000040.00001000.00020000.00000000.sdmp, Offset: 05020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5020000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID: ]o[E
                                                                  • API String ID: 2104809126-72463870
                                                                  • Opcode ID: f1ecf87fff66698e3637a906a390eb8333071b61d92a9ec44f51fc7c29aa70b6
                                                                  • Instruction ID: 70b61f7ffa232b8a387fe17038e2e1d9644c0bf32d24362b2b3e274ac7d00cdc
                                                                  • Opcode Fuzzy Hash: f1ecf87fff66698e3637a906a390eb8333071b61d92a9ec44f51fc7c29aa70b6
                                                                  • Instruction Fuzzy Hash: AF4181EF28C330BDB652C5553B2DAFE66AFE6C67307308426F407D6A46E6940B8D1031
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • setsockopt.WS2_32(00000414,0000FFFF,00001006,?,00000008), ref: 00344F56
                                                                  • recv.WS2_32(?,00000004,00000002), ref: 00344F71
                                                                  • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 00344FF3
                                                                  • recv.WS2_32(00000000,0000000C,00000008), ref: 00345014
                                                                  • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?,00000000), ref: 003450B1
                                                                    • Part of subcall function 00345940: WSAStartup.WS2_32 ref: 0034596B
                                                                    • Part of subcall function 00345940: socket.WS2_32(?,?,?,?,?,?,00406328,?,?), ref: 00345A0E
                                                                    • Part of subcall function 00345940: connect.WS2_32(00000000,003D6B31,?,?,?,?,00406328,?,?), ref: 00345A21
                                                                    • Part of subcall function 00345940: closesocket.WS2_32(00000000), ref: 00345A2D
                                                                  • recv.WS2_32(00000000,?,00000008), ref: 003450CB
                                                                  • recv.WS2_32(?,00000004,00000008), ref: 003451D3
                                                                  • __Xtime_get_ticks.LIBCPMT ref: 003451DA
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 003451E8
                                                                  • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 00345261
                                                                  • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 00345269
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: recv$Sleepsetsockopt$StartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectsocket
                                                                  • String ID: (c@
                                                                  • API String ID: 301102601-4044601278
                                                                  • Opcode ID: 9c98d1fd36826b218f659fb52c493171bf33dd208ebeec7a7c7d3cbaec41a753
                                                                  • Instruction ID: 81542524b26278f064923c68c5667ba3516a59f926e419a49eeb025e6f88529b
                                                                  • Opcode Fuzzy Hash: 9c98d1fd36826b218f659fb52c493171bf33dd208ebeec7a7c7d3cbaec41a753
                                                                  • Instruction Fuzzy Hash: 31B19B71D043089FEB15DFA8CE89BADBBF5BB45310F144229E455BB2D2D7B06944CB81
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 178 289280-2892dd call 2963b0 181 289413-289521 call 282df0 call 3677d0 178->181 182 2892e3-2892e9 178->182 198 289523-289535 181->198 199 289537-28953f call 298dc0 181->199 183 2892f0-289313 182->183 185 289324-289331 183->185 186 289315-28931f 183->186 189 289342-28934f 185->189 190 289333-28933d 185->190 188 289403-289406 186->188 192 289409-28940d 188->192 193 289360-28936d 189->193 194 289351-28935b 189->194 190->188 192->181 192->183 196 28937e-28938b 193->196 197 28936f-289379 193->197 194->188 201 289399-2893a6 196->201 202 28938d-289397 196->202 197->188 203 289544-289597 call 3677d0 * 2 198->203 199->203 204 2893a8-2893b2 201->204 205 2893b4-2893c1 201->205 202->188 215 289599-2895c8 call 3677d0 call 2b5260 203->215 216 2895cb-2895e1 call 3677d0 203->216 204->188 207 2893cf-2893dc 205->207 208 2893c3-2893cd 205->208 210 2893ea-2893f4 207->210 211 2893de-2893e8 207->211 208->188 210->192 214 2893f6-2893ff 210->214 211->188 214->188 215->216 222 2896e2 216->222 223 2895e7-2895ed 216->223 224 2896e6-2896f0 222->224 226 2895f0-2896ce WSASend 223->226 227 28971e-28973d 224->227 228 2896f2-2896fe 224->228 244 28975f-289763 226->244 245 2896d4-2896dc 226->245 232 28976f-289796 227->232 233 28973f-28974b 227->233 230 289700-28970e 228->230 231 289714-28971b call 2b38e3 228->231 230->231 234 289797-2897fe call 2b8c60 call 282df0 * 2 230->234 231->227 236 28974d-28975b 233->236 237 289765-28976c call 2b38e3 233->237 236->234 242 28975d 236->242 237->232 242->237 244->224 245->222 245->226
                                                                  APIs
                                                                  • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,003CA4DC,00000000,761B23A0,-00406880), ref: 002896C9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: Send
                                                                  • String ID: 4oST$4oST$Ws2_32.dll
                                                                  • API String ID: 121738739-1839276265
                                                                  • Opcode ID: f1ad56e56af606425b27ed98268fb804f237dd580b04a8547d75453bee4a3344
                                                                  • Instruction ID: 495cabe56775346a813af6a4a4dd7eb0266ae0c55409f293860e4277b47b044d
                                                                  • Opcode Fuzzy Hash: f1ad56e56af606425b27ed98268fb804f237dd580b04a8547d75453bee4a3344
                                                                  • Instruction Fuzzy Hash: FF02FDB0D24298DFDF25DFA4C8907ACBBB0EF55314F284289E4856B6C6D7701986CF92
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 272 5020a2d-5020a9e call 5020ab1 280 5020aa0-5020aa5 272->280 281 5020aec-5020b1d 272->281 283 5020aa7-5020aaf 280->283 284 5020b1e-5020ca3 call 5020ba1 call 5020c67 call 5020cb1 280->284 281->284 286 5020ab1-5020ab5 283->286 287 5020ab6-5020ac3 283->287 312 5020cf6-5020cf7 284->312 313 5020ca5-5020ce2 284->313 291 5020acc-5020aeb 286->291 288 5020ac5-5020ac9 287->288 289 5020a5d-5020a67 287->289 288->291 291->281 314 5020cf9-5020cfa 312->314 315 5020cfe-5020d11 312->315 318 5020cfb-5020cfd 313->318 314->318 320 5020d1c-5020d23 GetCurrentHwProfileW 315->320 318->315 321 5020d39-5020fdf call 5020da8 320->321
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352765037.0000000005020000.00000040.00001000.00020000.00000000.sdmp, Offset: 05020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5020000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ]o[E
                                                                  • API String ID: 0-72463870
                                                                  • Opcode ID: 6879a7f35283b78ba126314c2885cbe4270e6fe3ab5faacccaa82c01857d4022
                                                                  • Instruction ID: aeed2e2dd37488349e4d94ff086d10542953d0ff49ac3992fd6a34c8f0fa915f
                                                                  • Opcode Fuzzy Hash: 6879a7f35283b78ba126314c2885cbe4270e6fe3ab5faacccaa82c01857d4022
                                                                  • Instruction Fuzzy Hash: 4E9135EB14D330BDA252C5517B6DAFF6BAFE6D7730730842AF40BC6A42E2940B891031
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 359 5020a3c-5020a9e call 5020ab1 366 5020aa0-5020aa5 359->366 367 5020aec-5020b1d 359->367 369 5020aa7-5020aaf 366->369 370 5020b1e-5020ca3 call 5020ba1 call 5020c67 call 5020cb1 366->370 367->370 372 5020ab1-5020ab5 369->372 373 5020ab6-5020ac3 369->373 398 5020cf6-5020cf7 370->398 399 5020ca5-5020ce2 370->399 377 5020acc-5020aeb 372->377 374 5020ac5-5020ac9 373->374 375 5020a5d-5020a67 373->375 374->377 377->367 400 5020cf9-5020cfa 398->400 401 5020cfe-5020d11 398->401 404 5020cfb-5020cfd 399->404 400->404 406 5020d1c-5020d23 GetCurrentHwProfileW 401->406 404->401 407 5020d39-5020fdf call 5020da8 406->407
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352765037.0000000005020000.00000040.00001000.00020000.00000000.sdmp, Offset: 05020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5020000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ]o[E
                                                                  • API String ID: 0-72463870
                                                                  • Opcode ID: bbb12959755155084a91367bbf71c9647ee3d6369fac4f4162d104496bb79892
                                                                  • Instruction ID: eb6f7c2fa61b0033cf2eb8cea26736d398ebbae50b658665974af7bf93dfb73a
                                                                  • Opcode Fuzzy Hash: bbb12959755155084a91367bbf71c9647ee3d6369fac4f4162d104496bb79892
                                                                  • Instruction Fuzzy Hash: 9F8105EB18D330BDA252D5517B6DAFF67AFE6D7730730842AF40BD6A42E6940A891031
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 445 5020a4c-5020a9e call 5020ab1 451 5020aa0-5020aa5 445->451 452 5020aec-5020b1d 445->452 454 5020aa7-5020aaf 451->454 455 5020b1e-5020ca3 call 5020ba1 call 5020c67 call 5020cb1 451->455 452->455 457 5020ab1-5020ab5 454->457 458 5020ab6-5020ac3 454->458 483 5020cf6-5020cf7 455->483 484 5020ca5-5020ce2 455->484 462 5020acc-5020aeb 457->462 459 5020ac5-5020ac9 458->459 460 5020a5d-5020a67 458->460 459->462 462->452 485 5020cf9-5020cfa 483->485 486 5020cfe-5020d11 483->486 489 5020cfb-5020cfd 484->489 485->489 491 5020d1c-5020d23 GetCurrentHwProfileW 486->491 489->486 492 5020d39-5020fdf call 5020da8 491->492
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352765037.0000000005020000.00000040.00001000.00020000.00000000.sdmp, Offset: 05020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5020000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ]o[E
                                                                  • API String ID: 0-72463870
                                                                  • Opcode ID: 6257d3e130c137423f41254d9f18f5e4a1d1ee1b2a3371fdd1a8f45493a75af7
                                                                  • Instruction ID: 4a2315096c4d6df329ff6e0ffc485f13c2a9fc099c36cc89e01fd72e2c63b728
                                                                  • Opcode Fuzzy Hash: 6257d3e130c137423f41254d9f18f5e4a1d1ee1b2a3371fdd1a8f45493a75af7
                                                                  • Instruction Fuzzy Hash: 918115EB18D330BDA252D5557B6DAFF67AFE6D77307308426F40BD6A02E6940A891031
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 530 5020ad5-5020ae0 531 5020ae2-5020ae6 530->531 532 5020a7b-5020a9e call 5020ab1 530->532 534 5020ae8-5020aeb 531->534 535 5020aec-5020b1d 532->535 540 5020aa0-5020aa5 532->540 534->535 541 5020b1e-5020ca3 call 5020ba1 call 5020c67 call 5020cb1 535->541 540->541 542 5020aa7-5020aaf 540->542 568 5020cf6-5020cf7 541->568 569 5020ca5-5020ce2 541->569 543 5020ab1-5020ab5 542->543 544 5020ab6-5020ac3 542->544 548 5020acc-5020acf 543->548 545 5020ac5-5020ac9 544->545 546 5020a5d-5020a67 544->546 545->548 548->534 570 5020cf9-5020cfa 568->570 571 5020cfe-5020d11 568->571 574 5020cfb-5020cfd 569->574 570->574 576 5020d1c-5020d23 GetCurrentHwProfileW 571->576 574->571 577 5020d39-5020fdf call 5020da8 576->577
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352765037.0000000005020000.00000040.00001000.00020000.00000000.sdmp, Offset: 05020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5020000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ]o[E
                                                                  • API String ID: 0-72463870
                                                                  • Opcode ID: daef992244c287ffe9362e1ad476dc219e36c3208c80cc079250503f35cad94f
                                                                  • Instruction ID: a4fd2260e3f79a18798528c39f07ee63b0cd2ccc5503a4952448669e461f2cc8
                                                                  • Opcode Fuzzy Hash: daef992244c287ffe9362e1ad476dc219e36c3208c80cc079250503f35cad94f
                                                                  • Instruction Fuzzy Hash: 918117EB28D330BDA252D1557B6DAFF6BAFE6D77307308426F407D6A42E6D40A891031
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 615 5020a6f-5020a9e call 5020ab1 619 5020aa0-5020aa5 615->619 620 5020aec-5020b1d 615->620 622 5020aa7-5020aaf 619->622 623 5020b1e-5020ca3 call 5020ba1 call 5020c67 call 5020cb1 619->623 620->623 625 5020ab1-5020ab5 622->625 626 5020ab6-5020ac3 622->626 651 5020cf6-5020cf7 623->651 652 5020ca5-5020ce2 623->652 630 5020acc-5020aeb 625->630 627 5020ac5-5020ac9 626->627 628 5020a5d-5020a67 626->628 627->630 630->620 653 5020cf9-5020cfa 651->653 654 5020cfe-5020d11 651->654 657 5020cfb-5020cfd 652->657 653->657 659 5020d1c-5020d23 GetCurrentHwProfileW 654->659 657->654 660 5020d39-5020fdf call 5020da8 659->660
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352765037.0000000005020000.00000040.00001000.00020000.00000000.sdmp, Offset: 05020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5020000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ]o[E
                                                                  • API String ID: 0-72463870
                                                                  • Opcode ID: 108824dfdabb54d44f72f5003cf36eb6525b2a37f1b9ef03e1cab0571fb1bc6b
                                                                  • Instruction ID: 612741a8eaf18c92816813b95338d2f442d54e5375ab06c36ac691d4b2a24f49
                                                                  • Opcode Fuzzy Hash: 108824dfdabb54d44f72f5003cf36eb6525b2a37f1b9ef03e1cab0571fb1bc6b
                                                                  • Instruction Fuzzy Hash: A98116EB18D330BEA252D1557B6DAFF67AFE6D77307308426F40BD6A42E6D40A891031
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 698 5020a84-5020a9e call 5020ab1 702 5020aa0-5020aa5 698->702 703 5020aec-5020b1d 698->703 705 5020aa7-5020aaf 702->705 706 5020b1e-5020ca3 call 5020ba1 call 5020c67 call 5020cb1 702->706 703->706 708 5020ab1-5020ab5 705->708 709 5020ab6-5020ac3 705->709 734 5020cf6-5020cf7 706->734 735 5020ca5-5020ce2 706->735 713 5020acc-5020aeb 708->713 710 5020ac5-5020ac9 709->710 711 5020a5d-5020a67 709->711 710->713 713->703 736 5020cf9-5020cfa 734->736 737 5020cfe-5020d11 734->737 740 5020cfb-5020cfd 735->740 736->740 742 5020d1c-5020d23 GetCurrentHwProfileW 737->742 740->737 743 5020d39-5020fdf call 5020da8 742->743
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352765037.0000000005020000.00000040.00001000.00020000.00000000.sdmp, Offset: 05020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5020000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ]o[E
                                                                  • API String ID: 0-72463870
                                                                  • Opcode ID: 471967089208a7e96bb741da4a9256f994af26ca377f99b530c6d2588dd3f30e
                                                                  • Instruction ID: 62235a5df20b49c26eea309e81f8ccc530b5d6e12bff7b30dc0a25f0f221c516
                                                                  • Opcode Fuzzy Hash: 471967089208a7e96bb741da4a9256f994af26ca377f99b530c6d2588dd3f30e
                                                                  • Instruction Fuzzy Hash: 008106EB18C330BDA252D5557B6DAFFABAFE6D77307308426F407D6A42E6D40A891031
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 781 5020aff-5020b06 782 5020acb-5020acf 781->782 783 5020b08-5020b09 781->783 786 5020ae8-5020afa 782->786 784 5020b0b-5020b0d 783->784 785 5020ac9-5020acf 783->785 787 5020b0e-5020ca3 call 5020ba1 call 5020c67 call 5020cb1 784->787 785->786 786->787 811 5020cf6-5020cf7 787->811 812 5020ca5-5020ce2 787->812 813 5020cf9-5020cfa 811->813 814 5020cfe-5020d11 811->814 817 5020cfb-5020cfd 812->817 813->817 819 5020d1c-5020d23 GetCurrentHwProfileW 814->819 817->814 820 5020d39-5020fdf call 5020da8 819->820
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352765037.0000000005020000.00000040.00001000.00020000.00000000.sdmp, Offset: 05020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5020000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ]o[E
                                                                  • API String ID: 0-72463870
                                                                  • Opcode ID: 56924d68ddd99aa7dd661392c639426dd235256592a8e2c946b9b15f5db9ba34
                                                                  • Instruction ID: 1ba8e57dad61137861c8317f0792efcfccdc5afdcacd71e7546b218a33af751d
                                                                  • Opcode Fuzzy Hash: 56924d68ddd99aa7dd661392c639426dd235256592a8e2c946b9b15f5db9ba34
                                                                  • Instruction Fuzzy Hash: 098117EB18D330BDA652D5517B6DAFF66AFE6D7730730842AF407D6A42E2940B891031
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 858 5020ab1-5020ca3 call 5020ba1 call 5020c67 call 5020cb1 884 5020cf6-5020cf7 858->884 885 5020ca5-5020ce2 858->885 886 5020cf9-5020cfa 884->886 887 5020cfe-5020d11 884->887 890 5020cfb-5020cfd 885->890 886->890 892 5020d1c-5020d23 GetCurrentHwProfileW 887->892 890->887 893 5020d39-5020fdf call 5020da8 892->893
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352765037.0000000005020000.00000040.00001000.00020000.00000000.sdmp, Offset: 05020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5020000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ]o[E
                                                                  • API String ID: 0-72463870
                                                                  • Opcode ID: 9a3e73b0ad9655cd3041c43b5fee13904b5aa98fcf785a45134104cc2a108083
                                                                  • Instruction ID: 0b70bd26f1bd638ba1bd8dc5b062134f17fa071739929d02dc68b3f50593613f
                                                                  • Opcode Fuzzy Hash: 9a3e73b0ad9655cd3041c43b5fee13904b5aa98fcf785a45134104cc2a108083
                                                                  • Instruction Fuzzy Hash: FD71F5EB18C330BDA252D5557B6DAFFA6AFE6C77307308426F40BD6A42E2D40B891031
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 931 5020b35-5020ca3 call 5020ba1 call 5020c67 call 5020cb1 949 5020cf6-5020cf7 931->949 950 5020ca5-5020ce2 931->950 951 5020cf9-5020cfa 949->951 952 5020cfe-5020d11 949->952 955 5020cfb-5020cfd 950->955 951->955 957 5020d1c-5020d23 GetCurrentHwProfileW 952->957 955->952 958 5020d39-5020fdf call 5020da8 957->958
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352765037.0000000005020000.00000040.00001000.00020000.00000000.sdmp, Offset: 05020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5020000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ]o[E
                                                                  • API String ID: 0-72463870
                                                                  • Opcode ID: bd561b698a9b9adb2a86eaf20406cadb90a3b46dfac6bb14994e55cd3f23aa56
                                                                  • Instruction ID: 76d286df112f69ecd9b6ff6a34219f5ee9c6bccc3eaec0eadc52d33a712b4177
                                                                  • Opcode Fuzzy Hash: bd561b698a9b9adb2a86eaf20406cadb90a3b46dfac6bb14994e55cd3f23aa56
                                                                  • Instruction Fuzzy Hash: 0571F7FB18C331BEA252D5557B6DAFE67AFE6C7730730842AF407D6A42E2940B891031
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 996 5020b67-5020b7b 998 5020bdc-5020be2 996->998 999 5020b7d 996->999 1000 5020be4 998->1000 1001 5020bee-5020c19 998->1001 1002 5020b88-5020bed call 5020ba1 999->1002 1004 5020be6-5020c19 1000->1004 1005 5020b7e-5020b87 1000->1005 1003 5020c2b-5020ca3 call 5020c67 call 5020cb1 1001->1003 1002->1001 1020 5020cf6-5020cf7 1003->1020 1021 5020ca5-5020ce2 1003->1021 1004->1003 1005->1002 1022 5020cf9-5020cfa 1020->1022 1023 5020cfe-5020d11 1020->1023 1026 5020cfb-5020cfd 1021->1026 1022->1026 1028 5020d1c-5020d23 GetCurrentHwProfileW 1023->1028 1026->1023 1029 5020d39-5020fdf call 5020da8 1028->1029
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352765037.0000000005020000.00000040.00001000.00020000.00000000.sdmp, Offset: 05020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5020000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ]o[E
                                                                  • API String ID: 0-72463870
                                                                  • Opcode ID: ab8af7cc53b3cf55fc972927a5aa53ac61b521a7deb5cfe706c6a84472d1bf56
                                                                  • Instruction ID: 29198ba2c50896c83bba820dbd36faa6ff7077d90ea5d1cd326c2bb1fae8e6d1
                                                                  • Opcode Fuzzy Hash: ab8af7cc53b3cf55fc972927a5aa53ac61b521a7deb5cfe706c6a84472d1bf56
                                                                  • Instruction Fuzzy Hash: F871F7EB18C334BDB652D5557B7DAFFA6AFE6C3730730842AF407D6942E2950A891031
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1067 5020b6f-5020b7b 1068 5020bdc-5020be2 1067->1068 1069 5020b7d 1067->1069 1070 5020be4 1068->1070 1071 5020bee-5020c19 1068->1071 1072 5020b88-5020bed call 5020ba1 1069->1072 1074 5020be6-5020c19 1070->1074 1075 5020b7e-5020b87 1070->1075 1073 5020c2b-5020ca3 call 5020c67 call 5020cb1 1071->1073 1072->1071 1090 5020cf6-5020cf7 1073->1090 1091 5020ca5-5020ce2 1073->1091 1074->1073 1075->1072 1092 5020cf9-5020cfa 1090->1092 1093 5020cfe-5020d11 1090->1093 1096 5020cfb-5020cfd 1091->1096 1092->1096 1098 5020d1c-5020d23 GetCurrentHwProfileW 1093->1098 1096->1093 1099 5020d39-5020fdf call 5020da8 1098->1099
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352765037.0000000005020000.00000040.00001000.00020000.00000000.sdmp, Offset: 05020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5020000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ]o[E
                                                                  • API String ID: 0-72463870
                                                                  • Opcode ID: 86b6b162d304c77de07e1ce710deb57bb31c51d14379dfd26375a4d053715acb
                                                                  • Instruction ID: 3be16544fbab5198a42471952c7614e61693519339da02786445a89bbaaf9394
                                                                  • Opcode Fuzzy Hash: 86b6b162d304c77de07e1ce710deb57bb31c51d14379dfd26375a4d053715acb
                                                                  • Instruction Fuzzy Hash: F261D5EB18C334BDB652D5557B6DAFE66AFE6C27307308426F407D6A42E6940A891031
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352765037.0000000005020000.00000040.00001000.00020000.00000000.sdmp, Offset: 05020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5020000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ]o[E
                                                                  • API String ID: 0-72463870
                                                                  • Opcode ID: 32a1661c0b42caf9a2b069b1973daab1d8df8a639edd199e9e5890080c166083
                                                                  • Instruction ID: 1f4efdea64856c3ff0bcff04920c94e6594eb14c4119ebd7e22af722c145801f
                                                                  • Opcode Fuzzy Hash: 32a1661c0b42caf9a2b069b1973daab1d8df8a639edd199e9e5890080c166083
                                                                  • Instruction Fuzzy Hash: D061D4EB18C334BDB652D5557B6DAFE66AFE6C7730730842AF407D6A42E2D40A891031
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352765037.0000000005020000.00000040.00001000.00020000.00000000.sdmp, Offset: 05020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5020000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID: ]o[E
                                                                  • API String ID: 2104809126-72463870
                                                                  • Opcode ID: 20266aa504d08b7bd239a7b0a9b1961b36daebf50e5aed3c302b40399621fc36
                                                                  • Instruction ID: 698c8fc4f8f7bb2dd3b82dc21a97ce7418de4f58aadad678f34c06da36a003ce
                                                                  • Opcode Fuzzy Hash: 20266aa504d08b7bd239a7b0a9b1961b36daebf50e5aed3c302b40399621fc36
                                                                  • Instruction Fuzzy Hash: 9651C1EB18C334BDB652D5553B6DAFE66AFE6C7730730842AF407D6A42E6D40B892031
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352765037.0000000005020000.00000040.00001000.00020000.00000000.sdmp, Offset: 05020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5020000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ]o[E
                                                                  • API String ID: 0-72463870
                                                                  • Opcode ID: f4b657fac6ad8bc74db6d61102c1e68fab41d84b8213f310b753a51605f58fd4
                                                                  • Instruction ID: c0460c246cf72c47d3090dd28d30c5c440922615307f3e4557d6fde5458aa10c
                                                                  • Opcode Fuzzy Hash: f4b657fac6ad8bc74db6d61102c1e68fab41d84b8213f310b753a51605f58fd4
                                                                  • Instruction Fuzzy Hash: 6451F6EB18C330BDB652D5557B6DAFF66AFE6C3730730842AF40BD6A42E6950A891031
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352765037.0000000005020000.00000040.00001000.00020000.00000000.sdmp, Offset: 05020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5020000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID: ]o[E
                                                                  • API String ID: 2104809126-72463870
                                                                  • Opcode ID: d1fe23c482fda1b7c2191b83c0590838191f41d884cc22cbb4b7f2cf5164679e
                                                                  • Instruction ID: 9ecb524adc284173db7c0dcb7f4950ec6438dfc5afb6e7d79c1a6950e64b3a41
                                                                  • Opcode Fuzzy Hash: d1fe23c482fda1b7c2191b83c0590838191f41d884cc22cbb4b7f2cf5164679e
                                                                  • Instruction Fuzzy Hash: 0151E3FB18C334BDA652D5557B6DAFE66AFE6C2730730842AF407D6A02E2A40A891031
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352765037.0000000005020000.00000040.00001000.00020000.00000000.sdmp, Offset: 05020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5020000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ]o[E
                                                                  • API String ID: 0-72463870
                                                                  • Opcode ID: ee5d8a08fc8ce57fb7c3a23fb2c70d61b75510b86a69ce34d717d2f9286df35b
                                                                  • Instruction ID: e11c809ed93dcdc60f95762fa1fb5860a3084c64ffa8cd9abb9eaa1e962f9cb5
                                                                  • Opcode Fuzzy Hash: ee5d8a08fc8ce57fb7c3a23fb2c70d61b75510b86a69ce34d717d2f9286df35b
                                                                  • Instruction Fuzzy Hash: 3B51C4EB18C334BDB652D5553B6DAFF66AFE6C6730730842AF407D6A02E6940B891031
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352765037.0000000005020000.00000040.00001000.00020000.00000000.sdmp, Offset: 05020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5020000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID: ]o[E
                                                                  • API String ID: 2104809126-72463870
                                                                  • Opcode ID: 7f7fd32a77f9235f30c3f711eb8169098453ace8ac96b5eb618292e7e8cfa0d2
                                                                  • Instruction ID: b6043bbf107a4cd69ac027f9a14f33e36409b525eba8bb366db0426875c5638f
                                                                  • Opcode Fuzzy Hash: 7f7fd32a77f9235f30c3f711eb8169098453ace8ac96b5eb618292e7e8cfa0d2
                                                                  • Instruction Fuzzy Hash: 3F51F5EB18C330BDB652C6553B3D6FF66AFE6C67307308426F40BD6A02E6940B891131
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352765037.0000000005020000.00000040.00001000.00020000.00000000.sdmp, Offset: 05020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5020000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID: ]o[E
                                                                  • API String ID: 2104809126-72463870
                                                                  • Opcode ID: aee59544b197830fd12c4ad3748e9ab715af3003de855a3283c6845c40901f16
                                                                  • Instruction ID: 6eee511c783f863b32bc7c50814d819d8b84eeef032a11317d89c942369c5427
                                                                  • Opcode Fuzzy Hash: aee59544b197830fd12c4ad3748e9ab715af3003de855a3283c6845c40901f16
                                                                  • Instruction Fuzzy Hash: 1B41C5EB18C331BDB652C5657B2D6FF66AFE6C67307308426F40BD6A46E6940B891031
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(00000000), ref: 05020D1E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352765037.0000000005020000.00000040.00001000.00020000.00000000.sdmp, Offset: 05020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5020000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID: ]o[E
                                                                  • API String ID: 2104809126-72463870
                                                                  • Opcode ID: 66b154ecd5cd2ef72c14148201c7a8519db00d7e0e562da56d3196768e7e7917
                                                                  • Instruction ID: fbf6cc06cf993fa6fef3ea4addf56259be233bfda5f76de19ac1bf3836cdab4f
                                                                  • Opcode Fuzzy Hash: 66b154ecd5cd2ef72c14148201c7a8519db00d7e0e562da56d3196768e7e7917
                                                                  • Instruction Fuzzy Hash: 3C41D6EB18D330BDB652C5557B2DAFF66AFE6C67307308426F40BD6A42E6A44B891031
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352765037.0000000005020000.00000040.00001000.00020000.00000000.sdmp, Offset: 05020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5020000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID: ]o[E
                                                                  • API String ID: 2104809126-72463870
                                                                  • Opcode ID: 7b38f5b2910ed75b4a276d727dd1c57d9e022e570a27732292be3717f4ded08f
                                                                  • Instruction ID: 9af1d149a3d306a1a1468bd972c14d7174a5270d7e882bcda7fd690148ac8171
                                                                  • Opcode Fuzzy Hash: 7b38f5b2910ed75b4a276d727dd1c57d9e022e570a27732292be3717f4ded08f
                                                                  • Instruction Fuzzy Hash: 2D41A3EB28C330BDB652C5557B3DAFF66AFE6C67307308426F407D6A42E6940B895031
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(00000000), ref: 05020D1E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352765037.0000000005020000.00000040.00001000.00020000.00000000.sdmp, Offset: 05020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5020000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID: ]o[E
                                                                  • API String ID: 2104809126-72463870
                                                                  • Opcode ID: 44adbf4065764b1c378a61a530ab1fd9204c068229f4e59e9466595f20e65657
                                                                  • Instruction ID: 0e3c3d9c175cc56bded4df023f54621c974d39b1e5e9717f493148cf740ddd18
                                                                  • Opcode Fuzzy Hash: 44adbf4065764b1c378a61a530ab1fd9204c068229f4e59e9466595f20e65657
                                                                  • Instruction Fuzzy Hash: DD41A2EB28D330BDA652C5653B2DAFE66AFE6C67307308426F407D6902E6944B8D5031
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(00000000), ref: 05020D1E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352765037.0000000005020000.00000040.00001000.00020000.00000000.sdmp, Offset: 05020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5020000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID: ]o[E
                                                                  • API String ID: 2104809126-72463870
                                                                  • Opcode ID: 96c9e2cb20ce54f549a71e04ec635d794eaad4179147cf54039e63244d7bddf0
                                                                  • Instruction ID: 4d588f6343860bd66b3b51521e1c923d93a69808bbdc2167b7d7a1eb0c4ff9d8
                                                                  • Opcode Fuzzy Hash: 96c9e2cb20ce54f549a71e04ec635d794eaad4179147cf54039e63244d7bddf0
                                                                  • Instruction Fuzzy Hash: F941B3EB28D330BDB652C5553B2DAFFA66FE6C6730730842AF407D6906E6940B8D5031
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(00000000), ref: 05020D1E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352765037.0000000005020000.00000040.00001000.00020000.00000000.sdmp, Offset: 05020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5020000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID: ]o[E
                                                                  • API String ID: 2104809126-72463870
                                                                  • Opcode ID: c9ae980b4723c22bbd1f5c8e76879316a31f40f298963bfd6bd5c6a68a8d4672
                                                                  • Instruction ID: dbb677ed2dde780f146b8cb37a37ed3a533846be7c8c3a33c3df453e43dbf7a3
                                                                  • Opcode Fuzzy Hash: c9ae980b4723c22bbd1f5c8e76879316a31f40f298963bfd6bd5c6a68a8d4672
                                                                  • Instruction Fuzzy Hash: A3419FEB28D334BDB652C5513B29AFF666FE6C67307308426F407D6906E6940B8D5031
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(00000000), ref: 05020D1E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352765037.0000000005020000.00000040.00001000.00020000.00000000.sdmp, Offset: 05020000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5020000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID: ]o[E
                                                                  • API String ID: 2104809126-72463870
                                                                  • Opcode ID: 83bfde962885c0ab00f9185a994d225c3d2313e9b0583ffb4a05e9a0f78a283a
                                                                  • Instruction ID: bbc51247dee9b26465ed6d73a708a3cefee46da4337a03d92ac67c0cb68aed50
                                                                  • Opcode Fuzzy Hash: 83bfde962885c0ab00f9185a994d225c3d2313e9b0583ffb4a05e9a0f78a283a
                                                                  • Instruction Fuzzy Hash: AB418EEB68C334BDB652C5513B2DAFFA66FE6C6770730842AF807D6906E6944B8D1031
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 002C98FE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: FileWrite
                                                                  • String ID:
                                                                  • API String ID: 3934441357-0
                                                                  • Opcode ID: 1b57b05c6ca9907024b5a08542e5726b78b716b8151125d8897d3d493bc11f44
                                                                  • Instruction ID: 4eda69af3089bbbd55bf88e490d6bcf52a6c3235c73a21c2ef83ef1d03571d9d
                                                                  • Opcode Fuzzy Hash: 1b57b05c6ca9907024b5a08542e5726b78b716b8151125d8897d3d493bc11f44
                                                                  • Instruction Fuzzy Hash: DA61A771C2410AAFDF119FA8CC48FEEBBB9AF45304F14025DE904A7205D772D9A5CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,002C8CD6,00000000,?,003F7178,0000000C,002C8D92,?,?,?), ref: 002C8E45
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: ChangeCloseFindNotification
                                                                  • String ID:
                                                                  • API String ID: 2591292051-0
                                                                  • Opcode ID: 5c0fb2fe7649137a805c62f208b52e10877f14261e3600c62f50df5e21dd0a37
                                                                  • Instruction ID: 81595b79fdd88665014ebb1d688e057918499d83f18ae22e6e6a5574dfbb4274
                                                                  • Opcode Fuzzy Hash: 5c0fb2fe7649137a805c62f208b52e10877f14261e3600c62f50df5e21dd0a37
                                                                  • Instruction Fuzzy Hash: 4D116B336341105ADA253A345C45F7E27898F83734F3A471DFD18A71D2DF71ACA18591
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,002C2616,?,?,?,?,?), ref: 002C2548
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: FilePointer
                                                                  • String ID:
                                                                  • API String ID: 973152223-0
                                                                  • Opcode ID: 1a6d5f3a877128eed20d7a18630c0adaa404b7b65eca2e5626488daf7b290933
                                                                  • Instruction ID: ec415c30eff59f170f1b0e3c052981403571fa7ef76a6a1537dcab838df0689e
                                                                  • Opcode Fuzzy Hash: 1a6d5f3a877128eed20d7a18630c0adaa404b7b65eca2e5626488daf7b290933
                                                                  • Instruction Fuzzy Hash: CF01D633620516AFDF099F59DC15E9F3B5ADB85364F64030CF8109B291EAB1ED628B90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0028331F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: Concurrency::cancel_current_task
                                                                  • String ID:
                                                                  • API String ID: 118556049-0
                                                                  • Opcode ID: 88e0f75f83d5f9e69285ef2088a1dfdc1055322beeb667a90db4e8c6ac7f301f
                                                                  • Instruction ID: 8d5f722a1627692d8c2683bb14f4e8f888b76b9a64e0d69e7a804d08e94686fe
                                                                  • Opcode Fuzzy Hash: 88e0f75f83d5f9e69285ef2088a1dfdc1055322beeb667a90db4e8c6ac7f301f
                                                                  • Instruction Fuzzy Hash: 61F090765221059ACB18BF64D4159E9B3ECEE143A171009BAE88DC7292EB36DA648BD0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • RtlAllocateHeap.NTDLL(00000008,?,00000001,?,002C9FD2,00000001,00000364,00000001,00000006,000000FF,?,002B4B2F,?,?,761B23A0,?), ref: 002CA68D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1279760036-0
                                                                  • Opcode ID: fde05a53ad4b15ab0815d794262015bb9018f6d34496a34f5edbdd6277d99b11
                                                                  • Instruction ID: 987d3b43c7dc40c3201f1d8ee22da506abf44804f4ccdaab986c3578a747be6d
                                                                  • Opcode Fuzzy Hash: fde05a53ad4b15ab0815d794262015bb9018f6d34496a34f5edbdd6277d99b11
                                                                  • Instruction Fuzzy Hash: 1CF0E03217052A56DF225E729C05F5A374D6F41774B3D4319EC05A6150DA30DC308AE7
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • RtlAllocateHeap.NTDLL(00000000,00000001,?,?,002B4B2F,?,?,761B23A0,?,?,00283522,?,?), ref: 002CB0B9
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1279760036-0
                                                                  • Opcode ID: c2de51053fdc4060ae0c76885b8387baeefa50bb8c367098521a84b44c8054eb
                                                                  • Instruction ID: 1094116d2f378a23b9878d9caf437fecf7964cf7a0fef39b2313177dec7f2ea8
                                                                  • Opcode Fuzzy Hash: c2de51053fdc4060ae0c76885b8387baeefa50bb8c367098521a84b44c8054eb
                                                                  • Instruction Fuzzy Hash: 57E065311706626AEA332B755C02F5F66499F423A1F150329FD25A70C2DB60DC7485E6
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352828127.0000000005030000.00000040.00001000.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5030000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b3ba3ab421257f2683ead65058a0a58019f8363fafcead79451c27c25d3f48ef
                                                                  • Instruction ID: ca78c99c8278a71dd6c35f231b384c8f50860f1a193686576a734ce2a4b7f5fc
                                                                  • Opcode Fuzzy Hash: b3ba3ab421257f2683ead65058a0a58019f8363fafcead79451c27c25d3f48ef
                                                                  • Instruction Fuzzy Hash: FF2192EB54E150AEF342C1423B7EAFE6B2EF1DA630334843BF442D5A06E2890B4D5132
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352828127.0000000005030000.00000040.00001000.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5030000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 667f7a069aeaf00d36e9eb3c3a6b29759f2334420f6902de0c2ce99f88b62403
                                                                  • Instruction ID: ef1d282009123fce9bc114157699a90c49fe76e683a4fe0ff47898cd1361f06b
                                                                  • Opcode Fuzzy Hash: 667f7a069aeaf00d36e9eb3c3a6b29759f2334420f6902de0c2ce99f88b62403
                                                                  • Instruction Fuzzy Hash: E12171EB54E150BEE352C1423B7FAFE6B6EF1DA630334842BF403D590AE2890A4E5131
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352828127.0000000005030000.00000040.00001000.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5030000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4f645def5621bee986644655b2116ed16030399117e5c460947aace6ffd846ea
                                                                  • Instruction ID: 0f5e3d530423c0fff46893300dbea9439fa867823dfa042ccd19014234d58244
                                                                  • Opcode Fuzzy Hash: 4f645def5621bee986644655b2116ed16030399117e5c460947aace6ffd846ea
                                                                  • Instruction Fuzzy Hash: 4411FCEB54A110AEF242D1477B7EAFF576FE1D67343308536F407D5A06A28806495135
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352828127.0000000005030000.00000040.00001000.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5030000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a7c3b1a149e181d74bec7f41db9b2754d6982d2ab246866832f06d3b2124f506
                                                                  • Instruction ID: e4a8f8dad2785d3e834a1065940480e562f6e31829c15b0acc2c57f7ce4f9761
                                                                  • Opcode Fuzzy Hash: a7c3b1a149e181d74bec7f41db9b2754d6982d2ab246866832f06d3b2124f506
                                                                  • Instruction Fuzzy Hash: 6511B9EB58E120BDF242D1477B7EAFF5A6FE1D6630331843BF407D4A0AA2880B596135
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352828127.0000000005030000.00000040.00001000.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5030000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 76f3a2f016250f1304c40f41a3c3e700a68d9de3f4aa0072dfb3423b5300e37b
                                                                  • Instruction ID: 8c383ddb76c298c03896c5c1410292e9a9cd9cbe487389bfb30dd8de5be3d514
                                                                  • Opcode Fuzzy Hash: 76f3a2f016250f1304c40f41a3c3e700a68d9de3f4aa0072dfb3423b5300e37b
                                                                  • Instruction Fuzzy Hash: 7411AAEB54E110BDF242D1477B7EAFF5B6FE1E6630331842BF407D4A0AA2980B495135
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352828127.0000000005030000.00000040.00001000.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5030000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 259de822b3edaa15a36d1709850e5651b694618cb65c9a742a84525eb1dc7a41
                                                                  • Instruction ID: 149563fd35a36c42265429b1b479d43b4a10af60c1aed7d97a37dd85ae50214b
                                                                  • Opcode Fuzzy Hash: 259de822b3edaa15a36d1709850e5651b694618cb65c9a742a84525eb1dc7a41
                                                                  • Instruction Fuzzy Hash: 3E110AEB14E110BDF242D5473B7EAFF9B2FE1E6630331852BF407D0A0AA2880B492135
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352828127.0000000005030000.00000040.00001000.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5030000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: da7fd358a991dde7c4f5bc274d2e6b78ea42732962c15ef0b5b049180605af67
                                                                  • Instruction ID: bae12f52ad5d381c8ce1cbe98daf24b37d6d1cf1309e96ffb519473e83754507
                                                                  • Opcode Fuzzy Hash: da7fd358a991dde7c4f5bc274d2e6b78ea42732962c15ef0b5b049180605af67
                                                                  • Instruction Fuzzy Hash: 97011E9A58F220AEE342C053777FAFF6A1FA1D62303304427F047D4A1AA28806495135
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3352828127.0000000005030000.00000040.00001000.00020000.00000000.sdmp, Offset: 05030000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_5030000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4b50fdc5187e6acd3c0b5063ebef353c11ee8768033d4b5fd867d9c600921f40
                                                                  • Instruction ID: e114fcb2025cf14b5250e67aa776fdd59cc4cb79e89e30e7d21ba03a21242ba1
                                                                  • Opcode Fuzzy Hash: 4b50fdc5187e6acd3c0b5063ebef353c11ee8768033d4b5fd867d9c600921f40
                                                                  • Instruction Fuzzy Hash: 4F016DEB58E210AEE251D0473B7FBFF6B2FA2D67303308536F407D4A0AA29846891135
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: __floor_pentium4
                                                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                  • API String ID: 4168288129-2761157908
                                                                  • Opcode ID: 1ee5cb320022b006097ba24bc950d5cc53934a106b8e26c44597d3252ee7982d
                                                                  • Instruction ID: ad040cb4e450824a3ec6cd1fbd47adec060c45a0b36856d47647c99ab19be3f4
                                                                  • Opcode Fuzzy Hash: 1ee5cb320022b006097ba24bc950d5cc53934a106b8e26c44597d3252ee7982d
                                                                  • Instruction Fuzzy Hash: 04D23871E286298FDB65CE28DC447EAB7B5EB44305F1441EBD40DE7240EBB8AE918F41
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d832fe2a0f42001a57c9b2c34ab75cd1b9a187cae735d2738bff895b2773b599
                                                                  • Instruction ID: 6d9f64699db35a5d709955e1054630f09c80c6ad13a571fa69b28b10230d3a61
                                                                  • Opcode Fuzzy Hash: d832fe2a0f42001a57c9b2c34ab75cd1b9a187cae735d2738bff895b2773b599
                                                                  • Instruction Fuzzy Hash: E9024A75E1021A9BDF14CFA8C8806EEFBB5FF48354F24826AE919E7341D731A951CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetSystemTimePreciseAsFileTime.KERNEL32(?,002B3067,?,?,?,?,003451DF), ref: 002B3645
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: Time$FilePreciseSystem
                                                                  • String ID: `-(
                                                                  • API String ID: 1802150274-2718556199
                                                                  • Opcode ID: 2f065f1dba1aeff056f7bae12f8a5ab869a90a6483fd8866dd0b8e78287449d0
                                                                  • Instruction ID: 2556395afc15c4f0fab4571e82972fab8d1e2a1a9937613f6cb5cffc55c86373
                                                                  • Opcode Fuzzy Hash: 2f065f1dba1aeff056f7bae12f8a5ab869a90a6483fd8866dd0b8e78287449d0
                                                                  • Instruction Fuzzy Hash: 1DF0A072954A64EFCB028F54ED00B9AB7A9E708B60F00412AE812A3380CB74A9008B84
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 690fff19cae11bde70d7cac225175747591ec89f021af3f2a4867c014ffe7925
                                                                  • Instruction ID: be6223f40796075db0f0e9048445d0476cbfeff21b2d8edd95e34a9580f7fb89
                                                                  • Opcode Fuzzy Hash: 690fff19cae11bde70d7cac225175747591ec89f021af3f2a4867c014ffe7925
                                                                  • Instruction Fuzzy Hash: 1F627DB1E00245DBDB2ACF59C1846AEBBF1AF49304F25C1A9D958AB342C379D946CF90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c2deecbe3ee60a011d5856fdee5848cba5150375c33bcb85bf53e5887f2a007a
                                                                  • Instruction ID: db33884100ef429bbb2b1f8c07f5f93b64bfc258d5db8ab8b3fcac5e89aa4f7d
                                                                  • Opcode Fuzzy Hash: c2deecbe3ee60a011d5856fdee5848cba5150375c33bcb85bf53e5887f2a007a
                                                                  • Instruction Fuzzy Hash: 92E11372E2122A9FCB05CFA8C9816ADFBF1FF89310F1942A9D815B7340D674AD55CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: eff80ae3ed7b9b33536ecd7c96537dbae06d2a19d1f2da790e03b52f42df09ed
                                                                  • Instruction ID: d38de2a00e97f4ab371ac73d76f11d7f5efdea5e27f690bd2d777a250b37a24f
                                                                  • Opcode Fuzzy Hash: eff80ae3ed7b9b33536ecd7c96537dbae06d2a19d1f2da790e03b52f42df09ed
                                                                  • Instruction Fuzzy Hash: 13C1C77092064BCFCB38CE68C4C4FAABBA5AB45300F24471DDA9A97692C370A965CF50
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ddc2051830bf6674c63d767e75128be2bbc928b4c7c861e1ba1602f74144c581
                                                                  • Instruction ID: c545c2d8e6560d6dfba9b773582f1dc2511d62987d1792fd0f74639f774764e1
                                                                  • Opcode Fuzzy Hash: ddc2051830bf6674c63d767e75128be2bbc928b4c7c861e1ba1602f74144c581
                                                                  • Instruction Fuzzy Hash: 6FB11E325206099FD719CF28C486F657BE0FF45364F25866DE89ACF2A1C375E9A1CB40
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 34b160d844c0b78d5481140c498d4975edf5715b823a6c793699a04c6bcbd980
                                                                  • Instruction ID: 07fea855b740f73d0be71ea0a9445bdfccdb667acc09cb01d26627447a8c1e57
                                                                  • Opcode Fuzzy Hash: 34b160d844c0b78d5481140c498d4975edf5715b823a6c793699a04c6bcbd980
                                                                  • Instruction Fuzzy Hash: AA8113B0D202469FDB15DF68D9817FEBBB5EB1A300F1401AAD855A7382CB359D19CBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fa84d5402d9434341112bd7b80800dffdf85b9f8f9c5775b187ba39a5730a205
                                                                  • Instruction ID: 8b8d04e723e618ab16e607af0a81c606155c81704992adc42eae6bd79dac6363
                                                                  • Opcode Fuzzy Hash: fa84d5402d9434341112bd7b80800dffdf85b9f8f9c5775b187ba39a5730a205
                                                                  • Instruction Fuzzy Hash: 6A6143316201A44FEB29CF1EFDD44363B66A38E3117858729EA81CF2D5C635E926D7E0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 46680d0314554fd398ed7fd020ff60bee8df1d437ae882661bd78aeb1168d151
                                                                  • Instruction ID: 5a80e53f456e4af0e1563eee03b3dbf6c93c562ceac95ba29e1f375cf2af8ef3
                                                                  • Opcode Fuzzy Hash: 46680d0314554fd398ed7fd020ff60bee8df1d437ae882661bd78aeb1168d151
                                                                  • Instruction Fuzzy Hash: F6518D72D1021AEFDF14CF98C941AEEBBB2FF88340F198459E915AB201D734AE50DB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                  • Instruction ID: 92ec3a190daff4e1f2ddc577f546d5836f77e5b3aa2c8405e81b9963649bb179
                                                                  • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                  • Instruction Fuzzy Hash: 1F117D7723808343D6148E3DDCB46F7A7A5EBC53A0B2D837AD4864BB44D162E970EA10
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0029A09D
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0029A0BF
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0029A0E7
                                                                  • __Getctype.LIBCPMT ref: 0029A1C5
                                                                  • std::_Facet_Register.LIBCPMT ref: 0029A1F9
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0029A223
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                                                  • String ID: PD($PG($E(
                                                                  • API String ID: 1102183713-3837786662
                                                                  • Opcode ID: 7cc412a25d1e361999d2f0144c5a5169a95b2ff29f2ad980f8e2fe0ad5f89506
                                                                  • Instruction ID: 90a29f69e988ff8fa7a8172a1b2a523f5472d8192f0fc04de7f5268bcda54637
                                                                  • Opcode Fuzzy Hash: 7cc412a25d1e361999d2f0144c5a5169a95b2ff29f2ad980f8e2fe0ad5f89506
                                                                  • Instruction Fuzzy Hash: A85188B1D11749CBCB11DF58C94579EBBB4EB00314F148259D845AB381D774AA54CFD2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • _ValidateLocalCookies.LIBCMT ref: 002B72F7
                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 002B72FF
                                                                  • _ValidateLocalCookies.LIBCMT ref: 002B7388
                                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 002B73B3
                                                                  • _ValidateLocalCookies.LIBCMT ref: 002B7408
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                  • String ID: `-($csm$W+
                                                                  • API String ID: 1170836740-2085452324
                                                                  • Opcode ID: 7323e3feaebb3fd741e87507acb111bbe175d95f074ae6bff21b33988357e8b4
                                                                  • Instruction ID: c8f8da5b47a60e46a737a66261cfbf2c14a02545d7995256ff5a7d1dc7395eeb
                                                                  • Opcode Fuzzy Hash: 7323e3feaebb3fd741e87507acb111bbe175d95f074ae6bff21b33988357e8b4
                                                                  • Instruction Fuzzy Hash: 2641D434A2420A9BCF10DF68C884ADEBBF5AF84354F148196ED189B392D771E921DF91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0029C45A
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0029C47C
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0029C4A4
                                                                  • std::_Facet_Register.LIBCPMT ref: 0029C59A
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0029C5C4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                                  • String ID: E($PD(
                                                                  • API String ID: 459529453-515452378
                                                                  • Opcode ID: 2ae59970e8fb3bc1ad59714c4c5f1fd8210a29d919684adaa5662deca0baca4a
                                                                  • Instruction ID: a1192b2601c4265fec2a57d40b86a2276e8da42f112f2e639f3ed54df40ee670
                                                                  • Opcode Fuzzy Hash: 2ae59970e8fb3bc1ad59714c4c5f1fd8210a29d919684adaa5662deca0baca4a
                                                                  • Instruction Fuzzy Hash: 4551DDB1910245DBDF11EF58C944BAEBBF4FB00314F248199E845AB381D7B5AA14CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: _strrchr
                                                                  • String ID:
                                                                  • API String ID: 3213747228-0
                                                                  • Opcode ID: 88e4da6258101c5fc24b34185784eb547dfa0330ad300027970d950eece25734
                                                                  • Instruction ID: c76f8f1658383787365a932078c73a75a43320c08d240083600c40feb2585a69
                                                                  • Opcode Fuzzy Hash: 88e4da6258101c5fc24b34185784eb547dfa0330ad300027970d950eece25734
                                                                  • Instruction Fuzzy Hash: A0B147329203569FDB128F68CC83FEE7BA5EF55710F14425AE905AF282D7749D21CBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 002B2720
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 002B272B
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 002B2799
                                                                    • Part of subcall function 002B287C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 002B2894
                                                                  • std::locale::_Setgloballocale.LIBCPMT ref: 002B2746
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                                                  • String ID: `-(
                                                                  • API String ID: 677527491-2718556199
                                                                  • Opcode ID: 0755426444010a2dbd867aa9bd402cc8e6b5a78d55433f12be157a81fe968f5b
                                                                  • Instruction ID: f1231f0864a78fc870b93347b4b2be71b59535cd042a57bdd47321889664b37a
                                                                  • Opcode Fuzzy Hash: 0755426444010a2dbd867aa9bd402cc8e6b5a78d55433f12be157a81fe968f5b
                                                                  • Instruction Fuzzy Hash: 0501BC39A10624DBCB06EB20D9459BEB7B1FF84790B084019E80167391CF74AE26DFC9
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 0028750C
                                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00287522
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: ___std_exception_destroy
                                                                  • String ID: )($[json.exception.
                                                                  • API String ID: 4194217158-969352199
                                                                  • Opcode ID: 94e48d9748d52b1fd1b4b7e1c9da28fec416643cd57367806c554680978b73b9
                                                                  • Instruction ID: d3207bcef46f40d32ea8b575a349446069101cf75722d734473247b88109d076
                                                                  • Opcode Fuzzy Hash: 94e48d9748d52b1fd1b4b7e1c9da28fec416643cd57367806c554680978b73b9
                                                                  • Instruction Fuzzy Hash: 9651D0B1C15748DFDB01EFA8C905B9EBBB4EF15314F144269E850A72C2E7B85A44CBE1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0028499F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: Ios_base_dtorstd::ios_base::_
                                                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                  • API String ID: 323602529-1866435925
                                                                  • Opcode ID: 0479399a05964987ccad0aa7b0229fe8ad08cf473082da2b2619c2adabbf40b8
                                                                  • Instruction ID: 262eaf7a9613330dbbdc42d77cfd2fa0e2aefe29321c2fdcb09d74097e59a528
                                                                  • Opcode Fuzzy Hash: 0479399a05964987ccad0aa7b0229fe8ad08cf473082da2b2619c2adabbf40b8
                                                                  • Instruction Fuzzy Hash: 5F115C769246956BC721FF5CCC02FA7738CD700710F044629FE58872C1EB749920CB92
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00283819
                                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 002838F0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: ___std_exception_copy___std_exception_destroy
                                                                  • String ID: )(
                                                                  • API String ID: 2970364248-3070208227
                                                                  • Opcode ID: 29abb5c0319fd7a884b40f4a0b2bd8ae44cbee7ead2e679362329c77a9e491d9
                                                                  • Instruction ID: 090d2c0b7e41fc36d948f95e860a0b1eb811547343405dd33349bb18e8972e50
                                                                  • Opcode Fuzzy Hash: 29abb5c0319fd7a884b40f4a0b2bd8ae44cbee7ead2e679362329c77a9e491d9
                                                                  • Instruction Fuzzy Hash: 5A6188B1C01248DFDB01DF98C948B9DFBB4FF19720F14825AE854AB282D7B55A54CBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0028499F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: Ios_base_dtorstd::ios_base::_
                                                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                                                  • API String ID: 323602529-1240500531
                                                                  • Opcode ID: 62be972b4652b0ce603318f7bc4f7f0bc936cbb96095d795413fe79d40291959
                                                                  • Instruction ID: b91ecf628314e497cd24b78f7453190087f12d001f8edfe90b149ff930b4baae
                                                                  • Opcode Fuzzy Hash: 62be972b4652b0ce603318f7bc4f7f0bc936cbb96095d795413fe79d40291959
                                                                  • Instruction Fuzzy Hash: 384133B5C21649AFCB04EF58CD45BAEBBB8EB05710F24821DF514AB3C1D7759A10CBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00284061
                                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 002840C4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                                  • String ID: bad locale name
                                                                  • API String ID: 3988782225-1405518554
                                                                  • Opcode ID: 654fabdf89c9d551c2752838d911c01d9722d524f9dba29e71d70eb7da46a118
                                                                  • Instruction ID: 1c6a3e1cd1e8d538b9cfbc0bbe43b6e9ba0e35c8366254cb249ff248917825ed
                                                                  • Opcode Fuzzy Hash: 654fabdf89c9d551c2752838d911c01d9722d524f9dba29e71d70eb7da46a118
                                                                  • Instruction Fuzzy Hash: 7211D370805BC4DED321CF68C50478BBFF4AF15714F14868DE09597B81D3B9AA08CBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002965C9
                                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 002965FC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: ___std_exception_copy
                                                                  • String ID: )(
                                                                  • API String ID: 2659868963-3070208227
                                                                  • Opcode ID: 2d94d029d06c05f60753f51a7c0bf5b82c3f36310ff2fa5245fa50d3fbb4bf8f
                                                                  • Instruction ID: a0a821e54ac8442c7ea4a7e0c14bf8189deb21c33d0e0e57232f9897cb9c31b0
                                                                  • Opcode Fuzzy Hash: 2d94d029d06c05f60753f51a7c0bf5b82c3f36310ff2fa5245fa50d3fbb4bf8f
                                                                  • Instruction Fuzzy Hash: 87115EB6900648EBCB01DF99D980B86F7F8FF0A720F10876AE91497741E774A540CBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00287A5C
                                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00287A72
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.3338326862.0000000000281000.00000040.00000001.01000000.00000003.sdmp, Offset: 00280000, based on PE: true
                                                                  • Associated: 00000000.00000002.3337979999.0000000000280000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3338326862.0000000000402000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339409472.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000414000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000596000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.0000000000662000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.000000000069E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006A7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3339682785.00000000006B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340418581.00000000006B6000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340757491.000000000083E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.000000000083F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000844000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340798675.0000000000847000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3340911744.000000000084A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.3341142745.000000000084B000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_280000_hYrJbjnzVc.jbxd
                                                                  Similarity
                                                                  • API ID: ___std_exception_destroy
                                                                  • String ID: )(
                                                                  • API String ID: 4194217158-3070208227
                                                                  • Opcode ID: 1b14407632b6f9e701efd16555413caaeb6519270da299ec1e59752315e7fd9e
                                                                  • Instruction ID: 96c0fca2b15f296d66e42c3dcc325e822e8adae585b9ac70311c276584f61e1c
                                                                  • Opcode Fuzzy Hash: 1b14407632b6f9e701efd16555413caaeb6519270da299ec1e59752315e7fd9e
                                                                  • Instruction Fuzzy Hash: ADF062B1C05748DFC711DF98D90178DFBF8EB06724F50065AE454A3781D7B556048B92
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Execution Graph

                                                                  Execution Coverage:3.1%
                                                                  Dynamic/Decrypted Code Coverage:2.3%
                                                                  Signature Coverage:0%
                                                                  Total number of Nodes:1811
                                                                  Total number of Limit Nodes:28
                                                                  execution_graph 19569 4c407c5 19572 4c407ce 19569->19572 19573 4c407dd 19572->19573 19574 4c409c0 2 API calls 19573->19574 19575 4c409bd 19573->19575 19574->19573 19576 4c40a66 GetCurrentHwProfileW 19575->19576 19577 4c40a5e GetCurrentHwProfileW 19576->19577 19579 4c40b0e 19577->19579 19424 4c40a80 19425 4c40a99 GetCurrentHwProfileW 19424->19425 19427 4c40b0e 19425->19427 19336 4c408c1 19337 4c408b1 19336->19337 19339 4c409bd 19337->19339 19344 4c409c0 19337->19344 19350 4c40a66 19339->19350 19345 4c40a02 19344->19345 19346 4c40a66 GetCurrentHwProfileW 19345->19346 19347 4c40a5e GetCurrentHwProfileW 19346->19347 19349 4c40b0e 19347->19349 19351 4c40a77 GetCurrentHwProfileW 19350->19351 19353 4c40b0e 19351->19353 19580 4c407d3 19581 4c407da 19580->19581 19582 4c409c0 2 API calls 19581->19582 19583 4c409bd 19581->19583 19582->19581 19584 4c40a66 GetCurrentHwProfileW 19583->19584 19585 4c40a5e GetCurrentHwProfileW 19584->19585 19587 4c40b0e 19585->19587 19656 d547b0 19657 d548ed 19656->19657 19658 d547ed 19656->19658 19659 d33330 2 API calls 19657->19659 19663 d54a30 2 API calls 19658->19663 19660 d548f2 19659->19660 19661 d54a23 19660->19661 19662 d5493d 19660->19662 19664 d33330 2 API calls 19661->19664 19666 d54a30 2 API calls 19662->19666 19669 d54827 19663->19669 19665 d54a28 19664->19665 19667 d54977 19666->19667 19675 d43d50 19667->19675 19670 d4e1e0 RtlAllocateHeap 19669->19670 19671 d548b4 19670->19671 19672 d5499f 19673 d4e1e0 RtlAllocateHeap 19672->19673 19674 d549ea 19673->19674 19676 d43d8f 19675->19676 19698 d43df7 std::_Locinfo::_Locinfo_ctor 19675->19698 19677 d43d96 19676->19677 19678 d43f7d 19676->19678 19679 d43f1e 19676->19679 19680 d43e69 19676->19680 19676->19698 19683 d63662 std::_Facet_Register 2 API calls 19677->19683 19684 d63662 std::_Facet_Register 2 API calls 19678->19684 19747 d47e80 19679->19747 19682 d63662 std::_Facet_Register 2 API calls 19680->19682 19685 d43e73 19682->19685 19686 d43da0 19683->19686 19688 d43f8a 19684->19688 19685->19698 19708 d5bf20 19685->19708 19687 d63662 std::_Facet_Register 2 API calls 19686->19687 19690 d43dd2 19687->19690 19691 d43fd3 19688->19691 19692 d4408e 19688->19692 19688->19698 19735 d5f450 19690->19735 19695 d44004 19691->19695 19696 d43fdb 19691->19696 19694 d33330 2 API calls 19692->19694 19699 d44093 19694->19699 19697 d63662 std::_Facet_Register 2 API calls 19695->19697 19696->19699 19700 d43fe6 19696->19700 19697->19698 19698->19672 19701 d32b50 Concurrency::cancel_current_task 2 API calls 19699->19701 19702 d63662 std::_Facet_Register 2 API calls 19700->19702 19704 d43fec 19701->19704 19702->19704 19703 d43d50 6 API calls 19705 d43eb1 19703->19705 19704->19698 19706 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 19704->19706 19705->19698 19705->19703 19707 d4409d 19706->19707 19709 d5bf32 19708->19709 19710 d5bf9b 19708->19710 19712 d5bf3d 19709->19712 19713 d5bf6c 19709->19713 19711 d33330 2 API calls 19710->19711 19715 d5bfa0 19711->19715 19712->19715 19716 d5bf44 19712->19716 19714 d5bf89 19713->19714 19717 d63662 std::_Facet_Register 2 API calls 19713->19717 19714->19705 19718 d32b50 Concurrency::cancel_current_task 2 API calls 19715->19718 19719 d63662 std::_Facet_Register 2 API calls 19716->19719 19720 d5bf76 19717->19720 19721 d5bf4a 19718->19721 19719->19721 19720->19705 19722 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 19721->19722 19723 d5bf53 19721->19723 19724 d5bfaa 19722->19724 19723->19705 19725 d5c067 19724->19725 19726 d5bffc 19724->19726 19730 d5c003 std::_Locinfo::_Locinfo_ctor 19724->19730 19727 d33330 2 API calls 19725->19727 19752 d4fab0 19726->19752 19729 d5c06c 19727->19729 19731 d63662 std::_Facet_Register 2 API calls 19729->19731 19730->19705 19732 d5c09e 19731->19732 19733 d33040 std::_Throw_Cpp_error 2 API calls 19732->19733 19734 d5c0e2 19733->19734 19734->19705 19736 d5f488 19735->19736 19746 d5f52f 19735->19746 19737 d63662 std::_Facet_Register 2 API calls 19736->19737 19738 d5f4aa 19737->19738 19739 d463b0 std::_Throw_Cpp_error 2 API calls 19738->19739 19740 d5f4c0 19739->19740 19741 d43d50 6 API calls 19740->19741 19742 d5f4d0 19741->19742 19743 d5f450 6 API calls 19742->19743 19744 d5f521 19743->19744 19745 d5f450 6 API calls 19744->19745 19745->19746 19746->19698 19748 d63662 std::_Facet_Register 2 API calls 19747->19748 19749 d47ea6 19748->19749 19750 d463b0 std::_Throw_Cpp_error 2 API calls 19749->19750 19751 d47ec5 19750->19751 19751->19698 19753 d4fac2 19752->19753 19754 d4fb2b 19752->19754 19756 d4fafc 19753->19756 19757 d4facd 19753->19757 19755 d32b50 Concurrency::cancel_current_task 2 API calls 19754->19755 19759 d4fada 19755->19759 19758 d4fb19 19756->19758 19762 d63662 std::_Facet_Register 2 API calls 19756->19762 19757->19754 19760 d4fad4 19757->19760 19758->19730 19763 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 19759->19763 19765 d4fae3 19759->19765 19761 d63662 std::_Facet_Register 2 API calls 19760->19761 19761->19759 19764 d4fb06 19762->19764 19766 d4fb35 19763->19766 19764->19730 19765->19730 19768 d4fb5b std::locale::_Setgloballocale 19766->19768 19770 d59c70 19766->19770 19768->19730 19769 d4fb7f 19769->19730 19771 d59dc4 19770->19771 19776 d59ca2 19770->19776 19772 d33330 2 API calls 19771->19772 19785 d59d04 std::_Locinfo::_Locinfo_ctor 19772->19785 19773 d59dbf 19774 d32b50 Concurrency::cancel_current_task 2 API calls 19773->19774 19774->19771 19775 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 19777 d59dce 19775->19777 19776->19773 19778 d59cf3 19776->19778 19780 d59d1d 19776->19780 19787 d49950 19777->19787 19778->19773 19779 d59cfe 19778->19779 19782 d63662 std::_Facet_Register 2 API calls 19779->19782 19783 d63662 std::_Facet_Register 2 API calls 19780->19783 19780->19785 19782->19785 19783->19785 19784 d59dd9 std::_Throw_Cpp_error 19785->19775 19786 d59d8f std::ios_base::_Ios_base_dtor 19785->19786 19786->19769 19788 d49968 19787->19788 19789 d49978 std::ios_base::_Ios_base_dtor 19787->19789 19788->19789 19790 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 19788->19790 19789->19784 19791 d4998d 19790->19791 19792 d49a4f 19791->19792 19799 d62b64 19791->19799 19792->19784 19798 d49a04 19798->19784 19800 d62ae7 19799->19800 19803 d499cc 19800->19803 19821 d69805 19800->19821 19802 d62b33 19802->19803 19835 d6d5e6 19802->19835 19803->19792 19807 d483b0 19803->19807 19806 d6d098 5 API calls 19806->19803 19808 d48463 19807->19808 19809 d4843c 19807->19809 19811 d4c430 19808->19811 19861 d711fa 19809->19861 19813 d4c45f std::_Throw_Cpp_error std::_Lockit::~_Lockit std::_Lockit::_Lockit 19811->19813 19812 d4c4f8 std::_Lockit::~_Lockit 19812->19798 19813->19812 19814 d63662 std::_Facet_Register 2 API calls 19813->19814 19815 d4c506 19814->19815 19816 d34040 std::_Throw_Cpp_error 3 API calls 19815->19816 19817 d4c536 19816->19817 19818 d34100 std::_Throw_Cpp_error 2 API calls 19817->19818 19819 d4c592 19818->19819 19820 d626e7 std::_Facet_Register 2 API calls 19819->19820 19820->19812 19822 d6974e std::locale::_Setgloballocale 19821->19822 19823 d69761 19822->19823 19826 d69781 19822->19826 19824 d716ef ___std_exception_copy RtlAllocateHeap 19823->19824 19825 d69766 19824->19825 19827 d68c50 ___std_exception_copy RtlAllocateHeap 19825->19827 19828 d69786 19826->19828 19829 d69793 19826->19829 19834 d69771 19827->19834 19831 d716ef ___std_exception_copy RtlAllocateHeap 19828->19831 19830 d7a8e1 RtlAllocateHeap 19829->19830 19832 d6979c 19830->19832 19831->19834 19833 d716ef ___std_exception_copy RtlAllocateHeap 19832->19833 19832->19834 19833->19834 19834->19802 19836 d6d5f9 ___std_exception_copy 19835->19836 19841 d6d33d 19836->19841 19838 d6d60e 19839 d6898c ___std_exception_copy RtlAllocateHeap 19838->19839 19840 d62b4e 19839->19840 19840->19803 19840->19806 19843 d6d349 std::locale::_Setgloballocale 19841->19843 19842 d6d34f 19844 d68bd3 ___std_exception_copy RtlAllocateHeap 19842->19844 19843->19842 19846 d6d392 19843->19846 19845 d6d36a 19844->19845 19845->19838 19848 d6d4c0 19846->19848 19849 d6d4e6 19848->19849 19850 d6d4d3 19848->19850 19857 d6d3e7 19849->19857 19850->19845 19852 d6d509 19853 d69a81 4 API calls 19852->19853 19856 d6d597 19852->19856 19854 d6d537 19853->19854 19855 d7262d 2 API calls 19854->19855 19855->19856 19856->19845 19858 d6d3f8 19857->19858 19859 d6d450 19857->19859 19858->19859 19860 d725ed SetFilePointerEx RtlAllocateHeap 19858->19860 19859->19852 19860->19859 19862 d71206 19861->19862 19863 d7121b 19861->19863 19864 d716ef ___std_exception_copy RtlAllocateHeap 19862->19864 19863->19808 19865 d7120b 19864->19865 19866 d68c50 ___std_exception_copy RtlAllocateHeap 19865->19866 19867 d71216 19866->19867 19867->19808 17465 4c40aed GetCurrentHwProfileW 17466 4c40b0e 17465->17466 19455 4c40aaa 19456 4c40a55 19455->19456 19459 4c40a5e GetCurrentHwProfileW 19455->19459 19457 4c40a66 GetCurrentHwProfileW 19456->19457 19457->19459 19460 4c40b0e 19459->19460 17467 df4eb0 17468 df527c 17467->17468 17483 df4eee std::ios_base::_Ios_base_dtor __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 17467->17483 17469 df4f37 setsockopt recv 17469->17483 17471 df5267 Sleep 17471->17468 17471->17483 17472 df51c5 recv 17474 df525f Sleep 17472->17474 17474->17471 17476 df4fdd recv 17477 df4ffe recv 17476->17477 17476->17483 17477->17483 17479 df5291 17576 d68c60 17479->17576 17481 df5086 setsockopt recv 17481->17483 17482 d48dc0 2 API calls 17482->17481 17483->17468 17483->17469 17483->17471 17483->17472 17483->17474 17483->17479 17483->17481 17483->17482 17487 df5940 WSAStartup 17483->17487 17493 d48dc0 17483->17493 17502 d463b0 17483->17502 17507 df52a0 17483->17507 17563 d63059 17483->17563 17566 d39280 17483->17566 17488 df5978 17487->17488 17492 df5a36 17487->17492 17489 df5a04 socket 17488->17489 17488->17492 17490 df5a1a connect 17489->17490 17489->17492 17491 df5a2c closesocket 17490->17491 17490->17492 17491->17489 17491->17492 17492->17483 17494 d48e11 17493->17494 17496 d48de2 std::locale::_Setgloballocale 17493->17496 17495 d48ef8 17494->17495 17579 d332d0 17494->17579 17496->17476 17498 d48e66 std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 17499 d48ecb std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 17498->17499 17593 d32fe0 17498->17593 17499->17476 17501 d48eb8 17501->17476 17503 d463d8 17502->17503 17504 d463e7 17503->17504 17505 d332d0 std::_Throw_Cpp_error 2 API calls 17503->17505 17504->17483 17506 d4642a std::_Locinfo::_Locinfo_ctor 17505->17506 17506->17483 17508 df52ee 17507->17508 17509 df531c 17507->17509 17510 d32cf0 std::_Throw_Cpp_error 2 API calls 17508->17510 17511 df533e 17509->17511 17512 df5324 17509->17512 17516 df5300 17510->17516 17514 df5346 17511->17514 17515 df5360 17511->17515 17785 d46290 17512->17785 17517 d46290 2 API calls 17514->17517 17518 df5368 17515->17518 17519 df5385 17515->17519 17520 d39280 3 API calls 17516->17520 17545 df5314 17517->17545 17523 d46290 2 API calls 17518->17523 17518->17545 17521 df538d 17519->17521 17522 df53ab 17519->17522 17520->17545 17789 d712a7 17521->17789 17525 df53cb 17522->17525 17526 df5670 17522->17526 17522->17545 17523->17545 17748 d35400 17525->17748 17528 df56cb 17526->17528 17529 df5678 17526->17529 17530 df5726 17528->17530 17531 df56d3 17528->17531 17818 d4b430 17529->17818 17534 df572e 17530->17534 17535 df5781 17530->17535 17533 d4b430 3 API calls 17531->17533 17533->17545 17536 d4b430 3 API calls 17534->17536 17537 df57dc 17535->17537 17538 df5789 17535->17538 17536->17545 17539 df5834 17537->17539 17540 df57e4 17537->17540 17542 d4b430 3 API calls 17538->17542 17539->17545 17824 d88af0 17539->17824 17543 d4b430 3 API calls 17540->17543 17542->17545 17543->17545 17545->17483 17547 df53f0 17547->17545 17548 df54bb 17547->17548 17758 d32cf0 17547->17758 17762 d4ace0 17547->17762 17765 d32d30 17548->17765 17552 df54f0 17553 df5562 17552->17553 17555 df5595 17552->17555 17554 d463b0 std::_Throw_Cpp_error 2 API calls 17553->17554 17556 df557e 17554->17556 17782 d69810 17555->17782 17795 dfc630 17556->17795 19322 d6360d 17563->19322 17567 d463b0 std::_Throw_Cpp_error 2 API calls 17566->17567 17568 d392d4 17567->17568 17569 d48dc0 2 API calls 17568->17569 17570 d39523 std::_Locinfo::_Locinfo_ctor 17568->17570 17569->17570 17571 d396e2 std::ios_base::_Ios_base_dtor 17570->17571 17573 d396b6 WSASend 17570->17573 17572 d3975d std::ios_base::_Ios_base_dtor 17571->17572 17574 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 17571->17574 17572->17483 17573->17570 17573->17571 17575 d3979c 17574->17575 17575->17483 17577 d68b9c ___std_exception_copy RtlAllocateHeap 17576->17577 17578 d68c6f __Getctype 17577->17578 17580 d332e2 17579->17580 17583 d33306 17579->17583 17581 d332e9 17580->17581 17582 d3331f 17580->17582 17598 d63662 17581->17598 17606 d32b50 17582->17606 17584 d33318 17583->17584 17586 d63662 std::_Facet_Register 2 API calls 17583->17586 17584->17498 17589 d33310 17586->17589 17588 d332ef 17590 d332f8 17588->17590 17591 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 17588->17591 17589->17498 17590->17498 17592 d33329 17591->17592 17594 d33007 17593->17594 17595 d33017 std::ios_base::_Ios_base_dtor 17593->17595 17594->17595 17596 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 17594->17596 17595->17501 17597 d33036 17596->17597 17600 d63667 std::_Facet_Register 17598->17600 17601 d63681 17600->17601 17603 d32b50 Concurrency::cancel_current_task std::_Throw_Cpp_error 17600->17603 17610 d723dc 17600->17610 17601->17588 17602 d6368d 17602->17602 17603->17602 17616 d64b05 17603->17616 17607 d32b5e Concurrency::cancel_current_task std::_Throw_Cpp_error 17606->17607 17608 d64b05 ___std_exception_copy 2 API calls 17607->17608 17609 d32bac 17608->17609 17609->17588 17615 d7b086 __Getctype std::_Facet_Register 17610->17615 17611 d7b0c4 17624 d716ef 17611->17624 17613 d7b0af RtlAllocateHeap 17614 d7b0c2 17613->17614 17613->17615 17614->17600 17615->17611 17615->17613 17617 d64b12 17616->17617 17623 d32bac 17616->17623 17618 d723dc ___std_exception_copy 2 API calls 17617->17618 17617->17623 17619 d64b2f 17618->17619 17620 d64b3f 17619->17620 17686 d79995 17619->17686 17695 d71c86 17620->17695 17623->17588 17627 d79f85 17624->17627 17628 d79f8e __Getctype 17627->17628 17629 d716f4 17628->17629 17638 d7a64c 17628->17638 17629->17614 17631 d79fd2 __Getctype 17632 d7a012 17631->17632 17633 d79fda __Getctype 17631->17633 17646 d79c60 17632->17646 17642 d7b00c 17633->17642 17637 d7b00c __freea RtlAllocateHeap 17637->17629 17641 d7a659 __Getctype std::_Facet_Register 17638->17641 17639 d7a684 RtlAllocateHeap 17640 d7a697 ___std_exception_copy 17639->17640 17639->17641 17640->17631 17641->17639 17641->17640 17643 d7b017 __freea 17642->17643 17645 d7b041 17642->17645 17644 d716ef ___std_exception_copy RtlAllocateHeap 17643->17644 17643->17645 17644->17645 17645->17629 17647 d79cce __Getctype 17646->17647 17650 d79c06 17647->17650 17649 d79cf7 17649->17637 17651 d79c12 std::_Lockit::_Lockit std::locale::_Setgloballocale 17650->17651 17654 d79de7 17651->17654 17653 d79c34 __Getctype 17653->17649 17655 d79df6 __Getctype 17654->17655 17657 d79e1d __Getctype 17654->17657 17655->17657 17658 d82134 17655->17658 17657->17653 17659 d821b4 17658->17659 17661 d8214a 17658->17661 17662 d7b00c __freea RtlAllocateHeap 17659->17662 17685 d82202 17659->17685 17660 d822a5 __Getctype RtlAllocateHeap 17672 d82210 17660->17672 17661->17659 17663 d8217d 17661->17663 17667 d7b00c __freea RtlAllocateHeap 17661->17667 17664 d821d6 17662->17664 17673 d7b00c __freea RtlAllocateHeap 17663->17673 17684 d8219f 17663->17684 17665 d7b00c __freea RtlAllocateHeap 17664->17665 17668 d821e9 17665->17668 17666 d7b00c __freea RtlAllocateHeap 17669 d821a9 17666->17669 17671 d82172 17667->17671 17674 d7b00c __freea RtlAllocateHeap 17668->17674 17675 d7b00c __freea RtlAllocateHeap 17669->17675 17670 d82270 17676 d7b00c __freea RtlAllocateHeap 17670->17676 17677 d81438 __Getctype RtlAllocateHeap 17671->17677 17672->17670 17683 d7b00c RtlAllocateHeap __freea 17672->17683 17678 d82194 17673->17678 17679 d821f7 17674->17679 17675->17659 17680 d82276 17676->17680 17677->17663 17681 d81897 __Getctype RtlAllocateHeap 17678->17681 17682 d7b00c __freea RtlAllocateHeap 17679->17682 17680->17657 17681->17684 17682->17685 17683->17672 17684->17666 17685->17660 17687 d799b1 17686->17687 17688 d799a3 17686->17688 17689 d716ef ___std_exception_copy RtlAllocateHeap 17687->17689 17688->17687 17693 d799c9 17688->17693 17690 d799b9 17689->17690 17698 d68c50 17690->17698 17692 d799c3 17692->17620 17693->17692 17694 d716ef ___std_exception_copy RtlAllocateHeap 17693->17694 17694->17690 17696 d7b00c __freea RtlAllocateHeap 17695->17696 17697 d71c9e 17696->17697 17697->17623 17701 d68b9c 17698->17701 17702 d68bae ___std_exception_copy 17701->17702 17707 d68bd3 17702->17707 17704 d68bc6 17714 d6898c 17704->17714 17708 d68be3 17707->17708 17711 d68bea ___std_exception_copy __Getctype 17707->17711 17720 d689f1 17708->17720 17710 d68bf8 17710->17704 17711->17710 17712 d68b9c ___std_exception_copy RtlAllocateHeap 17711->17712 17713 d68c5c 17712->17713 17713->17704 17715 d68998 17714->17715 17716 d689af 17715->17716 17735 d68a37 17715->17735 17718 d689c2 17716->17718 17719 d68a37 ___std_exception_copy RtlAllocateHeap 17716->17719 17718->17692 17719->17718 17721 d68a00 17720->17721 17724 d7a036 17721->17724 17725 d7a049 __Getctype 17724->17725 17726 d7a64c __Getctype RtlAllocateHeap 17725->17726 17734 d68a22 17725->17734 17727 d7a079 __Getctype 17726->17727 17728 d7a081 __Getctype 17727->17728 17729 d7a0b5 17727->17729 17731 d7b00c __freea RtlAllocateHeap 17728->17731 17730 d79c60 __Getctype RtlAllocateHeap 17729->17730 17732 d7a0c0 17730->17732 17731->17734 17733 d7b00c __freea RtlAllocateHeap 17732->17733 17733->17734 17734->17711 17736 d68a41 17735->17736 17737 d68a4a 17735->17737 17738 d689f1 ___std_exception_copy RtlAllocateHeap 17736->17738 17737->17716 17739 d68a46 17738->17739 17739->17737 17742 d741b6 17739->17742 17741 d68a53 17743 d741bb std::locale::_Setgloballocale 17742->17743 17744 d7f653 std::locale::_Setgloballocale RtlAllocateHeap 17743->17744 17746 d741c6 std::locale::_Setgloballocale 17743->17746 17744->17746 17745 d736d2 std::locale::_Setgloballocale RtlAllocateHeap 17747 d741f9 __Getctype std::locale::_Setgloballocale 17745->17747 17746->17745 17747->17741 17829 d62b89 17748->17829 17751 d35410 17752 d35419 17751->17752 17754 d62524 std::_Throw_Cpp_error 3 API calls 17751->17754 17752->17547 17755 d35430 17754->17755 17838 d6952c 17755->17838 17759 d32d13 17758->17759 17759->17759 17760 d33040 std::_Throw_Cpp_error 2 API calls 17759->17760 17761 d32d25 17760->17761 17761->17547 17763 d4ad10 17762->17763 17763->17763 18155 d4fbf0 17763->18155 17766 d33040 std::_Throw_Cpp_error 2 API calls 17765->17766 17767 d32d55 17766->17767 17768 e03670 17767->17768 17769 e03708 17768->17769 17771 e03711 std::locale::_Setgloballocale 17768->17771 18164 d4e4b0 17769->18164 17774 e03903 17771->17774 17780 e038ff 17771->17780 18187 e21ae0 17771->18187 18198 d54160 17771->18198 17775 e03930 std::ios_base::_Ios_base_dtor 17774->17775 17777 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 17774->17777 17775->17552 17778 e0397e 17777->17778 17779 d63059 __Xtime_get_ticks GetSystemTimePreciseAsFileTime 17778->17779 17781 e03986 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 17779->17781 17780->17774 18266 d46130 17780->18266 17781->17552 18353 d6974e 17782->18353 17784 d69822 17784->17545 17806 d71618 17784->17806 17786 d462b1 17785->17786 17787 d4629d 17785->17787 17786->17545 17788 d46130 2 API calls 17787->17788 17788->17786 17790 d712ba ___std_exception_copy 17789->17790 18377 d6d695 17790->18377 17792 d712d4 17793 d6898c ___std_exception_copy RtlAllocateHeap 17792->17793 17794 d712e1 17793->17794 17794->17545 17796 dfc6a6 std::locale::_Setgloballocale 17795->17796 18536 d4ab20 17796->18536 17799 d48f00 std::_Throw_Cpp_error 2 API calls 17800 dfc82f 17799->17800 18541 d33440 17800->18541 17802 dfc93b std::ios_base::_Ios_base_dtor 17802->17545 17804 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 17805 dfc97e 17804->17805 17805->17545 17807 d7162b ___std_exception_copy 17806->17807 18782 d713fa 17807->18782 17809 d71640 17810 d6898c ___std_exception_copy RtlAllocateHeap 17809->17810 17811 d7164d 17810->17811 17812 d6d098 17811->17812 17813 d6d0ab ___std_exception_copy 17812->17813 18883 d6cf73 17813->18883 17815 d6d0b7 17816 d6898c ___std_exception_copy RtlAllocateHeap 17815->17816 17817 d6d0c3 17816->17817 17817->17545 17819 d4b48d 17818->17819 18953 d52100 17819->18953 17823 d4b503 17823->17545 19291 d88ba0 17824->19291 17826 d88b21 std::_Locinfo::_Locinfo_ctor 17827 d33040 std::_Throw_Cpp_error 2 API calls 17826->17827 17828 d88b6c 17827->17828 17828->17545 17844 d62bb8 17829->17844 17831 d35409 17831->17751 17832 d62524 17831->17832 17833 d6253a std::_Throw_Cpp_error 17832->17833 17851 d624d7 17833->17851 17835 d6254a __EH_prolog3 std::_Throw_Cpp_error 17857 d49cb0 17835->17857 17837 d625b7 std::_Throw_Cpp_error 17837->17751 17839 d6953f ___std_exception_copy 17838->17839 18139 d693cb 17839->18139 17841 d6954e 17842 d6898c ___std_exception_copy RtlAllocateHeap 17841->17842 17843 d35450 17842->17843 17843->17547 17847 d62bd2 17844->17847 17845 d62be2 _ValidateLocalCookies 17845->17831 17847->17845 17848 d6301b 17847->17848 17849 d63059 __Xtime_get_ticks GetSystemTimePreciseAsFileTime 17848->17849 17850 d63026 __aulldiv __aullrem 17849->17850 17850->17847 17852 d624e3 __EH_prolog3_GS 17851->17852 17853 d32cf0 std::_Throw_Cpp_error 2 API calls 17852->17853 17854 d624f7 17853->17854 17868 d336e0 17854->17868 17856 d6250c std::_Throw_Cpp_error 17856->17835 17895 d34900 17857->17895 17859 d49d26 17860 d63662 std::_Facet_Register 2 API calls 17859->17860 17861 d49d2d 17860->17861 17900 d62719 17861->17900 17863 d49d39 17908 d4a060 17863->17908 17865 d49d76 17866 d49dc7 std::_Throw_Cpp_error 17865->17866 17867 d34900 std::_Throw_Cpp_error 2 API calls 17865->17867 17866->17837 17867->17866 17869 d463b0 std::_Throw_Cpp_error 2 API calls 17868->17869 17870 d33731 17869->17870 17871 d3375a 17870->17871 17882 d48f00 17870->17882 17873 d48f00 std::_Throw_Cpp_error 2 API calls 17871->17873 17874 d3378a 17873->17874 17875 d64b05 ___std_exception_copy 2 API calls 17874->17875 17877 d3381e 17875->17877 17876 d3385f std::ios_base::_Ios_base_dtor 17876->17856 17877->17876 17878 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 17877->17878 17879 d338b0 17878->17879 17891 d64b68 17879->17891 17881 d338f5 std::ios_base::_Ios_base_dtor 17881->17856 17883 d48f22 std::_Locinfo::_Locinfo_ctor 17882->17883 17884 d48f4f 17882->17884 17883->17871 17885 d332d0 std::_Throw_Cpp_error 2 API calls 17884->17885 17886 d4902f std::ios_base::_Ios_base_dtor 17884->17886 17887 d48fa4 std::_Locinfo::_Locinfo_ctor 17885->17887 17886->17871 17888 d49002 std::_Locinfo::_Locinfo_ctor 17887->17888 17889 d32fe0 std::_Throw_Cpp_error RtlAllocateHeap 17887->17889 17888->17871 17890 d48fef 17889->17890 17890->17871 17892 d64b75 17891->17892 17893 d64b7c 17891->17893 17894 d71c86 __freea RtlAllocateHeap 17892->17894 17893->17881 17894->17893 17896 d34922 17895->17896 17897 d3491a std::_Throw_Cpp_error 17895->17897 17896->17859 17920 d347f0 17897->17920 17899 d34968 std::ios_base::_Ios_base_dtor std::_Throw_Cpp_error 17899->17859 17901 d62725 __EH_prolog3 std::_Lockit::_Lockit 17900->17901 17907 d62761 std::_Throw_Cpp_error std::_Lockit::~_Lockit 17901->17907 17938 d6287c 17901->17938 17903 d62743 17944 d6289f 17903->17944 17907->17863 17910 d4a0a2 std::_Throw_Cpp_error std::_Lockit::~_Lockit std::_Lockit::_Lockit 17908->17910 17909 d4a144 std::_Lockit::~_Lockit 17909->17865 17910->17909 17911 d63662 std::_Facet_Register 2 API calls 17910->17911 17912 d4a152 17911->17912 18009 d34040 17912->18009 17918 d4a1f1 18044 d626e7 17918->18044 17921 d34851 17920->17921 17921->17921 17932 d33040 17921->17932 17923 d34865 17924 d336e0 std::_Throw_Cpp_error 2 API calls 17923->17924 17926 d3487b 17924->17926 17925 d348a5 std::ios_base::_Ios_base_dtor 17925->17899 17926->17925 17927 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 17926->17927 17929 d348f7 std::_Throw_Cpp_error 17927->17929 17928 d34922 17928->17899 17929->17928 17930 d347f0 std::_Throw_Cpp_error 2 API calls 17929->17930 17931 d34968 std::ios_base::_Ios_base_dtor std::_Throw_Cpp_error 17930->17931 17931->17899 17934 d330c8 17932->17934 17935 d33052 17932->17935 17933 d33057 std::_Locinfo::_Locinfo_ctor 17933->17923 17934->17923 17935->17933 17936 d332d0 std::_Throw_Cpp_error 2 API calls 17935->17936 17937 d330a3 std::_Locinfo::_Locinfo_ctor 17936->17937 17937->17923 17939 d63662 std::_Facet_Register 2 API calls 17938->17939 17940 d62887 17939->17940 17941 d6289b 17940->17941 17954 d62601 17940->17954 17941->17903 17945 d6274b 17944->17945 17946 d628ab 17944->17946 17948 d45a60 17945->17948 17957 d6332a 17946->17957 17950 d45a86 17948->17950 17953 d45ab3 std::_Locinfo::_Locinfo_ctor 17948->17953 17949 d45a90 17952 d723dc ___std_exception_copy 2 API calls 17949->17952 17949->17953 17950->17949 17951 d71c86 __freea RtlAllocateHeap 17950->17951 17951->17949 17952->17953 17953->17907 17955 d45a60 std::_Locinfo::_Locinfo_ctor 2 API calls 17954->17955 17956 d6263b 17955->17956 17956->17903 17958 d6333a std::locale::_Setgloballocale 17957->17958 17958->17945 17961 d741c6 std::locale::_Setgloballocale 17958->17961 17963 d7f653 17958->17963 17984 d736d2 17961->17984 17962 d741f9 __Getctype std::locale::_Setgloballocale 17962->17945 17966 d7f65f std::locale::_Setgloballocale 17963->17966 17964 d79f85 std::locale::_Setgloballocale RtlAllocateHeap 17970 d7f690 std::locale::_Setgloballocale 17964->17970 17965 d7f6af 17967 d716ef ___std_exception_copy RtlAllocateHeap 17965->17967 17966->17964 17966->17965 17966->17970 17972 d7f6c1 std::_Lockit::_Lockit std::locale::_Setgloballocale 17966->17972 17968 d7f6b4 17967->17968 17969 d68c50 ___std_exception_copy RtlAllocateHeap 17968->17969 17971 d7f699 17969->17971 17970->17965 17970->17971 17970->17972 17971->17961 17973 d7f734 17972->17973 17974 d7f831 std::_Lockit::~_Lockit 17972->17974 17981 d7f762 std::locale::_Setgloballocale 17972->17981 17973->17981 17987 d79e32 17973->17987 17975 d736d2 std::locale::_Setgloballocale RtlAllocateHeap 17974->17975 17977 d7f844 17975->17977 17978 d79e32 __Getctype RtlAllocateHeap 17982 d7f7b7 17978->17982 17980 d79e32 __Getctype RtlAllocateHeap 17980->17981 17981->17971 17981->17978 17981->17982 17982->17971 17983 d79e32 __Getctype RtlAllocateHeap 17982->17983 17983->17971 18001 d73542 17984->18001 17986 d736e3 17986->17962 17988 d79e3b __Getctype 17987->17988 17989 d7a64c __Getctype RtlAllocateHeap 17988->17989 17990 d79e52 17988->17990 17992 d79e7f __Getctype 17989->17992 17991 d79ee2 17990->17991 17993 d741b6 __Getctype RtlAllocateHeap 17990->17993 17991->17980 17994 d79ebf 17992->17994 17995 d79e87 __Getctype 17992->17995 17996 d79eec 17993->17996 17997 d79c60 __Getctype RtlAllocateHeap 17994->17997 17998 d7b00c __freea RtlAllocateHeap 17995->17998 17999 d79eca 17997->17999 17998->17990 18000 d7b00c __freea RtlAllocateHeap 17999->18000 18000->17990 18003 d7356f std::locale::_Setgloballocale 18001->18003 18005 d733d3 18003->18005 18004 d735b8 std::locale::_Setgloballocale 18004->17986 18006 d733df std::_Lockit::_Lockit std::locale::_Setgloballocale 18005->18006 18007 d7345a std::locale::_Setgloballocale RtlAllocateHeap 18006->18007 18008 d733f6 std::locale::_Setgloballocale 18007->18008 18008->18004 18010 d34066 std::_Lockit::_Lockit 18009->18010 18011 d340c2 18010->18011 18012 d340e6 18010->18012 18047 d62817 18011->18047 18056 d61d3a 18012->18056 18015 d340f0 18017 d62ce4 18088 d73ce8 18017->18088 18019 d62ced __Getctype 18020 d62d07 18019->18020 18021 d62d25 18019->18021 18093 d7453e 18020->18093 18023 d7453e __Getctype RtlAllocateHeap 18021->18023 18024 d62d0e 18023->18024 18098 d73d32 18024->18098 18027 d4a1ca 18029 d34100 18027->18029 18135 d62862 18029->18135 18032 d34140 18034 d3415b 18032->18034 18035 d71c86 __freea RtlAllocateHeap 18032->18035 18033 d71c86 __freea RtlAllocateHeap 18033->18032 18036 d71c86 __freea RtlAllocateHeap 18034->18036 18037 d34176 18034->18037 18035->18034 18036->18037 18038 d71c86 __freea RtlAllocateHeap 18037->18038 18039 d34191 18037->18039 18038->18039 18040 d341ac 18039->18040 18041 d71c86 __freea RtlAllocateHeap 18039->18041 18042 d341c7 std::_Lockit::~_Lockit 18040->18042 18043 d71c86 __freea RtlAllocateHeap 18040->18043 18041->18040 18042->17918 18043->18042 18045 d63662 std::_Facet_Register 2 API calls 18044->18045 18046 d626f2 18045->18046 18046->17909 18059 d74506 18047->18059 18050 d45a60 std::_Locinfo::_Locinfo_ctor 2 API calls 18051 d6283b 18050->18051 18052 d74506 std::_Locinfo::_Locinfo_ctor 2 API calls 18051->18052 18053 d6284b 18051->18053 18052->18053 18054 d45a60 std::_Locinfo::_Locinfo_ctor 2 API calls 18053->18054 18055 d340c9 18054->18055 18055->18017 18085 d33540 18056->18085 18058 d61d4b std::_Throw_Cpp_error 18058->18015 18060 d74513 std::_Locinfo::_Locinfo_ctor 18059->18060 18063 d742b1 18060->18063 18062 d62823 18062->18050 18064 d742bd std::_Lockit::_Lockit std::locale::_Setgloballocale 18063->18064 18067 d7430c 18064->18067 18066 d742d8 std::_Locinfo::_Locinfo_ctor 18066->18062 18068 d7446b std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 18067->18068 18069 d74327 18068->18069 18070 d79e32 __Getctype RtlAllocateHeap 18069->18070 18076 d74360 __Getctype 18069->18076 18071 d74334 18070->18071 18072 d73369 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 18071->18072 18073 d74359 18072->18073 18074 d7b086 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 18073->18074 18073->18076 18075 d74385 18074->18075 18075->18076 18077 d73369 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 18075->18077 18076->18066 18078 d743a1 18077->18078 18079 d743c3 18078->18079 18080 d743a8 18078->18080 18082 d7b00c __freea RtlAllocateHeap 18079->18082 18083 d743ee 18079->18083 18080->18076 18081 d7b00c __freea RtlAllocateHeap 18080->18081 18081->18076 18082->18083 18083->18076 18084 d7b00c __freea RtlAllocateHeap 18083->18084 18084->18076 18086 d64b05 ___std_exception_copy 2 API calls 18085->18086 18087 d33585 18086->18087 18087->18058 18089 d79e32 __Getctype RtlAllocateHeap 18088->18089 18090 d73cf3 18089->18090 18109 d7a11f 18090->18109 18094 d79e32 __Getctype RtlAllocateHeap 18093->18094 18095 d74549 18094->18095 18096 d7a11f __Getctype RtlAllocateHeap 18095->18096 18097 d74559 18096->18097 18097->18024 18099 d79e32 __Getctype RtlAllocateHeap 18098->18099 18100 d73d3d 18099->18100 18101 d7a11f __Getctype RtlAllocateHeap 18100->18101 18102 d62d36 18101->18102 18102->18027 18103 d74562 18102->18103 18104 d7456f 18103->18104 18108 d745a3 __Getctype 18103->18108 18105 d723dc ___std_exception_copy 2 API calls 18104->18105 18106 d74592 18105->18106 18106->18108 18126 d7e2e2 18106->18126 18108->18027 18110 d7a132 18109->18110 18111 d73d03 18109->18111 18110->18111 18113 d82380 18110->18113 18111->18019 18114 d8238c std::locale::_Setgloballocale 18113->18114 18115 d79e32 __Getctype RtlAllocateHeap 18114->18115 18117 d82395 std::_Lockit::_Lockit 18115->18117 18116 d823db 18116->18111 18117->18116 18122 d82401 18117->18122 18119 d823c4 __Getctype 18119->18116 18120 d741b6 __Getctype RtlAllocateHeap 18119->18120 18121 d82400 18120->18121 18123 d8240f __Getctype 18122->18123 18125 d8241c 18122->18125 18124 d82134 __Getctype RtlAllocateHeap 18123->18124 18123->18125 18124->18125 18125->18119 18127 d7e2fe 18126->18127 18128 d7e2f0 18126->18128 18129 d716ef ___std_exception_copy RtlAllocateHeap 18127->18129 18128->18127 18131 d7e318 18128->18131 18134 d7e308 18129->18134 18130 d68c50 ___std_exception_copy RtlAllocateHeap 18132 d7e312 18130->18132 18131->18132 18133 d716ef ___std_exception_copy RtlAllocateHeap 18131->18133 18132->18108 18133->18134 18134->18130 18136 d6286e 18135->18136 18137 d3412c 18135->18137 18138 d74506 std::_Locinfo::_Locinfo_ctor 2 API calls 18136->18138 18137->18032 18137->18033 18138->18137 18140 d693d7 std::locale::_Setgloballocale 18139->18140 18141 d693e0 18140->18141 18144 d69404 18140->18144 18142 d68bd3 ___std_exception_copy RtlAllocateHeap 18141->18142 18147 d693f9 18142->18147 18143 d69422 18146 d68bd3 ___std_exception_copy RtlAllocateHeap 18143->18146 18143->18147 18144->18143 18148 d7a1db 18144->18148 18146->18147 18147->17841 18149 d7a1e7 18148->18149 18150 d7a1fc 18148->18150 18151 d716ef ___std_exception_copy RtlAllocateHeap 18149->18151 18150->18143 18152 d7a1ec 18151->18152 18153 d68c50 ___std_exception_copy RtlAllocateHeap 18152->18153 18154 d7a1f7 18153->18154 18154->18143 18157 d4fc8d 18155->18157 18160 d4fc12 std::_Locinfo::_Locinfo_ctor 18155->18160 18156 d4fd5e 18157->18156 18158 d332d0 std::_Throw_Cpp_error 2 API calls 18157->18158 18159 d4fce1 std::_Locinfo::_Locinfo_ctor 18158->18159 18161 d4fd3a std::_Locinfo::_Locinfo_ctor 18159->18161 18162 d32fe0 std::_Throw_Cpp_error RtlAllocateHeap 18159->18162 18163 d4fd27 18162->18163 18165 d4e4c2 18164->18165 18166 d4e528 18164->18166 18168 d4e4f9 18165->18168 18169 d4e4ca 18165->18169 18277 d33330 18166->18277 18170 d4e516 18168->18170 18173 d63662 std::_Facet_Register 2 API calls 18168->18173 18171 d4e52d 18169->18171 18172 d4e4d1 18169->18172 18170->17771 18174 d32b50 Concurrency::cancel_current_task 2 API calls 18171->18174 18175 d63662 std::_Facet_Register 2 API calls 18172->18175 18176 d4e503 18173->18176 18177 d4e4d7 18174->18177 18175->18177 18176->17771 18178 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 18177->18178 18179 d4e4e0 18177->18179 18180 d4e537 18178->18180 18179->17771 18280 d46ad0 18180->18280 18182 d4e574 18183 d34900 std::_Throw_Cpp_error 2 API calls 18182->18183 18185 d4e5fb 18183->18185 18184 d4e613 18184->17771 18185->18184 18284 d49b60 18185->18284 18188 e21ae7 18187->18188 18189 e21aec 18187->18189 18188->17771 18190 d723dc ___std_exception_copy 2 API calls 18189->18190 18196 e21b2f 18189->18196 18190->18196 18191 e21b42 18191->17771 18192 e21bf7 18192->17771 18193 d71c86 __freea RtlAllocateHeap 18194 e21be7 18193->18194 18194->17771 18195 e21ba1 18195->18192 18195->18193 18196->18191 18196->18195 18197 d71c86 __freea RtlAllocateHeap 18196->18197 18197->18195 18199 d54195 18198->18199 18200 d54288 18198->18200 18201 d541b1 18199->18201 18203 d54202 18199->18203 18204 d541f2 18199->18204 18202 d33330 2 API calls 18200->18202 18206 d63662 std::_Facet_Register 2 API calls 18201->18206 18205 d5428d 18202->18205 18210 d63662 std::_Facet_Register 2 API calls 18203->18210 18213 d541cf std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 18203->18213 18204->18201 18204->18205 18207 d32b50 Concurrency::cancel_current_task 2 API calls 18205->18207 18208 d541c4 18206->18208 18209 d54292 18207->18209 18208->18209 18208->18213 18211 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 18209->18211 18210->18213 18212 d54297 18211->18212 18214 d543e9 18212->18214 18215 d542fa 18212->18215 18319 d577d0 18213->18319 18216 d33330 2 API calls 18214->18216 18324 d56ff0 18215->18324 18217 d543ee 18216->18217 18219 d54549 18217->18219 18223 d5445a 18217->18223 18221 d33330 2 API calls 18219->18221 18230 d5454e 18221->18230 18222 d5425e 18222->17771 18224 d56ff0 2 API calls 18223->18224 18226 d54496 18224->18226 18225 d5470b 18228 d33330 2 API calls 18225->18228 18229 d463b0 std::_Throw_Cpp_error 2 API calls 18226->18229 18227 d54706 18231 d32b50 Concurrency::cancel_current_task 2 API calls 18227->18231 18232 d546af 18228->18232 18246 d544c4 18229->18246 18230->18225 18230->18227 18233 d54615 18230->18233 18234 d545ee 18230->18234 18231->18225 18235 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 18232->18235 18256 d546d1 std::ios_base::_Ios_base_dtor 18232->18256 18242 d63662 std::_Facet_Register 2 API calls 18233->18242 18248 d545ff 18233->18248 18234->18227 18236 d545f9 18234->18236 18238 d54715 18235->18238 18239 d63662 std::_Facet_Register 2 API calls 18236->18239 18237 d54336 18332 d57830 18237->18332 18344 d4d010 18238->18344 18239->18248 18242->18248 18243 d543b0 18243->17771 18247 d57830 RtlAllocateHeap 18246->18247 18249 d54510 18247->18249 18248->18232 18248->18256 18337 d61f8c 18248->18337 18249->17771 18250 d5472f std::_Throw_Cpp_error 18251 d54798 18250->18251 18253 d5477f 18250->18253 18254 d5475b 18250->18254 18252 d32b50 Concurrency::cancel_current_task 2 API calls 18251->18252 18255 d54768 18252->18255 18258 d54791 18253->18258 18261 d63662 std::_Facet_Register 2 API calls 18253->18261 18254->18251 18257 d54762 18254->18257 18259 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 18255->18259 18265 d54771 18255->18265 18256->17771 18260 d63662 std::_Facet_Register 2 API calls 18257->18260 18258->17771 18263 d547a2 18259->18263 18260->18255 18264 d54789 18261->18264 18264->17771 18265->17771 18267 d46174 18266->18267 18269 d46143 std::_Locinfo::_Locinfo_ctor 18266->18269 18268 d46180 18267->18268 18270 d46200 18267->18270 18271 d332d0 std::_Throw_Cpp_error 2 API calls 18268->18271 18269->17774 18270->18270 18272 d48f00 std::_Throw_Cpp_error 2 API calls 18270->18272 18274 d461bf std::_Locinfo::_Locinfo_ctor 18271->18274 18273 d46232 18272->18273 18273->17774 18275 d461ed 18274->18275 18276 d32fe0 std::_Throw_Cpp_error RtlAllocateHeap 18274->18276 18275->17774 18276->18275 18288 d61cda 18277->18288 18281 d46b02 18280->18281 18282 d46b1d 18281->18282 18308 d450e0 18281->18308 18282->18182 18285 d49bbb 18284->18285 18286 d49b96 18284->18286 18285->18184 18286->18285 18316 d488a0 18286->18316 18295 d61a8f 18288->18295 18290 d61ceb std::_Throw_Cpp_error 18298 d61ae4 18290->18298 18292 d61d0b std::_Throw_Cpp_error 18301 d61b27 18292->18301 18294 d61d2b std::_Throw_Cpp_error 18305 d334e0 18295->18305 18299 d334e0 std::regex_error::regex_error 2 API calls 18298->18299 18300 d61af6 18299->18300 18300->18292 18302 d61b3b std::regex_error::regex_error 18301->18302 18303 d334e0 std::regex_error::regex_error 2 API calls 18302->18303 18304 d61b44 18303->18304 18304->18294 18306 d64b05 ___std_exception_copy 2 API calls 18305->18306 18307 d33522 18306->18307 18307->18290 18309 d45117 18308->18309 18313 d451b5 18308->18313 18310 d46ad0 2 API calls 18309->18310 18312 d45120 18310->18312 18311 d4519d 18311->18313 18315 d49b60 2 API calls 18311->18315 18312->18311 18314 d34900 std::_Throw_Cpp_error 2 API calls 18312->18314 18313->18282 18314->18311 18315->18313 18317 d34900 std::_Throw_Cpp_error 2 API calls 18316->18317 18318 d488bf 18317->18318 18318->18285 18320 d577dc 18319->18320 18321 d577f9 std::ios_base::_Ios_base_dtor 18319->18321 18320->18321 18322 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 18320->18322 18321->18222 18323 d57824 18322->18323 18325 d5703c 18324->18325 18328 d56ff9 18324->18328 18325->18325 18326 d57013 18327 d5701c 18326->18327 18329 d63662 std::_Facet_Register 2 API calls 18326->18329 18327->18237 18328->18325 18328->18326 18330 d63662 std::_Facet_Register 2 API calls 18328->18330 18331 d57035 18329->18331 18330->18326 18331->18237 18333 d5783d 18332->18333 18334 d57882 std::ios_base::_Ios_base_dtor 18332->18334 18333->18334 18335 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 18333->18335 18334->18243 18336 d578b6 18335->18336 18338 d61f95 18337->18338 18339 d61fa2 18337->18339 18338->18339 18340 d741b6 __Getctype RtlAllocateHeap 18338->18340 18339->18248 18341 d61fab 18340->18341 18342 d61f8c RtlAllocateHeap 18341->18342 18343 d61fba 18342->18343 18343->18248 18345 d4d02e 18344->18345 18346 d4d01a 18344->18346 18348 d49910 18345->18348 18346->18345 18347 d61f8c RtlAllocateHeap 18346->18347 18347->18346 18349 d49928 18348->18349 18350 d49938 std::ios_base::_Ios_base_dtor 18348->18350 18349->18350 18351 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 18349->18351 18350->18250 18352 d4994d 18351->18352 18356 d6975a std::locale::_Setgloballocale 18353->18356 18354 d69761 18355 d716ef ___std_exception_copy RtlAllocateHeap 18354->18355 18357 d69766 18355->18357 18356->18354 18358 d69781 18356->18358 18359 d68c50 ___std_exception_copy RtlAllocateHeap 18357->18359 18360 d69786 18358->18360 18361 d69793 18358->18361 18366 d69771 18359->18366 18363 d716ef ___std_exception_copy RtlAllocateHeap 18360->18363 18367 d7a8e1 18361->18367 18363->18366 18364 d6979c 18365 d716ef ___std_exception_copy RtlAllocateHeap 18364->18365 18364->18366 18365->18366 18366->17784 18368 d7a8ed std::_Lockit::_Lockit std::locale::_Setgloballocale 18367->18368 18371 d7a985 18368->18371 18370 d7a908 18370->18364 18375 d7a9a8 18371->18375 18372 d7a64c __Getctype RtlAllocateHeap 18373 d7aa09 18372->18373 18374 d7b00c __freea RtlAllocateHeap 18373->18374 18376 d7a9ee std::locale::_Setgloballocale 18374->18376 18375->18372 18375->18375 18375->18376 18376->18370 18391 d6ce69 18377->18391 18379 d6d6ef 18385 d6d713 18379->18385 18398 d6e1c0 18379->18398 18380 d6d6a7 18380->18379 18381 d6d6bc 18380->18381 18390 d6d6d7 std::_Locinfo::_Locinfo_ctor 18380->18390 18382 d68bd3 ___std_exception_copy RtlAllocateHeap 18381->18382 18382->18390 18387 d6d737 18385->18387 18405 d6ce84 18385->18405 18386 d6d7bf 18388 d6ce12 RtlAllocateHeap 18386->18388 18387->18386 18412 d6ce12 18387->18412 18388->18390 18390->17792 18392 d6ce81 18391->18392 18393 d6ce6e 18391->18393 18392->18380 18394 d716ef ___std_exception_copy RtlAllocateHeap 18393->18394 18395 d6ce73 18394->18395 18396 d68c50 ___std_exception_copy RtlAllocateHeap 18395->18396 18397 d6ce7e 18396->18397 18397->18380 18399 d68a37 ___std_exception_copy RtlAllocateHeap 18398->18399 18400 d6e1d0 18399->18400 18418 d7a14c 18400->18418 18406 d6cea6 18405->18406 18407 d6ce90 18405->18407 18410 d6ceb6 18406->18410 18520 d79a29 18406->18520 18408 d7453e __Getctype RtlAllocateHeap 18407->18408 18411 d6ce9b std::_Locinfo::_Locinfo_ctor 18408->18411 18410->18385 18411->18385 18413 d6ce37 18412->18413 18414 d6ce23 18412->18414 18413->18386 18414->18413 18415 d716ef ___std_exception_copy RtlAllocateHeap 18414->18415 18416 d6ce2c 18415->18416 18417 d68c50 ___std_exception_copy RtlAllocateHeap 18416->18417 18417->18413 18419 d7a163 18418->18419 18420 d6e1ed 18418->18420 18419->18420 18421 d82380 __Getctype RtlAllocateHeap 18419->18421 18422 d7a1aa 18420->18422 18421->18420 18423 d7a1c1 18422->18423 18424 d6e1fa 18422->18424 18423->18424 18426 d806ab 18423->18426 18424->18385 18427 d79e32 __Getctype RtlAllocateHeap 18426->18427 18428 d806b0 18427->18428 18431 d805c3 18428->18431 18430 d806bb 18430->18424 18435 d805cf std::_Lockit::_Lockit std::locale::_Setgloballocale 18431->18435 18432 d805f0 18432->18430 18433 d805e9 std::_Locinfo::_Locinfo_ctor 18433->18432 18434 d741b6 __Getctype RtlAllocateHeap 18433->18434 18436 d80662 18434->18436 18435->18433 18439 d7b00c __freea RtlAllocateHeap 18435->18439 18437 d8069e 18436->18437 18442 d79eed 18436->18442 18437->18430 18439->18433 18443 d79ef8 __Getctype 18442->18443 18445 d7a64c __Getctype RtlAllocateHeap 18443->18445 18452 d79f04 18443->18452 18444 d741b6 __Getctype RtlAllocateHeap 18446 d79f82 18444->18446 18447 d79f28 __Getctype 18445->18447 18448 d79f30 __Getctype 18447->18448 18449 d79f64 18447->18449 18450 d7b00c __freea RtlAllocateHeap 18448->18450 18451 d79c60 __Getctype RtlAllocateHeap 18449->18451 18450->18452 18453 d79f6f 18451->18453 18452->18444 18455 d79f09 18452->18455 18454 d7b00c __freea RtlAllocateHeap 18453->18454 18454->18455 18456 d8046e 18455->18456 18457 d805c3 std::_Locinfo::_Locinfo_ctor 2 API calls 18456->18457 18458 d80498 18457->18458 18479 d801f5 18458->18479 18463 d804d8 18488 d806be 18463->18488 18464 d804ca 18465 d7b00c __freea RtlAllocateHeap 18464->18465 18467 d804b1 18465->18467 18467->18437 18468 d80505 18469 d80510 18468->18469 18473 d8052b std::_Locinfo::_Locinfo_ctor 18468->18473 18470 d716ef ___std_exception_copy RtlAllocateHeap 18469->18470 18472 d80515 18470->18472 18471 d80557 18474 d805a0 18471->18474 18493 d800e7 18471->18493 18475 d7b00c __freea RtlAllocateHeap 18472->18475 18473->18471 18476 d7b00c __freea RtlAllocateHeap 18473->18476 18478 d7b00c __freea RtlAllocateHeap 18474->18478 18475->18467 18476->18471 18478->18467 18497 d6959e 18479->18497 18482 d7b086 18483 d7b0c4 18482->18483 18487 d7b094 __Getctype std::_Facet_Register 18482->18487 18484 d716ef ___std_exception_copy RtlAllocateHeap 18483->18484 18486 d7b0c2 18484->18486 18485 d7b0af RtlAllocateHeap 18485->18486 18485->18487 18486->18463 18486->18464 18487->18483 18487->18485 18489 d801f5 std::_Locinfo::_Locinfo_ctor 2 API calls 18488->18489 18490 d806de std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 18489->18490 18491 d807e3 std::_Locinfo::_Locinfo_ctor _ValidateLocalCookies 18490->18491 18505 d802c9 18490->18505 18491->18468 18494 d800f3 std::_Lockit::_Lockit std::locale::_Setgloballocale 18493->18494 18513 d80134 18494->18513 18496 d8010a std::_Locinfo::_Locinfo_ctor 18496->18474 18498 d695b5 18497->18498 18499 d695bc 18497->18499 18498->18467 18498->18482 18499->18498 18500 d79e32 __Getctype RtlAllocateHeap 18499->18500 18501 d695dd 18500->18501 18502 d7a11f __Getctype RtlAllocateHeap 18501->18502 18503 d695f3 18502->18503 18504 d7a17d std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 18503->18504 18504->18498 18506 d802f1 18505->18506 18512 d803ba _ValidateLocalCookies 18505->18512 18507 d7f43b std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 18506->18507 18506->18512 18508 d80371 18507->18508 18509 d7a898 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 18508->18509 18510 d80392 18509->18510 18511 d7a898 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 18510->18511 18511->18512 18512->18491 18514 d6cedb std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 18513->18514 18515 d80156 18514->18515 18516 d6cedb std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 18515->18516 18517 d80175 18516->18517 18518 d7b00c __freea RtlAllocateHeap 18517->18518 18519 d8019c 18517->18519 18518->18519 18519->18496 18521 d6959e std::_Locinfo::_Locinfo_ctor 2 API calls 18520->18521 18522 d79a46 18521->18522 18524 d79a56 _ValidateLocalCookies 18522->18524 18525 d7f43b 18522->18525 18524->18410 18526 d6959e std::_Locinfo::_Locinfo_ctor 2 API calls 18525->18526 18527 d7f45b std::_Locinfo::_Locinfo_ctor 18526->18527 18529 d7b086 std::_Locinfo::_Locinfo_ctor 2 API calls 18527->18529 18530 d7f517 _ValidateLocalCookies 18527->18530 18531 d7f4ad std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 18527->18531 18529->18531 18530->18524 18532 d63265 18531->18532 18533 d6326f 18532->18533 18535 d63280 18532->18535 18534 d71c86 __freea RtlAllocateHeap 18533->18534 18533->18535 18534->18535 18535->18530 18537 d4ab55 18536->18537 18538 d4aba3 18537->18538 18545 d4e8a0 18537->18545 18540 d4ab83 18540->17799 18542 d33459 18541->18542 18549 d70dc7 18542->18549 18546 d4e8ce 18545->18546 18548 d4e8f8 std::_Locinfo::_Locinfo_ctor 18545->18548 18547 d332d0 std::_Throw_Cpp_error 2 API calls 18546->18547 18547->18548 18548->18540 18550 d70ddb ___std_exception_copy 18549->18550 18555 d6e555 18550->18555 18552 d70df6 18553 d6898c ___std_exception_copy RtlAllocateHeap 18552->18553 18554 d33467 18553->18554 18554->17802 18554->17804 18556 d6e5a4 18555->18556 18557 d6e581 18555->18557 18556->18557 18559 d6e5ac 18556->18559 18558 d68bd3 ___std_exception_copy RtlAllocateHeap 18557->18558 18560 d6e599 _ValidateLocalCookies 18558->18560 18564 d6fa97 18559->18564 18560->18552 18582 d70afd 18564->18582 18567 d6fabc 18568 d68bd3 ___std_exception_copy RtlAllocateHeap 18567->18568 18569 d6e62d 18568->18569 18579 d6f27d 18569->18579 18572 d6e1c0 std::_Locinfo::_Locinfo_ctor 2 API calls 18574 d6fae4 std::_Locinfo::_Locinfo_ctor 18572->18574 18574->18569 18574->18572 18575 d6fbc0 18574->18575 18586 d6f48b 18574->18586 18589 d6fec4 18574->18589 18621 d7035f 18574->18621 18576 d68bd3 ___std_exception_copy RtlAllocateHeap 18575->18576 18577 d6fbda 18576->18577 18578 d68bd3 ___std_exception_copy RtlAllocateHeap 18577->18578 18578->18569 18580 d7b00c __freea RtlAllocateHeap 18579->18580 18581 d6f28d 18580->18581 18581->18560 18583 d70b08 18582->18583 18585 d6fab1 18582->18585 18584 d68bd3 ___std_exception_copy RtlAllocateHeap 18583->18584 18584->18585 18585->18567 18585->18569 18585->18574 18648 d6e832 18586->18648 18588 d6f4c6 18588->18574 18590 d6fee2 18589->18590 18591 d6fecb 18589->18591 18594 d68bd3 ___std_exception_copy RtlAllocateHeap 18590->18594 18600 d6ff21 18590->18600 18592 d703e4 18591->18592 18593 d70384 18591->18593 18591->18600 18597 d7041d 18592->18597 18598 d703e9 18592->18598 18595 d7040a 18593->18595 18596 d7038a 18593->18596 18599 d6ff16 18594->18599 18683 d6ebec 18595->18683 18609 d7038f 18596->18609 18614 d703db 18596->18614 18601 d70422 18597->18601 18602 d7043a 18597->18602 18603 d70416 18598->18603 18604 d703eb 18598->18604 18599->18574 18600->18574 18601->18595 18601->18614 18620 d703b5 18601->18620 18694 d70a3d 18602->18694 18690 d70a20 18603->18690 18611 d703fa 18604->18611 18612 d7039e 18604->18612 18609->18612 18613 d703c8 18609->18613 18609->18620 18611->18595 18616 d703fe 18611->18616 18619 d70443 _ValidateLocalCookies 18612->18619 18658 d70775 18612->18658 18613->18619 18668 d70906 18613->18668 18614->18619 18672 d6ed79 18614->18672 18616->18619 18679 d7099b 18616->18679 18619->18574 18620->18619 18697 d7c5ac 18620->18697 18622 d703e4 18621->18622 18623 d70384 18621->18623 18626 d7041d 18622->18626 18627 d703e9 18622->18627 18624 d7040a 18623->18624 18625 d7038a 18623->18625 18633 d6ebec 2 API calls 18624->18633 18637 d7038f 18625->18637 18638 d703db 18625->18638 18628 d70422 18626->18628 18629 d7043a 18626->18629 18630 d70416 18627->18630 18631 d703eb 18627->18631 18628->18624 18628->18638 18646 d703b5 18628->18646 18632 d70a3d 2 API calls 18629->18632 18634 d70a20 2 API calls 18630->18634 18635 d7039e 18631->18635 18641 d703fa 18631->18641 18632->18646 18633->18646 18634->18646 18636 d70775 2 API calls 18635->18636 18647 d70443 _ValidateLocalCookies 18635->18647 18636->18646 18637->18635 18639 d703c8 18637->18639 18637->18646 18640 d6ed79 2 API calls 18638->18640 18638->18647 18642 d70906 2 API calls 18639->18642 18639->18647 18640->18646 18641->18624 18643 d703fe 18641->18643 18642->18646 18644 d7099b RtlAllocateHeap 18643->18644 18643->18647 18644->18646 18645 d7c5ac 2 API calls 18645->18646 18646->18645 18646->18647 18647->18574 18649 d6ce69 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap 18648->18649 18650 d6e844 18649->18650 18651 d6e859 18650->18651 18654 d6e88c 18650->18654 18657 d6e874 std::_Locinfo::_Locinfo_ctor 18650->18657 18652 d68bd3 ___std_exception_copy RtlAllocateHeap 18651->18652 18652->18657 18653 d6e923 18655 d6ce12 RtlAllocateHeap 18653->18655 18654->18653 18656 d6ce12 RtlAllocateHeap 18654->18656 18655->18657 18656->18653 18657->18588 18659 d7078f 18658->18659 18703 d6e780 18659->18703 18661 d707ce 18714 d7c42b 18661->18714 18664 d70885 18666 d6e1c0 std::_Locinfo::_Locinfo_ctor 2 API calls 18664->18666 18667 d708b8 18664->18667 18665 d6e1c0 std::_Locinfo::_Locinfo_ctor 2 API calls 18665->18664 18666->18667 18667->18620 18667->18667 18669 d70921 18668->18669 18670 d70957 18669->18670 18671 d7c5ac 2 API calls 18669->18671 18670->18620 18671->18670 18673 d6ed8e 18672->18673 18674 d6edb0 18673->18674 18676 d6edd7 18673->18676 18675 d68bd3 ___std_exception_copy RtlAllocateHeap 18674->18675 18678 d6edcd 18675->18678 18677 d6e780 2 API calls 18676->18677 18676->18678 18677->18678 18678->18620 18682 d709b1 18679->18682 18680 d68bd3 ___std_exception_copy RtlAllocateHeap 18681 d709d2 18680->18681 18681->18620 18682->18680 18682->18681 18684 d6ec01 18683->18684 18685 d6ec23 18684->18685 18687 d6ec4a 18684->18687 18686 d68bd3 ___std_exception_copy RtlAllocateHeap 18685->18686 18689 d6ec40 18686->18689 18688 d6e780 2 API calls 18687->18688 18687->18689 18688->18689 18689->18620 18691 d70a2c 18690->18691 18775 d6ea5f 18691->18775 18693 d70a3c 18693->18620 18695 d6ed79 2 API calls 18694->18695 18696 d70a52 18695->18696 18696->18620 18698 d7c5c1 18697->18698 18699 d6e1c0 std::_Locinfo::_Locinfo_ctor 2 API calls 18698->18699 18701 d7c5ee std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 18698->18701 18702 d7c5c5 std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 18698->18702 18699->18701 18700 d68bd3 ___std_exception_copy RtlAllocateHeap 18700->18702 18701->18700 18701->18702 18702->18620 18704 d6e7a7 18703->18704 18705 d6e795 18703->18705 18704->18705 18706 d7b086 std::_Locinfo::_Locinfo_ctor 2 API calls 18704->18706 18705->18661 18707 d6e7cb 18706->18707 18708 d6e7d3 18707->18708 18709 d6e7de 18707->18709 18710 d7b00c __freea RtlAllocateHeap 18708->18710 18733 d6f297 18709->18733 18710->18705 18713 d7b00c __freea RtlAllocateHeap 18713->18705 18715 d7c460 18714->18715 18716 d7c43c 18714->18716 18715->18716 18718 d7c493 18715->18718 18717 d68bd3 ___std_exception_copy RtlAllocateHeap 18716->18717 18727 d70861 18717->18727 18719 d7c4cc 18718->18719 18721 d7c4fb 18718->18721 18736 d7c2cf 18719->18736 18720 d7c524 18725 d7c551 18720->18725 18726 d7c58b 18720->18726 18721->18720 18722 d7c529 18721->18722 18741 d7bb58 18722->18741 18728 d7c556 18725->18728 18729 d7c571 18725->18729 18768 d7be85 18726->18768 18727->18664 18727->18665 18751 d7c200 18728->18751 18761 d7c07c 18729->18761 18734 d7b00c __freea RtlAllocateHeap 18733->18734 18735 d6e7e9 18734->18735 18735->18713 18737 d7c2e5 18736->18737 18738 d7c2f0 18736->18738 18737->18727 18739 d79995 ___std_exception_copy RtlAllocateHeap 18738->18739 18740 d7c34b __Getctype 18739->18740 18740->18727 18742 d7bb6b 18741->18742 18743 d7bb9c 18742->18743 18744 d7bb7a 18742->18744 18746 d7bbb1 18743->18746 18748 d7bc04 18743->18748 18745 d68bd3 ___std_exception_copy RtlAllocateHeap 18744->18745 18750 d7bb92 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z std::locale::_Setgloballocale __allrem _strrchr 18745->18750 18747 d7be85 RtlAllocateHeap RtlAllocateHeap 18746->18747 18747->18750 18749 d6e1c0 std::_Locinfo::_Locinfo_ctor RtlAllocateHeap RtlAllocateHeap 18748->18749 18748->18750 18749->18750 18750->18727 18752 d847ad RtlAllocateHeap 18751->18752 18753 d7c230 18752->18753 18754 d846b3 RtlAllocateHeap 18753->18754 18755 d7c26e 18754->18755 18756 d7c275 18755->18756 18757 d7c2ae 18755->18757 18759 d7c287 18755->18759 18756->18727 18758 d7bf29 RtlAllocateHeap RtlAllocateHeap 18757->18758 18758->18756 18760 d7c112 RtlAllocateHeap RtlAllocateHeap 18759->18760 18760->18756 18762 d847ad RtlAllocateHeap 18761->18762 18763 d7c0ab 18762->18763 18764 d846b3 RtlAllocateHeap 18763->18764 18765 d7c0ec 18764->18765 18766 d7c0f3 18765->18766 18767 d7c112 RtlAllocateHeap RtlAllocateHeap 18765->18767 18766->18727 18767->18766 18769 d847ad RtlAllocateHeap 18768->18769 18770 d7beaf 18769->18770 18771 d846b3 RtlAllocateHeap 18770->18771 18772 d7befd 18771->18772 18773 d7bf04 18772->18773 18774 d7bf29 RtlAllocateHeap RtlAllocateHeap 18772->18774 18773->18727 18774->18773 18776 d6ea74 18775->18776 18777 d6eabd 18776->18777 18778 d6ea96 18776->18778 18780 d6e780 2 API calls 18777->18780 18781 d6eab3 18777->18781 18779 d68bd3 ___std_exception_copy RtlAllocateHeap 18778->18779 18779->18781 18780->18781 18781->18693 18783 d71408 18782->18783 18789 d71430 18782->18789 18784 d71437 18783->18784 18785 d71415 18783->18785 18783->18789 18790 d71353 18784->18790 18787 d68bd3 ___std_exception_copy RtlAllocateHeap 18785->18787 18787->18789 18788 d7146f 18788->17809 18789->17809 18791 d7135f std::locale::_Setgloballocale 18790->18791 18794 d713ae 18791->18794 18793 d7137a 18793->18788 18801 d7c89c 18794->18801 18821 d7c85e 18801->18821 18803 d713c6 18808 d71471 18803->18808 18804 d7c8ad 18804->18803 18805 d7b086 std::_Locinfo::_Locinfo_ctor 2 API calls 18804->18805 18806 d7c906 18805->18806 18807 d7b00c __freea RtlAllocateHeap 18806->18807 18807->18803 18809 d713e4 18808->18809 18812 d71483 18808->18812 18817 d7c947 18809->18817 18810 d71491 18811 d68bd3 ___std_exception_copy RtlAllocateHeap 18810->18811 18811->18809 18812->18809 18812->18810 18813 d714c7 std::_Locinfo::_Locinfo_ctor 18812->18813 18813->18809 18815 d7a1db RtlAllocateHeap 18813->18815 18837 d69a81 18813->18837 18843 d79668 18813->18843 18815->18813 18818 d7c952 18817->18818 18820 d713f0 18817->18820 18819 d69a81 4 API calls 18818->18819 18818->18820 18819->18820 18820->18793 18822 d7c86a 18821->18822 18823 d7c894 18822->18823 18824 d7a1db RtlAllocateHeap 18822->18824 18823->18804 18825 d7c885 18824->18825 18828 d83bd1 18825->18828 18827 d7c88b 18827->18804 18829 d83bde 18828->18829 18830 d83beb 18828->18830 18831 d716ef ___std_exception_copy RtlAllocateHeap 18829->18831 18832 d83bf7 18830->18832 18833 d716ef ___std_exception_copy RtlAllocateHeap 18830->18833 18834 d83be3 18831->18834 18832->18827 18835 d83c18 18833->18835 18834->18827 18836 d68c50 ___std_exception_copy RtlAllocateHeap 18835->18836 18836->18834 18838 d69a9a 18837->18838 18842 d69ac1 18837->18842 18839 d7a1db RtlAllocateHeap 18838->18839 18838->18842 18840 d69ab6 18839->18840 18841 d79668 4 API calls 18840->18841 18841->18842 18842->18813 18846 d79674 std::locale::_Setgloballocale 18843->18846 18844 d7967c 18844->18813 18845 d796b5 18847 d68bd3 ___std_exception_copy RtlAllocateHeap 18845->18847 18846->18844 18846->18845 18848 d796fb 18846->18848 18847->18844 18848->18844 18850 d79779 18848->18850 18851 d797a1 18850->18851 18863 d797c4 18850->18863 18852 d797a5 18851->18852 18854 d79800 18851->18854 18853 d68bd3 ___std_exception_copy RtlAllocateHeap 18852->18853 18853->18863 18855 d7981e 18854->18855 18869 d7262d 18854->18869 18864 d792be 18855->18864 18859 d79836 18859->18863 18872 d78e8f 18859->18872 18860 d7987d 18861 d798e6 WriteFile 18860->18861 18860->18863 18861->18863 18863->18844 18865 d83bd1 RtlAllocateHeap 18864->18865 18866 d792d0 18865->18866 18867 d6e1c0 std::_Locinfo::_Locinfo_ctor 2 API calls 18866->18867 18868 d792fe 18866->18868 18867->18868 18868->18859 18868->18860 18878 d7250c 18869->18878 18871 d72646 18871->18855 18873 d78ef7 18872->18873 18874 d6e1c0 std::_Locinfo::_Locinfo_ctor 2 API calls 18873->18874 18876 d78f08 std::_Locinfo::_Locinfo_ctor 18873->18876 18874->18876 18875 d7c716 RtlAllocateHeap RtlAllocateHeap 18875->18876 18876->18875 18877 d791be _ValidateLocalCookies 18876->18877 18877->18863 18877->18877 18879 d7e92e RtlAllocateHeap 18878->18879 18880 d7251e 18879->18880 18881 d72526 18880->18881 18882 d7253a SetFilePointerEx 18880->18882 18881->18871 18882->18881 18884 d6cf7f std::locale::_Setgloballocale 18883->18884 18885 d6cf89 18884->18885 18888 d6cfac 18884->18888 18886 d68bd3 ___std_exception_copy RtlAllocateHeap 18885->18886 18887 d6cfa4 18886->18887 18887->17815 18888->18887 18890 d6d00a 18888->18890 18891 d6d017 18890->18891 18892 d6d03a 18890->18892 18893 d68bd3 ___std_exception_copy RtlAllocateHeap 18891->18893 18894 d69a81 4 API calls 18892->18894 18902 d6d032 18892->18902 18893->18902 18895 d6d052 18894->18895 18904 d7b046 18895->18904 18898 d7a1db RtlAllocateHeap 18899 d6d066 18898->18899 18908 d78d1c 18899->18908 18902->18887 18903 d7b00c __freea RtlAllocateHeap 18903->18902 18905 d6d05a 18904->18905 18906 d7b05d 18904->18906 18905->18898 18906->18905 18907 d7b00c __freea RtlAllocateHeap 18906->18907 18907->18905 18909 d78d45 18908->18909 18912 d6d06d 18908->18912 18910 d78d94 18909->18910 18913 d78d6c 18909->18913 18911 d68bd3 ___std_exception_copy RtlAllocateHeap 18910->18911 18911->18912 18912->18902 18912->18903 18915 d78c8b 18913->18915 18916 d78c97 std::locale::_Setgloballocale 18915->18916 18918 d78cd6 18916->18918 18919 d78def 18916->18919 18918->18912 18931 d7e92e 18919->18931 18921 d78dff 18923 d7e92e RtlAllocateHeap 18921->18923 18929 d78e05 18921->18929 18930 d78e37 18921->18930 18926 d78e2e 18923->18926 18924 d7e92e RtlAllocateHeap 18927 d78e43 FindCloseChangeNotification 18924->18927 18925 d78e5d 18925->18918 18928 d7e92e RtlAllocateHeap 18926->18928 18927->18929 18928->18930 18944 d7e89d 18929->18944 18930->18924 18930->18929 18932 d7e950 18931->18932 18933 d7e93b 18931->18933 18935 d716dc RtlAllocateHeap 18932->18935 18937 d7e975 18932->18937 18950 d716dc 18933->18950 18938 d7e980 18935->18938 18937->18921 18940 d716ef ___std_exception_copy RtlAllocateHeap 18938->18940 18939 d716ef ___std_exception_copy RtlAllocateHeap 18941 d7e948 18939->18941 18942 d7e988 18940->18942 18941->18921 18943 d68c50 ___std_exception_copy RtlAllocateHeap 18942->18943 18943->18941 18945 d7e8ac 18944->18945 18946 d716ef ___std_exception_copy RtlAllocateHeap 18945->18946 18949 d7e8d6 18945->18949 18947 d7e918 18946->18947 18948 d716dc RtlAllocateHeap 18947->18948 18948->18949 18949->18925 18951 d79f85 std::locale::_Setgloballocale RtlAllocateHeap 18950->18951 18952 d716e1 18951->18952 18952->18939 18955 d5215f 18953->18955 19005 d7132b 18955->19005 18958 d4b4f0 18959 d4db10 18958->18959 18960 d4db56 18959->18960 18961 d4de3d 18959->18961 19057 d4ebb0 18960->19057 18963 d4fd70 2 API calls 18961->18963 18965 d4de87 18963->18965 18964 d4dba4 18967 d4fd70 2 API calls 18964->18967 18966 d4eda0 3 API calls 18965->18966 18974 d4df4f std::ios_base::_Ios_base_dtor 18965->18974 18969 d4dee2 18966->18969 18970 d4dbc1 18967->18970 18968 d4de38 std::ios_base::_Ios_base_dtor 18968->17823 18971 d375c0 2 API calls 18969->18971 19004 d4dcc3 std::ios_base::_Ios_base_dtor 18970->19004 19061 d4eda0 18970->19061 18972 d4df06 18971->18972 18976 d4f440 3 API calls 18972->18976 18974->18968 18975 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 18974->18975 18988 d4e0a1 std::_Throw_Cpp_error 18974->18988 18978 d4e06f 18975->18978 18990 d4df1f 18976->18990 18977 d4dc1c 19108 d375c0 18977->19108 19157 d490b0 18978->19157 18980 d4dc40 19138 d4f440 18980->19138 18982 d4e093 18984 d490b0 2 API calls 18982->18984 18984->18988 18985 d4dd82 18989 d435b0 RtlAllocateHeap 18985->18989 18986 d4e07d std::_Throw_Cpp_error 18995 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 18986->18995 18987 d4dc56 18987->18978 18992 d4dc6b 18987->18992 18996 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 18988->18996 18994 d4dd6c 18989->18994 18990->18982 18991 d37a20 RtlAllocateHeap 18990->18991 18991->18974 19147 d37a20 18992->19147 18993 d4dcec 19152 d435b0 18993->19152 18998 d435b0 RtlAllocateHeap 18994->18998 18995->18982 19000 d4e0b7 18996->19000 19001 d4de26 18998->19001 19002 d435b0 RtlAllocateHeap 19001->19002 19002->18968 19003 d4dc86 19003->18986 19003->19004 19004->18985 19004->18993 19006 d79e32 __Getctype RtlAllocateHeap 19005->19006 19007 d71336 19006->19007 19008 d7a11f __Getctype RtlAllocateHeap 19007->19008 19009 d5225f 19008->19009 19010 d4fd70 19009->19010 19013 d4fd84 19010->19013 19017 d4fde4 19010->19017 19012 d4ff6c 19012->18958 19016 d4fdc2 19013->19016 19024 d59e20 19013->19024 19016->19017 19018 d59e20 2 API calls 19016->19018 19020 d4fe58 19016->19020 19019 d4fe74 19017->19019 19046 d501e0 19017->19046 19018->19020 19019->18958 19020->19019 19042 d51430 19020->19042 19022 d4fecc 19022->19012 19023 d59e20 2 API calls 19022->19023 19050 d508f0 19022->19050 19023->19022 19025 d59f76 19024->19025 19026 d59e62 19024->19026 19028 d33330 2 API calls 19025->19028 19027 d59e7c 19026->19027 19029 d59eca 19026->19029 19030 d59eba 19026->19030 19033 d63662 std::_Facet_Register 2 API calls 19027->19033 19031 d59f7b 19028->19031 19036 d63662 std::_Facet_Register 2 API calls 19029->19036 19039 d59e9a std::_Locinfo::_Locinfo_ctor 19029->19039 19030->19027 19030->19031 19032 d32b50 Concurrency::cancel_current_task 2 API calls 19031->19032 19034 d59f80 19032->19034 19035 d59e8f 19033->19035 19037 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 19034->19037 19035->19034 19035->19039 19036->19039 19038 d59f85 19037->19038 19040 d577d0 RtlAllocateHeap 19039->19040 19041 d59f47 19040->19041 19041->19016 19043 d51443 19042->19043 19044 d51471 19043->19044 19045 d59e20 2 API calls 19043->19045 19044->19017 19045->19044 19047 d501f0 19046->19047 19048 d59e20 2 API calls 19047->19048 19049 d50260 19047->19049 19048->19047 19049->19022 19051 d51430 2 API calls 19050->19051 19054 d508fc 19051->19054 19052 d5090a 19052->19022 19053 d59e20 RtlAllocateHeap RtlAllocateHeap 19056 d50995 19053->19056 19054->19052 19055 d59e20 2 API calls 19054->19055 19054->19056 19055->19054 19056->19052 19056->19053 19058 d4ec6d 19057->19058 19160 d516c0 19058->19160 19060 d4ecdf 19060->18964 19062 d4ee46 19061->19062 19087 d4ef1f std::ios_base::_Ios_base_dtor 19061->19087 19063 d4f425 19062->19063 19066 d4e8a0 2 API calls 19062->19066 19070 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 19063->19070 19064 d48f00 std::_Throw_Cpp_error 2 API calls 19065 d4ef5b 19064->19065 19067 d4ef6a 19065->19067 19076 d4f191 19065->19076 19068 d4ee79 19066->19068 19069 d4f440 3 API calls 19067->19069 19071 d48f00 std::_Throw_Cpp_error 2 API calls 19068->19071 19072 d4ef79 19069->19072 19073 d4f42f 19070->19073 19075 d4ee93 19071->19075 19082 d33040 std::_Throw_Cpp_error 2 API calls 19072->19082 19074 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 19073->19074 19077 d4f434 19074->19077 19078 d48f00 std::_Throw_Cpp_error 2 API calls 19075->19078 19076->19076 19079 d33040 std::_Throw_Cpp_error 2 API calls 19076->19079 19080 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 19077->19080 19081 d4eee3 19078->19081 19083 d4f1c9 19079->19083 19107 d4f375 std::ios_base::_Ios_base_dtor 19080->19107 19081->19063 19081->19087 19084 d4efba 19082->19084 19085 d4fbf0 2 API calls 19083->19085 19088 d48f00 std::_Throw_Cpp_error 2 API calls 19084->19088 19089 d4f1e0 19085->19089 19086 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 19090 d4f43e 19086->19090 19087->19064 19091 d4efcd 19088->19091 19092 d48f00 std::_Throw_Cpp_error 2 API calls 19089->19092 19270 d4e710 19091->19270 19098 d4f22f std::ios_base::_Ios_base_dtor 19092->19098 19094 d4f019 19095 d48f00 std::_Throw_Cpp_error 2 API calls 19094->19095 19096 d4f032 19095->19096 19097 d48f00 std::_Throw_Cpp_error 2 API calls 19096->19097 19101 d4f081 std::ios_base::_Ios_base_dtor 19097->19101 19098->19077 19099 d4f161 std::ios_base::_Ios_base_dtor 19098->19099 19099->19099 19100 d33040 std::_Throw_Cpp_error 2 API calls 19099->19100 19106 d4f3f2 std::ios_base::_Ios_base_dtor 19099->19106 19102 d4f30c 19100->19102 19101->19073 19101->19099 19103 d4fbf0 2 API calls 19102->19103 19104 d4f323 19103->19104 19105 d48f00 std::_Throw_Cpp_error 2 API calls 19104->19105 19105->19107 19106->18977 19107->19086 19107->19106 19275 d34e30 19108->19275 19111 d34e30 2 API calls 19112 d3762b 19111->19112 19113 d4ace0 2 API calls 19112->19113 19114 d37640 19113->19114 19115 d4abb0 2 API calls 19114->19115 19116 d37656 19115->19116 19117 d4e710 2 API calls 19116->19117 19118 d3766d std::ios_base::_Ios_base_dtor 19117->19118 19119 d37a09 19118->19119 19122 d3770a std::ios_base::_Ios_base_dtor 19118->19122 19120 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 19119->19120 19121 d37a0e 19120->19121 19123 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 19121->19123 19125 d37350 2 API calls 19122->19125 19124 d37a13 19123->19124 19126 d377a4 19125->19126 19127 d48f00 std::_Throw_Cpp_error 2 API calls 19126->19127 19128 d377b9 19127->19128 19129 d4e710 2 API calls 19128->19129 19130 d3780c 19129->19130 19131 d48f00 std::_Throw_Cpp_error 2 API calls 19130->19131 19132 d37828 19131->19132 19133 d4ad80 2 API calls 19132->19133 19134 d37879 std::ios_base::_Ios_base_dtor 19133->19134 19134->19121 19135 d37975 std::ios_base::_Ios_base_dtor 19134->19135 19136 d372b0 2 API calls 19135->19136 19137 d379ca 19136->19137 19137->18980 19139 d4f630 19138->19139 19146 d4f4c9 std::ios_base::_Ios_base_dtor std::_Locinfo::_Locinfo_ctor 19138->19146 19139->18987 19141 d4f647 19143 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 19141->19143 19142 d332d0 std::_Throw_Cpp_error 2 API calls 19142->19146 19145 d4f651 19143->19145 19144 d48f00 std::_Throw_Cpp_error 2 API calls 19144->19146 19145->18987 19145->19145 19146->19139 19146->19141 19146->19142 19146->19144 19279 d334a0 19146->19279 19148 d64b68 ___std_exception_destroy RtlAllocateHeap 19147->19148 19149 d37a61 19148->19149 19150 d64b68 ___std_exception_destroy RtlAllocateHeap 19149->19150 19151 d37a77 19150->19151 19151->19003 19153 d435f1 std::ios_base::_Ios_base_dtor 19152->19153 19154 d435d1 19152->19154 19153->18994 19154->19153 19155 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 19154->19155 19156 d43625 19155->19156 19156->18994 19286 d46590 19157->19286 19163 d517d0 19160->19163 19162 d516da std::locale::_Setgloballocale 19162->19060 19164 d51809 19163->19164 19170 d51838 19163->19170 19165 d51923 19164->19165 19168 d5181b 19164->19168 19180 d51990 19165->19180 19168->19170 19171 d59f90 19168->19171 19170->19162 19172 d5a0a3 19171->19172 19173 d59fc2 19171->19173 19174 d33330 2 API calls 19172->19174 19190 d5d180 19173->19190 19175 d5a000 std::_Locinfo::_Locinfo_ctor 19174->19175 19177 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 19175->19177 19179 d5a05f std::ios_base::_Ios_base_dtor 19175->19179 19178 d5a0ad 19177->19178 19179->19170 19181 d61cda 2 API calls 19180->19181 19183 d5199a 19181->19183 19182 d51928 19183->19182 19184 d32cf0 std::_Throw_Cpp_error 2 API calls 19183->19184 19185 d51a03 19184->19185 19186 d4ace0 2 API calls 19185->19186 19187 d51a18 19186->19187 19198 d37cf0 19187->19198 19189 d51a2d std::_Throw_Cpp_error 19191 d5d1c9 19190->19191 19192 d5d189 19190->19192 19191->19191 19192->19191 19193 d5d1a0 19192->19193 19195 d63662 std::_Facet_Register 2 API calls 19192->19195 19194 d5d1a9 19193->19194 19196 d63662 std::_Facet_Register 2 API calls 19193->19196 19194->19175 19195->19193 19197 d5d1c2 19196->19197 19197->19175 19229 d37350 19198->19229 19200 d37d80 19247 d4ad80 19200->19247 19202 d37d94 19203 d37dcd std::ios_base::_Ios_base_dtor 19202->19203 19205 d37e33 19202->19205 19251 d372b0 19203->19251 19207 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 19205->19207 19206 d37dfd 19206->19189 19208 d37e38 19207->19208 19209 d37350 2 API calls 19208->19209 19210 d37ece 19209->19210 19211 d4ad80 2 API calls 19210->19211 19212 d37ee2 19211->19212 19214 d37f1b std::ios_base::_Ios_base_dtor 19212->19214 19216 d37f81 19212->19216 19213 d372b0 2 API calls 19215 d37f4b 19213->19215 19214->19213 19215->19189 19217 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 19216->19217 19218 d37f86 19217->19218 19219 d37350 2 API calls 19218->19219 19220 d38029 19219->19220 19221 d4ad80 2 API calls 19220->19221 19222 d3803d 19221->19222 19223 d38076 std::ios_base::_Ios_base_dtor 19222->19223 19225 d380df 19222->19225 19224 d372b0 2 API calls 19223->19224 19226 d380aa 19224->19226 19227 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 19225->19227 19226->19189 19228 d380e4 19227->19228 19228->19189 19254 d34d70 19229->19254 19238 d48f00 std::_Throw_Cpp_error 2 API calls 19239 d373e6 19238->19239 19240 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 19239->19240 19241 d37476 std::ios_base::_Ios_base_dtor 19239->19241 19242 d374c4 19240->19242 19241->19200 19243 d64b68 ___std_exception_destroy RtlAllocateHeap 19242->19243 19244 d37511 19243->19244 19245 d64b68 ___std_exception_destroy RtlAllocateHeap 19244->19245 19246 d37527 std::ios_base::_Ios_base_dtor 19245->19246 19246->19200 19248 d4adb4 19247->19248 19249 d48f00 std::_Throw_Cpp_error 2 API calls 19248->19249 19250 d4adbf 19249->19250 19250->19202 19252 d64b05 ___std_exception_copy 2 API calls 19251->19252 19253 d3731a 19252->19253 19253->19206 19255 d34da6 19254->19255 19256 d34dd8 19255->19256 19257 d33040 std::_Throw_Cpp_error RtlAllocateHeap RtlAllocateHeap 19255->19257 19258 d4ac50 19256->19258 19257->19256 19259 d4ac81 19258->19259 19260 d4acd3 19259->19260 19261 d4e8a0 RtlAllocateHeap RtlAllocateHeap 19259->19261 19262 d373af 19261->19262 19263 d4abb0 19262->19263 19264 d4abe1 19263->19264 19264->19264 19265 d48f00 std::_Throw_Cpp_error RtlAllocateHeap RtlAllocateHeap 19264->19265 19266 d373c2 19265->19266 19267 d4ae20 19266->19267 19268 d4e710 RtlAllocateHeap RtlAllocateHeap 19267->19268 19269 d373d1 19268->19269 19269->19238 19271 d4e753 19270->19271 19272 d4e758 std::_Locinfo::_Locinfo_ctor 19271->19272 19273 d332d0 std::_Throw_Cpp_error 2 API calls 19271->19273 19272->19094 19274 d4e843 std::_Locinfo::_Locinfo_ctor 19273->19274 19274->19094 19276 d34e66 19275->19276 19276->19276 19277 d34ea8 19276->19277 19278 d33040 std::_Throw_Cpp_error 2 API calls 19276->19278 19277->19111 19278->19277 19282 d33380 19279->19282 19283 d33399 19282->19283 19284 d70dc7 2 API calls 19283->19284 19285 d333a7 19284->19285 19285->19146 19287 d64b05 ___std_exception_copy 2 API calls 19286->19287 19288 d465ce 19287->19288 19289 d64b05 ___std_exception_copy 2 API calls 19288->19289 19290 d46601 19289->19290 19290->18986 19292 d88e07 19291->19292 19296 d88bf8 19291->19296 19292->17826 19294 d88d28 std::locale::_Setgloballocale 19294->19292 19295 d33130 2 API calls 19294->19295 19295->19294 19296->19294 19298 d687a0 19296->19298 19307 d33130 19296->19307 19299 d687d3 19298->19299 19304 d687b7 19298->19304 19300 d79e32 __Getctype RtlAllocateHeap 19299->19300 19301 d687d8 19300->19301 19302 d7a11f __Getctype RtlAllocateHeap 19301->19302 19303 d687e8 19302->19303 19303->19304 19305 d79a29 2 API calls 19303->19305 19304->19296 19306 d6881a 19305->19306 19306->19296 19308 d332b3 19307->19308 19309 d3316f 19307->19309 19310 d33330 2 API calls 19308->19310 19311 d33189 19309->19311 19313 d331d7 19309->19313 19314 d331c7 19309->19314 19312 d332b8 19310->19312 19316 d63662 std::_Facet_Register 2 API calls 19311->19316 19315 d32b50 Concurrency::cancel_current_task 2 API calls 19312->19315 19317 d63662 std::_Facet_Register 2 API calls 19313->19317 19320 d3319c std::_Locinfo::_Locinfo_ctor 19313->19320 19314->19311 19314->19312 19315->19320 19316->19320 19317->19320 19318 d68c60 std::_Throw_Cpp_error RtlAllocateHeap 19319 d332c2 19318->19319 19320->19318 19321 d3326b std::ios_base::_Ios_base_dtor 19320->19321 19321->19296 19323 d6363d GetSystemTimePreciseAsFileTime 19322->19323 19324 d63067 19322->19324 19323->19324 19324->17483 19625 4c409f3 19626 4c409f9 19625->19626 19627 4c40a66 GetCurrentHwProfileW 19626->19627 19628 4c40a5e GetCurrentHwProfileW 19627->19628 19630 4c40b0e 19628->19630

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • setsockopt.WS2_32(000003F4,0000FFFF,00001006,?,00000008), ref: 00DF4F56
                                                                  • recv.WS2_32(?,00000004,00000002), ref: 00DF4F71
                                                                  • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 00DF4FF3
                                                                  • recv.WS2_32(00000000,0000000C,00000008), ref: 00DF5014
                                                                  • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?,00000000), ref: 00DF50B0
                                                                    • Part of subcall function 00DF5940: WSAStartup.WS2_32 ref: 00DF596B
                                                                    • Part of subcall function 00DF5940: socket.WS2_32(?,?,?,?,?,?,00EB6328,?,?), ref: 00DF5A0E
                                                                    • Part of subcall function 00DF5940: connect.WS2_32(00000000,00E86B31,?,?,?,?,00EB6328,?,?), ref: 00DF5A22
                                                                    • Part of subcall function 00DF5940: closesocket.WS2_32(00000000), ref: 00DF5A2D
                                                                  • recv.WS2_32(00000000,?,00000008), ref: 00DF50CB
                                                                  • recv.WS2_32(?,00000004,00000008), ref: 00DF51D3
                                                                  • __Xtime_get_ticks.LIBCPMT ref: 00DF51DA
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DF51E8
                                                                  • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 00DF5261
                                                                  • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 00DF5269
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3340659649.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000006.00000002.3340632023.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3340659649.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3343537371.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346256466.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346555140.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346606111.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: recv$Sleepsetsockopt$StartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectsocket
                                                                  • String ID: (c
                                                                  • API String ID: 301102601-1781735918
                                                                  • Opcode ID: ee007994f5ea041a7c6919a9058a197909c7d483615e1440852a7b8b0da49fc6
                                                                  • Instruction ID: 0fc12df7a719e3c435792504b28f5379a69fe153a7bb24a65319d061ae4a99b3
                                                                  • Opcode Fuzzy Hash: ee007994f5ea041a7c6919a9058a197909c7d483615e1440852a7b8b0da49fc6
                                                                  • Instruction Fuzzy Hash: DBB1BB70D003089FEB14DFA8DC89BAEBBB1EF45304F144218E654BB2E2D7B45948DBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 57 d39280-d392dd call d463b0 60 d39413-d39521 call d32df0 call e177d0 57->60 61 d392e3-d392e9 57->61 77 d39523-d39535 60->77 78 d39537-d3953f call d48dc0 60->78 63 d392f0-d39313 61->63 65 d39315-d3931f 63->65 66 d39324-d39331 63->66 67 d39403-d39406 65->67 68 d39333-d3933d 66->68 69 d39342-d3934f 66->69 71 d39409-d3940d 67->71 68->67 72 d39351-d3935b 69->72 73 d39360-d3936d 69->73 71->60 71->63 72->67 75 d3936f-d39379 73->75 76 d3937e-d3938b 73->76 75->67 79 d39399-d393a6 76->79 80 d3938d-d39397 76->80 81 d39544-d39597 call e177d0 * 2 77->81 78->81 83 d393b4-d393c1 79->83 84 d393a8-d393b2 79->84 80->67 94 d395cb-d395e1 call e177d0 81->94 95 d39599-d395c8 call e177d0 call d65260 81->95 86 d393c3-d393cd 83->86 87 d393cf-d393dc 83->87 84->67 86->67 89 d393ea-d393f4 87->89 90 d393de-d393e8 87->90 89->71 93 d393f6-d393ff 89->93 90->67 93->67 101 d396e2 94->101 102 d395e7-d395ed 94->102 95->94 105 d396e6-d396f0 101->105 104 d395f0-d396ce WSASend 102->104 124 d396d4-d396dc 104->124 125 d3975f-d39763 104->125 106 d396f2-d396fe 105->106 107 d3971e-d3973d 105->107 108 d39700-d3970e 106->108 109 d39714-d3971b call d638e3 106->109 110 d3976f-d39796 107->110 111 d3973f-d3974b 107->111 108->109 113 d39797-d397fe call d68c60 call d32df0 * 2 108->113 109->107 115 d39765-d3976c call d638e3 111->115 116 d3974d-d3975b 111->116 115->110 116->113 118 d3975d 116->118 118->115 124->101 124->104 125->105
                                                                  APIs
                                                                  • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,00E7A4DC,00000000,761B23A0,-00EB6880), ref: 00D396C9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3340659649.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000006.00000002.3340632023.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3340659649.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3343537371.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346256466.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346555140.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346606111.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: Send
                                                                  • String ID: 4oST$4oST$Ws2_32.dll
                                                                  • API String ID: 121738739-1839276265
                                                                  • Opcode ID: 78de2c4e534ae89187583c175fe626b7bf0438045e1a264f4c37563ac9ff4613
                                                                  • Instruction ID: ebe7f5bfad850d432c2270ee04006131c097adad647919464ad1a51ca74e18a8
                                                                  • Opcode Fuzzy Hash: 78de2c4e534ae89187583c175fe626b7bf0438045e1a264f4c37563ac9ff4613
                                                                  • Instruction Fuzzy Hash: 4402D070D04288DFDF25CFA4C8A07EDFBB0EF55710F244289E4856B686D7B05986CBA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 130 df5940-df5972 WSAStartup 131 df5978-df59a2 call e177d0 * 2 130->131 132 df5a46-df5a4f 130->132 137 df59ae-df59f4 131->137 138 df59a4-df59a8 131->138 140 df59f6-df59fc 137->140 141 df5a40-df5a45 137->141 138->132 138->137 142 df59fe 140->142 143 df5a54-df5a5e 140->143 141->132 145 df5a04-df5a18 socket 142->145 143->141 148 df5a60-df5a68 143->148 145->141 147 df5a1a-df5a2a connect 145->147 149 df5a2c-df5a34 closesocket 147->149 150 df5a50 147->150 149->145 151 df5a36-df5a3a 149->151 150->143 151->141
                                                                  APIs
                                                                  • WSAStartup.WS2_32 ref: 00DF596B
                                                                  • socket.WS2_32(?,?,?,?,?,?,00EB6328,?,?), ref: 00DF5A0E
                                                                  • connect.WS2_32(00000000,00E86B31,?,?,?,?,00EB6328,?,?), ref: 00DF5A22
                                                                  • closesocket.WS2_32(00000000), ref: 00DF5A2D
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3340659649.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000006.00000002.3340632023.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3340659649.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3343537371.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346256466.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346555140.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346606111.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: Startupclosesocketconnectsocket
                                                                  • String ID:
                                                                  • API String ID: 3098855095-0
                                                                  • Opcode ID: b5c772f6d29a28b27fd8506a53116ef48f0215fa8c47b4fbead83912e7d80fc6
                                                                  • Instruction ID: d2dc8e7514cb218c11dd757ae374f246f8b706c69434c0652b72f6c2ca075f5d
                                                                  • Opcode Fuzzy Hash: b5c772f6d29a28b27fd8506a53116ef48f0215fa8c47b4fbead83912e7d80fc6
                                                                  • Instruction Fuzzy Hash: 8631F5325047045BC7209B659C85A7BB7E4FFC5334F056F19FAA8A32E0E370A81486A2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 152 4c4082d-4c40839 153 4c407d8-4c40821 152->153 154 4c4083a-4c4097a 152->154 153->154 174 4c4097b 154->174 175 4c4097d-4c409b8 call 4c409c0 174->175 180 4c409ba-4c409bb 175->180 180->174 181 4c409bd-4c40ae7 call 4c40a66 180->181 194 4c40af8-4c40b04 GetCurrentHwProfileW 181->194 195 4c40b0e-4c40e00 call 4c40d73 call 4c40e08 194->195 228 4c40e02-4c40e07 195->228 229 4c40e53-4c40e59 195->229 230 4c40e60-4c40e77 229->230 231 4c40e5b-4c40e5c 229->231 231->230
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: EYjN
                                                                  • API String ID: 0-3767897494
                                                                  • Opcode ID: 45a5265308ad8ca71f2d95ee942cc40d8b237767682fe26feb6d85315dea5b24
                                                                  • Instruction ID: 81a00d081dd075f466e801a922d966870d82178e63671abea716d44f3ab77dcf
                                                                  • Opcode Fuzzy Hash: 45a5265308ad8ca71f2d95ee942cc40d8b237767682fe26feb6d85315dea5b24
                                                                  • Instruction Fuzzy Hash: B59190EB78C114BDB242C1832B60AFB676ED6D67307348437FA07C6542F2946E8E2172
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 233 4c407d3-4c4097a 255 4c4097b 233->255 256 4c4097d-4c409b8 call 4c409c0 255->256 261 4c409ba-4c409bb 256->261 261->255 262 4c409bd-4c40ae7 call 4c40a66 261->262 275 4c40af8-4c40b04 GetCurrentHwProfileW 262->275 276 4c40b0e-4c40e00 call 4c40d73 call 4c40e08 275->276 309 4c40e02-4c40e07 276->309 310 4c40e53-4c40e59 276->310 311 4c40e60-4c40e77 310->311 312 4c40e5b-4c40e5c 310->312 312->311
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: EYjN
                                                                  • API String ID: 0-3767897494
                                                                  • Opcode ID: 6571cdda9f31f7165aaacee49cd1b15722f2945ae727fb3a548e22c80779dd0f
                                                                  • Instruction ID: 07f4b144e7221bcb628696985cafa2a3becacccc2c32a6eee37dd75dd90d0e7b
                                                                  • Opcode Fuzzy Hash: 6571cdda9f31f7165aaacee49cd1b15722f2945ae727fb3a548e22c80779dd0f
                                                                  • Instruction Fuzzy Hash: F89180EB78C114BDB142C1832B60AFB576ED6D67307348437FA07C6542F2946E8E6172
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 314 4c407ce-4c4097a 335 4c4097b 314->335 336 4c4097d-4c409b8 call 4c409c0 335->336 341 4c409ba-4c409bb 336->341 341->335 342 4c409bd-4c40ae7 call 4c40a66 341->342 355 4c40af8-4c40b04 GetCurrentHwProfileW 342->355 356 4c40b0e-4c40e00 call 4c40d73 call 4c40e08 355->356 389 4c40e02-4c40e07 356->389 390 4c40e53-4c40e59 356->390 391 4c40e60-4c40e77 390->391 392 4c40e5b-4c40e5c 390->392 392->391
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: EYjN
                                                                  • API String ID: 0-3767897494
                                                                  • Opcode ID: 7e87bfcbf5e1e134e96051c156710e3dc03c2746f94c9589e0b8e8ab00a0b9b8
                                                                  • Instruction ID: 9647f9ec236685a8be693dbc97b40c94acb984a0bd8eac40e5e7e1f82eddc2a9
                                                                  • Opcode Fuzzy Hash: 7e87bfcbf5e1e134e96051c156710e3dc03c2746f94c9589e0b8e8ab00a0b9b8
                                                                  • Instruction Fuzzy Hash: F9918FEB78C124BDB242C1832B60AF7676ED6D67307348437FA07C6542F2946E8E6172
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 394 4c40847-4c40850 395 4c40852-4c40854 394->395 396 4c407ef-4c40842 394->396 395->396 398 4c40856-4c40858 395->398 400 4c4085a-4c4097a 396->400 398->400 418 4c4097b 400->418 419 4c4097d-4c409b8 call 4c409c0 418->419 424 4c409ba-4c409bb 419->424 424->418 425 4c409bd-4c40ae7 call 4c40a66 424->425 438 4c40af8-4c40b04 GetCurrentHwProfileW 425->438 439 4c40b0e-4c40e00 call 4c40d73 call 4c40e08 438->439 472 4c40e02-4c40e07 439->472 473 4c40e53-4c40e59 439->473 474 4c40e60-4c40e77 473->474 475 4c40e5b-4c40e5c 473->475 475->474
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: EYjN
                                                                  • API String ID: 0-3767897494
                                                                  • Opcode ID: a4f73dda63c77cd2402050a0b7702809b37d5047035fe9ea2c0b45f318c847de
                                                                  • Instruction ID: 11cbdba8a412e9d4e42c8e39c4ba571869d00beea510823462638b6a54b826c2
                                                                  • Opcode Fuzzy Hash: a4f73dda63c77cd2402050a0b7702809b37d5047035fe9ea2c0b45f318c847de
                                                                  • Instruction Fuzzy Hash: 6391A2EB78C114BDB242C1876B60AFB676ED6D67307348437FA07C6542F2946E8E2172
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 477 4c4080a-4c40816 478 4c4088f-4c40896 477->478 479 4c40818-4c40883 477->479 480 4c40897-4c4097a 478->480 479->480 498 4c4097b 480->498 499 4c4097d-4c409b8 call 4c409c0 498->499 504 4c409ba-4c409bb 499->504 504->498 505 4c409bd-4c40ae7 call 4c40a66 504->505 518 4c40af8-4c40b04 GetCurrentHwProfileW 505->518 519 4c40b0e-4c40e00 call 4c40d73 call 4c40e08 518->519 552 4c40e02-4c40e07 519->552 553 4c40e53-4c40e59 519->553 554 4c40e60-4c40e77 553->554 555 4c40e5b-4c40e5c 553->555 555->554
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: EYjN
                                                                  • API String ID: 0-3767897494
                                                                  • Opcode ID: a2b6268db7cffb7a5ea9cf524f395a60d04d9194eddba9c4f778a7bbdb094f4b
                                                                  • Instruction ID: 31971836770aa28f12c26db1939c3b223f59ee1d9d5701427b1e33b3ae2a2aa5
                                                                  • Opcode Fuzzy Hash: a2b6268db7cffb7a5ea9cf524f395a60d04d9194eddba9c4f778a7bbdb094f4b
                                                                  • Instruction Fuzzy Hash: 9991B1EB78C114BDB242C1932B60AF7676ED6D6730734847BFA07C6142F2942E8E6132
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 557 4c407f5-4c4097a 577 4c4097b 557->577 578 4c4097d-4c409b8 call 4c409c0 577->578 583 4c409ba-4c409bb 578->583 583->577 584 4c409bd-4c40ae7 call 4c40a66 583->584 597 4c40af8-4c40b04 GetCurrentHwProfileW 584->597 598 4c40b0e-4c40e00 call 4c40d73 call 4c40e08 597->598 631 4c40e02-4c40e07 598->631 632 4c40e53-4c40e59 598->632 633 4c40e60-4c40e77 632->633 634 4c40e5b-4c40e5c 632->634 634->633
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: EYjN
                                                                  • API String ID: 0-3767897494
                                                                  • Opcode ID: 86862e4c3dc5c33510404b79fc32f82ba7c1922a5d42a8a280d50ebbcee66c6c
                                                                  • Instruction ID: 6439cd81823af13645d205cd451b0325b5fcb7be66494b99274f768cdbb2d3ce
                                                                  • Opcode Fuzzy Hash: 86862e4c3dc5c33510404b79fc32f82ba7c1922a5d42a8a280d50ebbcee66c6c
                                                                  • Instruction Fuzzy Hash: 699191EB78C115BDB242C1872B60AF7676ED6D67307348437FA07C6542F2946E8E2172
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 636 4c40873-4c40877 637 4c4083c-4c4086e 636->637 638 4c40879-4c4097a 636->638 637->638 654 4c4097b 638->654 655 4c4097d-4c409b8 call 4c409c0 654->655 660 4c409ba-4c409bb 655->660 660->654 661 4c409bd-4c40ae7 call 4c40a66 660->661 674 4c40af8-4c40b04 GetCurrentHwProfileW 661->674 675 4c40b0e-4c40e00 call 4c40d73 call 4c40e08 674->675 708 4c40e02-4c40e07 675->708 709 4c40e53-4c40e59 675->709 710 4c40e60-4c40e77 709->710 711 4c40e5b-4c40e5c 709->711 711->710
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: EYjN
                                                                  • API String ID: 0-3767897494
                                                                  • Opcode ID: 500bdd921f45adc9fcc48f2c272e6133500800758e84bbd12582dd02749e3ea0
                                                                  • Instruction ID: 10680728a192c1d533ed24fc43902eddb392c26ff8fbb802b66e2270dcb490d9
                                                                  • Opcode Fuzzy Hash: 500bdd921f45adc9fcc48f2c272e6133500800758e84bbd12582dd02749e3ea0
                                                                  • Instruction Fuzzy Hash: 0091A2EB78C154BDB242C1932B20AF7576ED6D67307348437FA07C6542F2946E8E6131
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 713 4c40863-4c4097a 729 4c4097b 713->729 730 4c4097d-4c409b8 call 4c409c0 729->730 735 4c409ba-4c409bb 730->735 735->729 736 4c409bd-4c40ae7 call 4c40a66 735->736 749 4c40af8-4c40b04 GetCurrentHwProfileW 736->749 750 4c40b0e-4c40e00 call 4c40d73 call 4c40e08 749->750 783 4c40e02-4c40e07 750->783 784 4c40e53-4c40e59 750->784 785 4c40e60-4c40e77 784->785 786 4c40e5b-4c40e5c 784->786 786->785
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: EYjN
                                                                  • API String ID: 0-3767897494
                                                                  • Opcode ID: f6c9529c66d902aad383361e42631a621d791121aeb07d93766a3b48c9281bbf
                                                                  • Instruction ID: b8e8f7e42ed1e442c3b54984238e10f31683a6939084e6314389664b622c80d2
                                                                  • Opcode Fuzzy Hash: f6c9529c66d902aad383361e42631a621d791121aeb07d93766a3b48c9281bbf
                                                                  • Instruction Fuzzy Hash: 728180EB78C115BDB242C1932B60AFB576ED6D67307348437FA07C6542F2946E8E6132
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 788 4c40888-4c4097a 803 4c4097b 788->803 804 4c4097d-4c409b8 call 4c409c0 803->804 809 4c409ba-4c409bb 804->809 809->803 810 4c409bd-4c40ae7 call 4c40a66 809->810 823 4c40af8-4c40b04 GetCurrentHwProfileW 810->823 824 4c40b0e-4c40e00 call 4c40d73 call 4c40e08 823->824 857 4c40e02-4c40e07 824->857 858 4c40e53-4c40e59 824->858 859 4c40e60-4c40e77 858->859 860 4c40e5b-4c40e5c 858->860 860->859
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: EYjN
                                                                  • API String ID: 0-3767897494
                                                                  • Opcode ID: 04110d2b0fbbec23685106ee56e2aa5271d99515c83e5e0cdeedf42908e56ee3
                                                                  • Instruction ID: afed95c93a5808add8c4aa1fa3f3dbe2af1039d2fea3efb00ec81d518e20f9d2
                                                                  • Opcode Fuzzy Hash: 04110d2b0fbbec23685106ee56e2aa5271d99515c83e5e0cdeedf42908e56ee3
                                                                  • Instruction Fuzzy Hash: 998191EB78C124BDB242C1932B60AFB576ED6D67307348477FA07C6542F2942E8E6132
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 862 4c408c1-4c408d0 863 4c408b1-4c408bc 862->863 864 4c408d2 862->864 865 4c408d4-4c4097a 863->865 864->865 875 4c4097b 865->875 876 4c4097d-4c409b8 call 4c409c0 875->876 881 4c409ba-4c409bb 876->881 881->875 882 4c409bd-4c40ae7 call 4c40a66 881->882 895 4c40af8-4c40b04 GetCurrentHwProfileW 882->895 896 4c40b0e-4c40e00 call 4c40d73 call 4c40e08 895->896 929 4c40e02-4c40e07 896->929 930 4c40e53-4c40e59 896->930 931 4c40e60-4c40e77 930->931 932 4c40e5b-4c40e5c 930->932 932->931
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: EYjN
                                                                  • API String ID: 0-3767897494
                                                                  • Opcode ID: ae3e4568d92fda394de71c398400649b06fbeb8f44f23ba0772e1f16440e30d2
                                                                  • Instruction ID: b098ef2fdf829c2b4d7f0516ac86c5396a350ce83b22a5d6e01012937ae9f63b
                                                                  • Opcode Fuzzy Hash: ae3e4568d92fda394de71c398400649b06fbeb8f44f23ba0772e1f16440e30d2
                                                                  • Instruction Fuzzy Hash: 2C8191EB78C124BDB242C1972B60AF7676ED6D67307348437FA07C6542F2946E8E2132
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 934 4c408a8-4c4097a 945 4c4097b 934->945 946 4c4097d-4c409b8 call 4c409c0 945->946 951 4c409ba-4c409bb 946->951 951->945 952 4c409bd-4c40ae7 call 4c40a66 951->952 965 4c40af8-4c40b04 GetCurrentHwProfileW 952->965 966 4c40b0e-4c40e00 call 4c40d73 call 4c40e08 965->966 999 4c40e02-4c40e07 966->999 1000 4c40e53-4c40e59 966->1000 1001 4c40e60-4c40e77 1000->1001 1002 4c40e5b-4c40e5c 1000->1002 1002->1001
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: EYjN
                                                                  • API String ID: 0-3767897494
                                                                  • Opcode ID: 4595fa1450a7ac4c8cb187882e01f6dd4e938cb27d6e59b395eca2b02ef9109a
                                                                  • Instruction ID: 1fd40d1076e65191b7427df1ae8b37ae9386c2c1afa61ca513c526a03d326b32
                                                                  • Opcode Fuzzy Hash: 4595fa1450a7ac4c8cb187882e01f6dd4e938cb27d6e59b395eca2b02ef9109a
                                                                  • Instruction Fuzzy Hash: 108190EB78C154BDB242C1972B60AFB676ED6D67307348437FA07C6542F2946E8E2132
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1004 4c4091d-4c4092f 1005 4c40991-4c40996 1004->1005 1006 4c40931-4c4097a 1004->1006 1005->1006 1007 4c40998-4c4099a 1005->1007 1014 4c4097b 1006->1014 1009 4c4099c-4c409b8 call 4c409c0 1007->1009 1016 4c4097d-4c4098e 1009->1016 1017 4c409ba-4c409bb 1009->1017 1014->1016 1016->1009 1017->1014 1018 4c409bd-4c40ae7 call 4c40a66 1017->1018 1031 4c40af8-4c40b04 GetCurrentHwProfileW 1018->1031 1032 4c40b0e-4c40e00 call 4c40d73 call 4c40e08 1031->1032 1065 4c40e02-4c40e07 1032->1065 1066 4c40e53-4c40e59 1032->1066 1067 4c40e60-4c40e77 1066->1067 1068 4c40e5b-4c40e5c 1066->1068 1068->1067
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: EYjN
                                                                  • API String ID: 0-3767897494
                                                                  • Opcode ID: a2e89d935d1ea53debeed9d071de0ea008623df919554f0bb6931a271ed82e1d
                                                                  • Instruction ID: 6f339e1fe9d94da94725d526d67b5f5ecc72c6e9fff362d68dc1cfd624cfaa4e
                                                                  • Opcode Fuzzy Hash: a2e89d935d1ea53debeed9d071de0ea008623df919554f0bb6931a271ed82e1d
                                                                  • Instruction Fuzzy Hash: FF818FEB78C125BDB202C1932F60AF7676ED6D67707348467FA07C6542F2946E8E2132
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: EYjN
                                                                  • API String ID: 0-3767897494
                                                                  • Opcode ID: e1d0cb4674c309924bcb449001bfba276dcb24e45811cd1a948e63c42bceb5fe
                                                                  • Instruction ID: a259260722715fc237d0ddc6205bf7049002325c3c2ec8501f2353ea77ba1779
                                                                  • Opcode Fuzzy Hash: e1d0cb4674c309924bcb449001bfba276dcb24e45811cd1a948e63c42bceb5fe
                                                                  • Instruction Fuzzy Hash: 388180EB78C125BDB242D1932B60AF7676ED6D67307348427FA07C6542F2946E8E2132
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: EYjN
                                                                  • API String ID: 0-3767897494
                                                                  • Opcode ID: 681a8fb2d74d3615f361ed02b9a65164f3cb7d0dbc27934b6f5707e4e0b36ab1
                                                                  • Instruction ID: bc74bfe898b920d50a8cffca779326adcd63cc838ae6e3e1426aa0d98a1f6fb5
                                                                  • Opcode Fuzzy Hash: 681a8fb2d74d3615f361ed02b9a65164f3cb7d0dbc27934b6f5707e4e0b36ab1
                                                                  • Instruction Fuzzy Hash: 28718DEB78C125BCB242C1932B60AF7676ED6D67307348437FA07C6542F2946E8E2132
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: EYjN
                                                                  • API String ID: 0-3767897494
                                                                  • Opcode ID: 9cae3089284124bb169d69483a98d0e20cc83b501e80268b25713207a8feb468
                                                                  • Instruction ID: 9113d05f49c19a7cb57689ec3c6d760eeac303143cc776d00c768713b364b3f5
                                                                  • Opcode Fuzzy Hash: 9cae3089284124bb169d69483a98d0e20cc83b501e80268b25713207a8feb468
                                                                  • Instruction Fuzzy Hash: 12718EEB78C125BCB202C1932B20AF7676ED6C67307348477FA07C6542F2946E8E2172
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: EYjN
                                                                  • API String ID: 0-3767897494
                                                                  • Opcode ID: bd5d6f04869c3d78bec0f69720e3ba1c7714286d283eb6ece160fcace8e433a9
                                                                  • Instruction ID: a319e54b4542aea3dec552fd6999480fcf9e8c9f2ca5e615884a0d25c8dc61fd
                                                                  • Opcode Fuzzy Hash: bd5d6f04869c3d78bec0f69720e3ba1c7714286d283eb6ece160fcace8e433a9
                                                                  • Instruction Fuzzy Hash: 457171EB78C125BDB112C1932B20AF7576ED6D67707348477FA07C6542F2946E8E2131
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: EYjN
                                                                  • API String ID: 0-3767897494
                                                                  • Opcode ID: bebddb559aa83c151787b28af73cfba70fa8e2dc45e801dbd4b4adfdaa7bfb58
                                                                  • Instruction ID: 227a5cc894b3c6f95792d6b2c732a8bbf9305313a7e89c8a885c6b548a785269
                                                                  • Opcode Fuzzy Hash: bebddb559aa83c151787b28af73cfba70fa8e2dc45e801dbd4b4adfdaa7bfb58
                                                                  • Instruction Fuzzy Hash: C47180EB78C125BDB202D1932B20AF7676ED6C67307348477FA07C6542F6946E8E2132
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: EYjN
                                                                  • API String ID: 0-3767897494
                                                                  • Opcode ID: 0ae0a53b4081d7cc87d3c71aa3dedb235d4b7ab6d2f3b3d107b551931de72543
                                                                  • Instruction ID: 9fca8c29b929e248150bf363d74f0f04e8528930a22b91631453ca5037ba1fcc
                                                                  • Opcode Fuzzy Hash: 0ae0a53b4081d7cc87d3c71aa3dedb235d4b7ab6d2f3b3d107b551931de72543
                                                                  • Instruction Fuzzy Hash: F1617DEB78C165BDB202D1932B20EF7676ED6C27707348467FA07C6542E2946E8E2032
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID: EYjN
                                                                  • API String ID: 2104809126-3767897494
                                                                  • Opcode ID: 2c2091c49caf7b1cca757667b4ef19d0ad6fe0b2b64f5e5f9e05ff2b084d2af5
                                                                  • Instruction ID: 853338bed05e70be27dc43841ebb50a2296fadcb931339069a380302262d1086
                                                                  • Opcode Fuzzy Hash: 2c2091c49caf7b1cca757667b4ef19d0ad6fe0b2b64f5e5f9e05ff2b084d2af5
                                                                  • Instruction Fuzzy Hash: C4616BEB38C165BCB252D1932B20AF7576ED6C27707348437FA07C6542E2886E8E2032
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(4E6A5945), ref: 04C40AFF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID: EYjN
                                                                  • API String ID: 2104809126-3767897494
                                                                  • Opcode ID: 0fa11144f647eb951a5ec6593a1136b318516ef5c765207dcf319ebaf33aa937
                                                                  • Instruction ID: 77f47669f3913e1d9a3bdaa13663c81f9d3229c29564f0e487e28b4c2e7e7ff6
                                                                  • Opcode Fuzzy Hash: 0fa11144f647eb951a5ec6593a1136b318516ef5c765207dcf319ebaf33aa937
                                                                  • Instruction Fuzzy Hash: 7951A0EB78C165BDB212D1532B60AFB676ED6C67707348477FA07C6542F2846E8E2032
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID: EYjN
                                                                  • API String ID: 2104809126-3767897494
                                                                  • Opcode ID: 155d0195983a561a05248fc21f52528c4f0305393b2814585fd47a3410e89cd8
                                                                  • Instruction ID: 53ae5b0845fec2af541e303523ca602dab5db35b977d4744ef584ab97c7d75f4
                                                                  • Opcode Fuzzy Hash: 155d0195983a561a05248fc21f52528c4f0305393b2814585fd47a3410e89cd8
                                                                  • Instruction Fuzzy Hash: 4B51A0EB78C125BDB212D1532B60AF7676ED6C27307348477FA07C6542F2946E8D2072
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(4E6A5945), ref: 04C40AFF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID: EYjN
                                                                  • API String ID: 2104809126-3767897494
                                                                  • Opcode ID: 28290fc5587fd84335d2f9a9f9e84cb4d2d7ff0291acb9f8ffa5cf575633a8dd
                                                                  • Instruction ID: 3511def05560f6d242d0afa935b3a52df5317726f03bef5304f6a4cb6b1263b8
                                                                  • Opcode Fuzzy Hash: 28290fc5587fd84335d2f9a9f9e84cb4d2d7ff0291acb9f8ffa5cf575633a8dd
                                                                  • Instruction Fuzzy Hash: 6C518EEB78C165BDB25291532F60AF75B6ED6C67303348477FA07C6542E2882E8D2032
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(4E6A5945), ref: 04C40AFF
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: e80b03e18815f7181b6ee24d159ba4b32205b9c426ed059b76f660dacb46431f
                                                                  • Instruction ID: 871b677b25940aa6ffdadd3829d834355a89015eb2ba7cafdbe589dc1f3eeeb1
                                                                  • Opcode Fuzzy Hash: e80b03e18815f7181b6ee24d159ba4b32205b9c426ed059b76f660dacb46431f
                                                                  • Instruction Fuzzy Hash: 30516FEB78C165BCB21291532F60EFB576ED6C67307348477FA07C6542E2892E8E2172
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(4E6A5945), ref: 04C40AFF
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: 91a327e84ab5c7122417ae70f721eb4cc598c0e90afa8d2b13e069bd93f7bc5e
                                                                  • Instruction ID: 0752b39fb82d7d37ca2786445e4cfb960edf077fcd592d050688f7847571efee
                                                                  • Opcode Fuzzy Hash: 91a327e84ab5c7122417ae70f721eb4cc598c0e90afa8d2b13e069bd93f7bc5e
                                                                  • Instruction Fuzzy Hash: 89514BEB38D125BCB25291533F60EFB676ED6C67307348827FA07C5545E2886E8E2072
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(4E6A5945), ref: 04C40AFF
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: 3ce3889c3cbbe5e0ae511fe7be5c81913a264f298efdb803a00d334e5f125207
                                                                  • Instruction ID: dcedb777863c90b8fdfe5e9cc261ead684f34c9f6c9823ad625ffa3b512d2382
                                                                  • Opcode Fuzzy Hash: 3ce3889c3cbbe5e0ae511fe7be5c81913a264f298efdb803a00d334e5f125207
                                                                  • Instruction Fuzzy Hash: 07514AEB38D125BCB15291532B60EFB576ED6C67307348867FA07C5546E6886E8E2032
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(4E6A5945), ref: 04C40AFF
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: b12ca2b662ff466593b9a1a33c148abbd3a1007eb5a72ab6948ad8d8167b5c06
                                                                  • Instruction ID: 5d6e948cc0a3bdcd6ed048f9db46a98f0f4b77f516ae6f0742916485994b46f4
                                                                  • Opcode Fuzzy Hash: b12ca2b662ff466593b9a1a33c148abbd3a1007eb5a72ab6948ad8d8167b5c06
                                                                  • Instruction Fuzzy Hash: 0D514AEB38D125BCB11291533B60EFB676ED6D67303348867FA07C5546E6882E8E6072
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(4E6A5945), ref: 04C40AFF
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: fbbae316bb4df2e01876670b2deb228c729d202048b44884ca78320fd69e5158
                                                                  • Instruction ID: c6b9c6807325ae7c6747b819a3fd59a2c62eec76412c0a019b6cad885a06263f
                                                                  • Opcode Fuzzy Hash: fbbae316bb4df2e01876670b2deb228c729d202048b44884ca78320fd69e5158
                                                                  • Instruction Fuzzy Hash: 6E414CEB38D165BCB15291533F60EFB676ED5C67303348467FA07C5546E6882E8E2072
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(4E6A5945), ref: 04C40AFF
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352629188.0000000004C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c40000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: 4dcad374802921a8e3844475e4ea69d78a2d16a71d43eb988a4a7b6c9d37cc55
                                                                  • Instruction ID: a5f8ff5f48cb3a47ead6059d128825f3b8343d6c0e9889336b921f509627f598
                                                                  • Opcode Fuzzy Hash: 4dcad374802921a8e3844475e4ea69d78a2d16a71d43eb988a4a7b6c9d37cc55
                                                                  • Instruction Fuzzy Hash: DA415EEB38D125BCB21291533F60EFB676ED6C67303348467FA07C6506E6942E8D6076
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00D798FE
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3340659649.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000006.00000002.3340632023.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3340659649.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3343537371.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346256466.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346555140.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346606111.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: FileWrite
                                                                  • String ID:
                                                                  • API String ID: 3934441357-0
                                                                  • Opcode ID: a3d17a50cecb1133a9740ecacb0fd6408b792b2ecfc1ff27d8a9375a3a629e1b
                                                                  • Instruction ID: 861e017a4d8ef9edd99e8666fae770da89f34b94273609d0694c36c5475e6347
                                                                  • Opcode Fuzzy Hash: a3d17a50cecb1133a9740ecacb0fd6408b792b2ecfc1ff27d8a9375a3a629e1b
                                                                  • Instruction Fuzzy Hash: 1761C273C04119AFDF15DFA8C851AEEFBB9AF09304F184159E948A7216E332D901CBB1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,00D78CD6,00000000,?,00EA7178,0000000C,00D78D92,?,?,?), ref: 00D78E45
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3340659649.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000006.00000002.3340632023.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3340659649.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3343537371.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346256466.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346555140.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346606111.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: ChangeCloseFindNotification
                                                                  • String ID:
                                                                  • API String ID: 2591292051-0
                                                                  • Opcode ID: 918c6da22df5b090ef3158e329386264e2344ea54a803533f6b576571f7fd1e1
                                                                  • Instruction ID: 54a8e1daea235444fc7a64e19081e1819ea12a9ef1dd4d93bcd4820302bcf834
                                                                  • Opcode Fuzzy Hash: 918c6da22df5b090ef3158e329386264e2344ea54a803533f6b576571f7fd1e1
                                                                  • Instruction Fuzzy Hash: 30116F3364015055D6253234984EB7E674DCB86734F3D869DF91CD71C2FF229C80A1B0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,00D72616,?,?,?,?,?), ref: 00D72548
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3340659649.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000006.00000002.3340632023.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3340659649.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3343537371.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346256466.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346555140.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346606111.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: FilePointer
                                                                  • String ID:
                                                                  • API String ID: 973152223-0
                                                                  • Opcode ID: 45b825afd8d076c98fbb72279f06090966fa4e086c2f6d0f6ca77f702a7ecb8b
                                                                  • Instruction ID: ace87421f4402f6de3e3ce8f5f8831a6af1bf641222c32b7e6e9b9d74210e674
                                                                  • Opcode Fuzzy Hash: 45b825afd8d076c98fbb72279f06090966fa4e086c2f6d0f6ca77f702a7ecb8b
                                                                  • Instruction Fuzzy Hash: E0014933610155AFCF09DF19DC11CAE3B19DF85324B384248FC14AB291F671EE418BA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00D3331F
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3340659649.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000006.00000002.3340632023.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3340659649.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3343537371.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346256466.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346555140.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346606111.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: Concurrency::cancel_current_task
                                                                  • String ID:
                                                                  • API String ID: 118556049-0
                                                                  • Opcode ID: 88e0f75f83d5f9e69285ef2088a1dfdc1055322beeb667a90db4e8c6ac7f301f
                                                                  • Instruction ID: d96ecb890acfc2df5fde90d066479fd60f9863e2c308ca2a15aeeb36e3577e43
                                                                  • Opcode Fuzzy Hash: 88e0f75f83d5f9e69285ef2088a1dfdc1055322beeb667a90db4e8c6ac7f301f
                                                                  • Instruction Fuzzy Hash: AEF0E9725401049BCB147FA4D5158E9B3E8EF243A1B14497BE88DC7212EF26DA90C7F1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • RtlAllocateHeap.NTDLL(00000008,?,00000001,?,00D79FD2,00000001,00000364,00000001,00000006,000000FF,?,00D64B2F,?,?,761B23A0,?), ref: 00D7A68E
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3340659649.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000006.00000002.3340632023.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3340659649.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3343537371.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346256466.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346555140.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346606111.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1279760036-0
                                                                  • Opcode ID: dea6b48c0fb666550dd1886f182c3ee9047098990b47764d0422f8636f26c2bc
                                                                  • Instruction ID: b9f0c9253706667e40ff85054445dafb3718fed851ffb040b7b605bc74cce30e
                                                                  • Opcode Fuzzy Hash: dea6b48c0fb666550dd1886f182c3ee9047098990b47764d0422f8636f26c2bc
                                                                  • Instruction Fuzzy Hash: 3AF05436510A256A9B226A6A9C05A6E374DEBC1760B1DC216F80CAA190FA24E80585F6
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00D64B2F,?,?,761B23A0,?,?,00D33522,?,?), ref: 00D7B0B9
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3340659649.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000006.00000002.3340632023.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3340659649.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3343537371.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346256466.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346555140.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346606111.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1279760036-0
                                                                  • Opcode ID: 9e8b7dc75988cbdab669e380a96db8c36d743de80b4f8c072001972045ec97ff
                                                                  • Instruction ID: 08be0d83fb552d2fe8c60ccb252977bf9a87a4564f2d4d35e903e5b3f7753f1e
                                                                  • Opcode Fuzzy Hash: 9e8b7dc75988cbdab669e380a96db8c36d743de80b4f8c072001972045ec97ff
                                                                  • Instruction Fuzzy Hash: EEE06D311006216AEA3127765C00BAF264AEF433B0F198623FE6CA70D2FB60DC4081F1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352691322.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f100ec84f59066e8cade3141510d4bb18e5d6433a77fb03d1bcf9168429dd249
                                                                  • Instruction ID: f9fc32e11398579ae9ed1b592a382065ad94fd8ed2fd6f15309aa81401c5e529
                                                                  • Opcode Fuzzy Hash: f100ec84f59066e8cade3141510d4bb18e5d6433a77fb03d1bcf9168429dd249
                                                                  • Instruction Fuzzy Hash: B521D3BB24C114BEA15295836B15AFE7B6FF5C33307388426F807D6523F2951AC9307A
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352691322.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9ae78cc0bc9b1375b5ee0cc7645b8be185707ed9c9466e241f7eae8256243afd
                                                                  • Instruction ID: e74a4cbbfdc9e3e2f7dc0b8f01b725da54f63497f436c3766e7de594d68d5d08
                                                                  • Opcode Fuzzy Hash: 9ae78cc0bc9b1375b5ee0cc7645b8be185707ed9c9466e241f7eae8256243afd
                                                                  • Instruction Fuzzy Hash: BE1102AB34C114BE514205476F156FE6A1FF5C633073D8016FC4BD6623B2946BC8703A
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352691322.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6fd618eaa55252e04a794da6c71717bc91da0098d60b669a7e2c25411983bb3d
                                                                  • Instruction ID: 38e5753908e654acfe7de3bbd397e5fbd17213c8f51b4223e665fbf885e78bd6
                                                                  • Opcode Fuzzy Hash: 6fd618eaa55252e04a794da6c71717bc91da0098d60b669a7e2c25411983bb3d
                                                                  • Instruction Fuzzy Hash: 73110ABB24C204EF914206436A562FE7B5BF697330738441AF847D6223F66426C9753A
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352691322.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2eaa0d2ae5a0d851222a39c25e249c61a960c00694069436dd6cfedf41f63d56
                                                                  • Instruction ID: cfde0f90e02757cd7cd2c47c1245ff1be20e7477b992f716205ba1988ed1b020
                                                                  • Opcode Fuzzy Hash: 2eaa0d2ae5a0d851222a39c25e249c61a960c00694069436dd6cfedf41f63d56
                                                                  • Instruction Fuzzy Hash: 8F11E9AB24C604EF81420543AE556FE7B6BB68633073C401AFC07D6633B29427C8753A
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352691322.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 48c109cb1ad2604d674f0cde3733c977317a272b02d8dcd686e63186cd96ed4b
                                                                  • Instruction ID: c58e13a9449a6af6e9610070b4162277086d51e94ca9e8a61c8c3f5dc53fbaf5
                                                                  • Opcode Fuzzy Hash: 48c109cb1ad2604d674f0cde3733c977317a272b02d8dcd686e63186cd96ed4b
                                                                  • Instruction Fuzzy Hash: FE01B1AB28C214AE92421553AA555FE3F1BE58773073C8406FC4BD5633B2852AC8757A
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352691322.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 58e29a1ed0e8e299f15306b8faef1c9a1945cfdb20fe096a78f17f51047fca45
                                                                  • Instruction ID: 08dfe5ae47b17c567ce4dc295cbcbb03f4757505dd47a3bd1fdfd8a6d904c016
                                                                  • Opcode Fuzzy Hash: 58e29a1ed0e8e299f15306b8faef1c9a1945cfdb20fe096a78f17f51047fca45
                                                                  • Instruction Fuzzy Hash: F501D1AB28C214FF51421543AA465FE7A1FF69673073C8412FC0BE6632B2952AC8347A
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352691322.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cf7555beb5711f338676d4edfb9b458925c1e0a2f17c10422251cb0edbb4a00b
                                                                  • Instruction ID: 13486fe4e76d0e646f20cba1425a8a46b0c4031c83ccdf0b2ef1b762a5be187a
                                                                  • Opcode Fuzzy Hash: cf7555beb5711f338676d4edfb9b458925c1e0a2f17c10422251cb0edbb4a00b
                                                                  • Instruction Fuzzy Hash: 43F0F4AB28C204FE81021543AB555FE6B1FF6963307388412FC47E5626B29426C9743A
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352691322.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c67edb12df72c5de56bc992d68ce416ab5a45b0aff080d9246c9b2614a17c61e
                                                                  • Instruction ID: 5c5dfe3d9005f447af4c9db23fc37e3abefffcef0b497fe848debc5fa02512a7
                                                                  • Opcode Fuzzy Hash: c67edb12df72c5de56bc992d68ce416ab5a45b0aff080d9246c9b2614a17c61e
                                                                  • Instruction Fuzzy Hash: E2F028AB24C214FF814215436B065FE6B1FF69733073C8402FC47E5622729427C8343A
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352691322.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2d9e7486416fd6ef4ed98dec9e7ec78d43425ad15464c79ca2c543c86130c0b8
                                                                  • Instruction ID: e5a4875da052eb94080877bcdc5aa441eace2a9d8c94cc69014dfa84e8a924ba
                                                                  • Opcode Fuzzy Hash: 2d9e7486416fd6ef4ed98dec9e7ec78d43425ad15464c79ca2c543c86130c0b8
                                                                  • Instruction Fuzzy Hash: F4F024B728C610AF9252555357091FEBB2FF6833307388426F803C2822B3882BC9343A
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352691322.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 61650f24fa75212222d9455eb68a48e5b6a322953d2a45246e56b3c2d4ad7a3a
                                                                  • Instruction ID: 1c80e31c6f0c578daf96eb1f4f7bfdd4339aca310ab30aeda7d68ed9db8400c8
                                                                  • Opcode Fuzzy Hash: 61650f24fa75212222d9455eb68a48e5b6a322953d2a45246e56b3c2d4ad7a3a
                                                                  • Instruction Fuzzy Hash: 33E09AEB248618AF600256432B18AFF672EF9C33303388426F807C6422B6C41ACD303A
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352691322.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e6bb3551ae1463cde4634cd58348e1c5a9eafdc496dad6dff0d0413bdd8d7d88
                                                                  • Instruction ID: afb9e3d9cf580c09719e013e7ac5955c3b68642ef529fa6fe0cea34e4eb56c10
                                                                  • Opcode Fuzzy Hash: e6bb3551ae1463cde4634cd58348e1c5a9eafdc496dad6dff0d0413bdd8d7d88
                                                                  • Instruction Fuzzy Hash: 0CE048A7248511BFA0524A4727185FE571EF5D3731338C827F847D5913B68527CD3536
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3352691322.0000000004C50000.00000040.00001000.00020000.00000000.sdmp, Offset: 04C50000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_4c50000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3bdd403d0f50e0466a8e07a50dd541dd03dbd094cc9860cce8da40f7e0608e76
                                                                  • Instruction ID: c2bffe3f4828d02eaa1a088fd467c30426274354dead5ca19bc4069d9bd47bcb
                                                                  • Opcode Fuzzy Hash: 3bdd403d0f50e0466a8e07a50dd541dd03dbd094cc9860cce8da40f7e0608e76
                                                                  • Instruction Fuzzy Hash: BEE08CEB28C1107EB00246832B09AFAA71EF5D3730338C827F847C1413A2891BCD3036
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3340659649.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000006.00000002.3340632023.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3340659649.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3343537371.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346256466.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346555140.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346606111.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d832fe2a0f42001a57c9b2c34ab75cd1b9a187cae735d2738bff895b2773b599
                                                                  • Instruction ID: 822493bed64289690c4b9e760dec192b6e3be34b8d38d3966396461561cfe354
                                                                  • Opcode Fuzzy Hash: d832fe2a0f42001a57c9b2c34ab75cd1b9a187cae735d2738bff895b2773b599
                                                                  • Instruction Fuzzy Hash: 53024B71E112199FDF14CFA8C8806AEFBF1FF48314F25826AE959E7340D731A9418BA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3340659649.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000006.00000002.3340632023.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3340659649.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3343537371.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346256466.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346555140.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346606111.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: _strrchr
                                                                  • String ID:
                                                                  • API String ID: 3213747228-0
                                                                  • Opcode ID: 88e4da6258101c5fc24b34185784eb547dfa0330ad300027970d950eece25734
                                                                  • Instruction ID: 6ac9909c2ab2deadf8966eb2e6a96b8f88ecabeaa7a595ee24b1eb0957d32f5a
                                                                  • Opcode Fuzzy Hash: 88e4da6258101c5fc24b34185784eb547dfa0330ad300027970d950eece25734
                                                                  • Instruction Fuzzy Hash: 43B104729002559FDB228F68CC82BEE7BA5EF55360F18C157E949AB382E774D901C7B0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • _ValidateLocalCookies.LIBCMT ref: 00D672F7
                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00D672FF
                                                                  • _ValidateLocalCookies.LIBCMT ref: 00D67388
                                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00D673B3
                                                                  • _ValidateLocalCookies.LIBCMT ref: 00D67408
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3340659649.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000006.00000002.3340632023.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3340659649.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3343537371.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346256466.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346555140.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346606111.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                  • String ID: csm
                                                                  • API String ID: 1170836740-1018135373
                                                                  • Opcode ID: a32203a777392eea07b1abcb2da8b7cf1a2b5f679c86771f8e6f5f9edb969b0e
                                                                  • Instruction ID: a0dee32716cabd8a6040127881849418e052c2c87085626860683389e7232b61
                                                                  • Opcode Fuzzy Hash: a32203a777392eea07b1abcb2da8b7cf1a2b5f679c86771f8e6f5f9edb969b0e
                                                                  • Instruction Fuzzy Hash: 4D419334A0420D9FCF10DF69C885A9EBBA5EF44318F188155EC28AB352DB71ED15DBB1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D4A09D
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D4A0BF
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D4A0E7
                                                                  • __Getctype.LIBCPMT ref: 00D4A1C5
                                                                  • std::_Facet_Register.LIBCPMT ref: 00D4A1F9
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D4A223
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3340659649.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000006.00000002.3340632023.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3340659649.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3343537371.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346256466.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346555140.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346606111.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                                                  • String ID:
                                                                  • API String ID: 1102183713-0
                                                                  • Opcode ID: ea669c24d6074018bea35690f89d4072cbb5e919ae0dcb6bc5f8c006737e3ddf
                                                                  • Instruction ID: f407ba745d1b7fca995098d4cf35ecc7fe35028143da6b4ab16c3a35c7914e05
                                                                  • Opcode Fuzzy Hash: ea669c24d6074018bea35690f89d4072cbb5e919ae0dcb6bc5f8c006737e3ddf
                                                                  • Instruction Fuzzy Hash: 795175B1D40749CFDB10DF98C941BAEBBF0EB14314F188259E845AB391D774AA48CBA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D4C45A
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D4C47C
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D4C4A4
                                                                  • std::_Facet_Register.LIBCPMT ref: 00D4C59A
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D4C5C4
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3340659649.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000006.00000002.3340632023.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3340659649.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3343537371.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346256466.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346555140.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346606111.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                                  • String ID:
                                                                  • API String ID: 459529453-0
                                                                  • Opcode ID: 81639a337ff9908acc89664b060bc76286af9b0aa0adeec5ca7dacd6235a6021
                                                                  • Instruction ID: 4af6cb20e2a9c0c4c158a56c99a078be4a77891c9b41650f44bc3bf0487a3926
                                                                  • Opcode Fuzzy Hash: 81639a337ff9908acc89664b060bc76286af9b0aa0adeec5ca7dacd6235a6021
                                                                  • Instruction Fuzzy Hash: B051ACB0901249DFDB11DF98C945BAEBBF0FF00314F288159E849AB381D779AA05CBE1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00D3499F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3340659649.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000006.00000002.3340632023.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3340659649.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3343537371.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346256466.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346555140.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346606111.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: Ios_base_dtorstd::ios_base::_
                                                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                  • API String ID: 323602529-1866435925
                                                                  • Opcode ID: 17f1f03d725ff68d3e8070488d6b613be4297954b89218142c10b58e43a3083b
                                                                  • Instruction ID: 821ec15aa68e1157febce3e5a0f544e2e097fdef38470767272cdab600b8830f
                                                                  • Opcode Fuzzy Hash: 17f1f03d725ff68d3e8070488d6b613be4297954b89218142c10b58e43a3083b
                                                                  • Instruction Fuzzy Hash: 06112CB29447487BCB10DE58DC03B967398DB45710F08452DFA589B2C1EB39B900CBB2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 00D62720
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D6272B
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D62799
                                                                    • Part of subcall function 00D6287C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00D62894
                                                                  • std::locale::_Setgloballocale.LIBCPMT ref: 00D62746
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3340659649.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000006.00000002.3340632023.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3340659649.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3343537371.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346256466.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346555140.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346606111.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                                                  • String ID:
                                                                  • API String ID: 677527491-0
                                                                  • Opcode ID: 749e5b65d137289c198f486e48c28e3d47698b393b8fc43fdce78376e0657658
                                                                  • Instruction ID: cdc45f09202b1a3b954ae6b4ccb6bc9084e5a4ac73124eb45e6debdd3ebdaada
                                                                  • Opcode Fuzzy Hash: 749e5b65d137289c198f486e48c28e3d47698b393b8fc43fdce78376e0657658
                                                                  • Instruction Fuzzy Hash: B001BC36A00A109FDB06AB20DC41A7E7BA1FF94780B184109E80127386CF74AA06CBF1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00D3750C
                                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00D37522
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3340659649.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000006.00000002.3340632023.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3340659649.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3343537371.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346256466.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346555140.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346606111.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: ___std_exception_destroy
                                                                  • String ID: [json.exception.
                                                                  • API String ID: 4194217158-791563284
                                                                  • Opcode ID: 431e4370529a1b4a051d7e12eb2f5832c433563090fdd43c274c82602ae34c97
                                                                  • Instruction ID: b947de9e7765512361509c34759a1b5e3bf3a910da4c0bf26b5dd4d5a43790fc
                                                                  • Opcode Fuzzy Hash: 431e4370529a1b4a051d7e12eb2f5832c433563090fdd43c274c82602ae34c97
                                                                  • Instruction Fuzzy Hash: C651F0B1D00748AFDB10DFA8D905BAEBBB4EF11314F144269E854A7382E7B85A44CBF1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00D3499F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3340659649.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000006.00000002.3340632023.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3340659649.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3343537371.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346256466.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346555140.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346606111.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: Ios_base_dtorstd::ios_base::_
                                                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                                                  • API String ID: 323602529-1240500531
                                                                  • Opcode ID: 74cff98f67c8304312bc4fb57ef7bf697da2f9e055e1d5205d8b6039f6e52be8
                                                                  • Instruction ID: e5096f2c14c2c72e7f4454dc5c4be0872893aada90495cd473f49c4617e86040
                                                                  • Opcode Fuzzy Hash: 74cff98f67c8304312bc4fb57ef7bf697da2f9e055e1d5205d8b6039f6e52be8
                                                                  • Instruction Fuzzy Hash: FE41F5B1900648AFCB04DF58CD46BAEB7B8EF45710F18825DF554AB281D779AA40CBB1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D34061
                                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00D340C4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.3340659649.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000006.00000002.3340632023.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3340659649.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341185125.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3341333728.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3343537371.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346256466.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346302341.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346555140.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000006.00000002.3346606111.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                                  • String ID: bad locale name
                                                                  • API String ID: 3988782225-1405518554
                                                                  • Opcode ID: ddc45b0576a55a337209f2e8a88c8ea466b114e4ca1f00f194bad706dca1a438
                                                                  • Instruction ID: 3131b17ea144b5c72e107f9d85fa95e456a7107684d54d689a9483f07d93dd63
                                                                  • Opcode Fuzzy Hash: ddc45b0576a55a337209f2e8a88c8ea466b114e4ca1f00f194bad706dca1a438
                                                                  • Instruction Fuzzy Hash: B511B170905B84EFD721CF68C50574BBFE4AF15714F14868DD09597B81D3B9AA04CBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • setsockopt.WS2_32(000003D4,0000FFFF,00001006,?,00000008), ref: 00DF4F57
                                                                  • recv.WS2_32(?,00000004,00000002), ref: 00DF4F71
                                                                  • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 00DF4FF3
                                                                  • recv.WS2_32(00000000,0000000C,00000008), ref: 00DF5014
                                                                  • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?,00000000), ref: 00DF50B1
                                                                    • Part of subcall function 00DF5940: WSAStartup.WS2_32 ref: 00DF596B
                                                                    • Part of subcall function 00DF5940: socket.WS2_32(?,?,?,?,?,?,00EB6328,?,?), ref: 00DF5A0E
                                                                    • Part of subcall function 00DF5940: connect.WS2_32(00000000,00E86B31,?,?,?,?,00EB6328,?,?), ref: 00DF5A21
                                                                    • Part of subcall function 00DF5940: closesocket.WS2_32(00000000), ref: 00DF5A2D
                                                                  • recv.WS2_32(00000000,?,00000008), ref: 00DF50CB
                                                                  • recv.WS2_32(?,00000004,00000008), ref: 00DF51D3
                                                                  • __Xtime_get_ticks.LIBCPMT ref: 00DF51DA
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DF51E8
                                                                  • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 00DF5261
                                                                  • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 00DF5269
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3338357309.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000007.00000002.3338074043.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3338357309.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340450990.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340755543.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341125594.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341177961.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: recv$Sleepsetsockopt$StartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectsocket
                                                                  • String ID: (c
                                                                  • API String ID: 301102601-1781735918
                                                                  • Opcode ID: b856ea915698e747263fe5823512dd3b8292feef7e9d802d2f37518c52e71e25
                                                                  • Instruction ID: a5d1ef92e241d4a26057d7499fe4943a6f2d65df6abdd139141d272aa0b4a386
                                                                  • Opcode Fuzzy Hash: b856ea915698e747263fe5823512dd3b8292feef7e9d802d2f37518c52e71e25
                                                                  • Instruction Fuzzy Hash: C3B1BB70D003089FEB15DFA8DC89BAEBBB1EF45304F144219E654BB2E2D7B45948DBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 57 d39280-d392dd call d463b0 60 d39413-d39521 call d32df0 call e177d0 57->60 61 d392e3-d392e9 57->61 77 d39523-d39535 60->77 78 d39537-d3953f call d48dc0 60->78 62 d392f0-d39313 61->62 64 d39315-d3931f 62->64 65 d39324-d39331 62->65 67 d39403-d39406 64->67 68 d39333-d3933d 65->68 69 d39342-d3934f 65->69 71 d39409-d3940d 67->71 68->67 72 d39351-d3935b 69->72 73 d39360-d3936d 69->73 71->60 71->62 72->67 75 d3936f-d39379 73->75 76 d3937e-d3938b 73->76 75->67 79 d39399-d393a6 76->79 80 d3938d-d39397 76->80 81 d39544-d39597 call e177d0 * 2 77->81 78->81 83 d393b4-d393c1 79->83 84 d393a8-d393b2 79->84 80->67 94 d395cb-d395e1 call e177d0 81->94 95 d39599-d395c8 call e177d0 call d65260 81->95 86 d393c3-d393cd 83->86 87 d393cf-d393dc 83->87 84->67 86->67 89 d393ea-d393f4 87->89 90 d393de-d393e8 87->90 89->71 93 d393f6-d393ff 89->93 90->67 93->67 101 d396e2 94->101 102 d395e7-d395ed 94->102 95->94 103 d396e6-d396f0 101->103 105 d395f0-d396ce WSASend 102->105 106 d396f2-d396fe 103->106 107 d3971e-d3973d 103->107 122 d396d4-d396dc 105->122 123 d3975f-d39763 105->123 108 d39700-d3970e 106->108 109 d39714-d3971b call d638e3 106->109 110 d3976f-d39796 107->110 111 d3973f-d3974b 107->111 108->109 113 d39797-d397fe call d68c60 call d32df0 * 2 108->113 109->107 115 d39765-d3976c call d638e3 111->115 116 d3974d-d3975b 111->116 115->110 116->113 119 d3975d 116->119 119->115 122->101 122->105 123->103
                                                                  APIs
                                                                  • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,00E7A4DC,00000000,761B23A0,-00EB6880), ref: 00D396C9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3338357309.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000007.00000002.3338074043.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3338357309.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340450990.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340755543.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341125594.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341177961.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: Send
                                                                  • String ID: 4oST$4oST$Ws2_32.dll
                                                                  • API String ID: 121738739-1839276265
                                                                  • Opcode ID: 2c732921267c28d31662cdb165469a1dbfcf1703554fa1fffe4f9a0c45e32f5d
                                                                  • Instruction ID: f06353974da7628559c5e5393399d831831a3975bbd54d61c534a24dfa035991
                                                                  • Opcode Fuzzy Hash: 2c732921267c28d31662cdb165469a1dbfcf1703554fa1fffe4f9a0c45e32f5d
                                                                  • Instruction Fuzzy Hash: ED02D070D04288DFDF25CF94C8A07EDFBB0EF55710F244289E4856B686D7B05986CBA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 130 df5940-df5972 WSAStartup 131 df5978-df59a2 call e177d0 * 2 130->131 132 df5a46-df5a4f 130->132 137 df59ae-df59f4 131->137 138 df59a4-df59a8 131->138 140 df59f6-df59fc 137->140 141 df5a40-df5a45 137->141 138->132 138->137 142 df59fe 140->142 143 df5a54-df5a5e 140->143 141->132 145 df5a04-df5a18 socket 142->145 143->141 148 df5a60-df5a68 143->148 145->141 147 df5a1a-df5a2a connect 145->147 149 df5a2c-df5a34 closesocket 147->149 150 df5a50 147->150 149->145 151 df5a36-df5a3f 149->151 150->143 151->141
                                                                  APIs
                                                                  • WSAStartup.WS2_32 ref: 00DF596B
                                                                  • socket.WS2_32(?,?,?,?,?,?,00EB6328,?,?), ref: 00DF5A0E
                                                                  • connect.WS2_32(00000000,00E86B31,?,?,?,?,00EB6328,?,?), ref: 00DF5A21
                                                                  • closesocket.WS2_32(00000000), ref: 00DF5A2D
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3338357309.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000007.00000002.3338074043.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3338357309.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340450990.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340755543.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341125594.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341177961.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: Startupclosesocketconnectsocket
                                                                  • String ID:
                                                                  • API String ID: 3098855095-0
                                                                  • Opcode ID: 8fa640b79531ef98e9d5538c023b47182c81e33dd307e36d8ca5c1c4af744881
                                                                  • Instruction ID: c2487e3d588b2589350d17f8d9d46d7715ea480192ee045faea08ae933a9e12c
                                                                  • Opcode Fuzzy Hash: 8fa640b79531ef98e9d5538c023b47182c81e33dd307e36d8ca5c1c4af744881
                                                                  • Instruction Fuzzy Hash: 9731F5315057045BC7209B649C85A7BB7E4FFC5734F156F19FAA8A31E0D370A81486A2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 153 5760a51-5760a5f 154 5760a61 153->154 155 57609fe-5760a39 GetCurrentHwProfileW 153->155 157 5760a63-5760cc4 154->157 162 5760a3e-5760a4c 155->162 188 5760cca-5760ccb 157->188 162->157 189 5760ccc-5760d07 call 5760cfa 188->189 193 5760d09-5760d0a 189->193 193->188 194 5760d0c-5760e7a 193->194
                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05760A39
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3352877562.0000000005760000.00000040.00001000.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5760000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: 6248a16e8726160a6eee81833c14142dd0ac167e567f4b5b4b892245aaedda5f
                                                                  • Instruction ID: e9c5c4a98ff1592fb53ada124efee2f418a5dae76a4dcb591b7ee10b933b510d
                                                                  • Opcode Fuzzy Hash: 6248a16e8726160a6eee81833c14142dd0ac167e567f4b5b4b892245aaedda5f
                                                                  • Instruction Fuzzy Hash: 9941F1EF58D224BDA102C1412F68AF6676FE6D67703308466FC0BD6601E6D40E896171
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 210 57609df-5760a17 213 5760a22-5760a39 GetCurrentHwProfileW 210->213 215 5760a3e-5760cc4 213->215 244 5760cca-5760ccb 215->244 245 5760ccc-5760d07 call 5760cfa 244->245 249 5760d09-5760d0a 245->249 249->244 250 5760d0c-5760e7a 249->250
                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05760A39
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3352877562.0000000005760000.00000040.00001000.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5760000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: 519963e71a3a3e32e24d32711f9581463d5b99883b9e7aa2788316723658750f
                                                                  • Instruction ID: 83c372c5696adb14a4346c274e611412df130a06e3534748cb2e332ac357999c
                                                                  • Opcode Fuzzy Hash: 519963e71a3a3e32e24d32711f9581463d5b99883b9e7aa2788316723658750f
                                                                  • Instruction Fuzzy Hash: BE41BDEF58D224BDA102C1812F6CAF6676FE6C77703308466FC0BE6602E6D40E897131
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 266 57609ee-5760a17 269 5760a22-5760a39 GetCurrentHwProfileW 266->269 271 5760a3e-5760cc4 269->271 300 5760cca-5760ccb 271->300 301 5760ccc-5760d07 call 5760cfa 300->301 305 5760d09-5760d0a 301->305 305->300 306 5760d0c-5760e7a 305->306
                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05760A39
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3352877562.0000000005760000.00000040.00001000.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5760000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: 9ef447a1d54b4ba71bcb0f30241741b4117260254d0e0e5248ecafb984105dab
                                                                  • Instruction ID: be87a79ebd5da8387fe70dd414403d968c3f662c53b7457397f0052cd320a351
                                                                  • Opcode Fuzzy Hash: 9ef447a1d54b4ba71bcb0f30241741b4117260254d0e0e5248ecafb984105dab
                                                                  • Instruction Fuzzy Hash: E241D2EF54D224BDA102C1816F6CAFA676FE7D67703308466FC0BD6602E6E40E896171
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 322 5760a1d-5760a2d 323 5760aa6-5760cc4 322->323 324 5760a2f-5760a37 322->324 354 5760cca-5760ccb 323->354 325 5760a3e-5760a96 324->325 326 5760a39 GetCurrentHwProfileW 324->326 325->323 326->325 355 5760ccc-5760d07 call 5760cfa 354->355 359 5760d09-5760d0a 355->359 359->354 360 5760d0c-5760e7a 359->360
                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05760A39
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3352877562.0000000005760000.00000040.00001000.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5760000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: 93918d5679f9659d38f2ebacecc4c6b3617567a64fa0be1306c769ef670ec8df
                                                                  • Instruction ID: 225a95dc35256b0b8305533f01f04b5eb70c15ddb9b81b335e6a5b8de342f61d
                                                                  • Opcode Fuzzy Hash: 93918d5679f9659d38f2ebacecc4c6b3617567a64fa0be1306c769ef670ec8df
                                                                  • Instruction Fuzzy Hash: 1441F3EB54D224BDA202C1802F6CAF66B6FE6D777033080A6FC0BD6642E7D50E8D6171
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 376 d79779-d7979b 377 d797a1-d797a3 376->377 378 d7998e 376->378 380 d797a5-d797c4 call d68bd3 377->380 381 d797cf-d797f2 377->381 379 d79990-d79994 378->379 389 d797c7-d797ca 380->389 383 d797f4-d797f6 381->383 384 d797f8-d797fe 381->384 383->384 386 d79800-d79811 383->386 384->380 384->386 387 d79824-d79834 call d792be 386->387 388 d79813-d79821 call d7262d 386->388 394 d79836-d7983c 387->394 395 d7987d-d7988f 387->395 388->387 389->379 398 d79865-d7987b call d78e8f 394->398 399 d7983e-d79841 394->399 396 d798e6-d79906 WriteFile 395->396 397 d79891-d79897 395->397 404 d79911 396->404 405 d79908-d7990e 396->405 400 d798d2-d798e4 call d7933b 397->400 401 d79899-d7989c 397->401 415 d7985e-d79860 398->415 402 d79843-d79846 399->402 403 d7984c-d7985b call d79256 399->403 427 d798b9-d798bc 400->427 408 d798be-d798d0 call d794ff 401->408 409 d7989e-d798a1 401->409 402->403 410 d79926-d79929 402->410 403->415 407 d79914-d7991f 404->407 405->404 416 d79921-d79924 407->416 417 d79989-d7998c 407->417 408->427 418 d798a7-d798b4 call d79416 409->418 419 d7992c-d7992e 409->419 410->419 415->407 416->410 417->379 418->427 424 d79930-d79935 419->424 425 d7995c-d79968 419->425 428 d79937-d79949 424->428 429 d7994e-d79957 call d716b8 424->429 430 d79972-d79984 425->430 431 d7996a-d79970 425->431 427->415 428->389 429->389 430->389 431->378 431->430
                                                                  APIs
                                                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00D798FE
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3338357309.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000007.00000002.3338074043.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3338357309.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340450990.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340755543.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341125594.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341177961.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: FileWrite
                                                                  • String ID:
                                                                  • API String ID: 3934441357-0
                                                                  • Opcode ID: 2ef198cc961aaac779997507715dd042a80d7871dbaf3b05e25ca0a6b658a863
                                                                  • Instruction ID: e3e20c9ca43d7defe2bfe16e8734cc18326e5987f88dc894bb01f841b47f4d23
                                                                  • Opcode Fuzzy Hash: 2ef198cc961aaac779997507715dd042a80d7871dbaf3b05e25ca0a6b658a863
                                                                  • Instruction Fuzzy Hash: B361D173C04119AFDF11DFA8C855AEEFBB9AF09304F188149E908A7212E732D901CBB1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 434 5760a0b-5760a17 435 5760a22-5760a39 GetCurrentHwProfileW 434->435 437 5760a3e-5760cc4 435->437 466 5760cca-5760ccb 437->466 467 5760ccc-5760d07 call 5760cfa 466->467 471 5760d09-5760d0a 467->471 471->466 472 5760d0c-5760e7a 471->472
                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 05760A39
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3352877562.0000000005760000.00000040.00001000.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5760000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: 35c43822dc5bc8ea36558de59eeefbac648d2f84a3166496ec9ce0a37daea286
                                                                  • Instruction ID: c144f9287ae8c39f8805fd90d985e09386e44345a1c74640518ee6aaf17a9b1a
                                                                  • Opcode Fuzzy Hash: 35c43822dc5bc8ea36558de59eeefbac648d2f84a3166496ec9ce0a37daea286
                                                                  • Instruction Fuzzy Hash: B341D2EB58D224BDA202C1852F6CAF66B6FE6C77703308066FC0BD6502E7D40E896171
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 488 d78def-d78e03 call d7e92e 491 d78e05-d78e07 488->491 492 d78e09-d78e11 488->492 493 d78e57-d78e77 call d7e89d 491->493 494 d78e13-d78e1a 492->494 495 d78e1c-d78e1f 492->495 503 d78e89 493->503 504 d78e79-d78e87 call d716b8 493->504 494->495 497 d78e27-d78e3b call d7e92e * 2 494->497 498 d78e21-d78e25 495->498 499 d78e3d-d78e4d call d7e92e FindCloseChangeNotification 495->499 497->491 497->499 498->497 498->499 499->491 510 d78e4f-d78e55 499->510 508 d78e8b-d78e8e 503->508 504->508 510->493
                                                                  APIs
                                                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,00D78CD6,00000000,?,00EA7178,0000000C,00D78D92,?,?,?), ref: 00D78E45
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3338357309.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000007.00000002.3338074043.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3338357309.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340450990.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340755543.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341125594.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341177961.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: ChangeCloseFindNotification
                                                                  • String ID:
                                                                  • API String ID: 2591292051-0
                                                                  • Opcode ID: 0e397fd7e4cb173958d0d6a4e577087d75275782bafd45be55fea8a20ba78bb8
                                                                  • Instruction ID: 30ab05d154d9ef25ee20e9cfdb751348f786e2f8efc0e65de6744148ede1e8fb
                                                                  • Opcode Fuzzy Hash: 0e397fd7e4cb173958d0d6a4e577087d75275782bafd45be55fea8a20ba78bb8
                                                                  • Instruction Fuzzy Hash: AE110833A442605ACA662234984EB7E674DCB86734F3D869DF91CD71C2FF229C8191B1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 514 d7250c-d72524 call d7e92e 517 d72526-d7252d 514->517 518 d7253a-d72550 SetFilePointerEx 514->518 519 d72534-d72538 517->519 520 d72565-d7256f 518->520 521 d72552-d72563 call d716b8 518->521 522 d7258b-d7258e 519->522 520->519 523 d72571-d72586 520->523 521->519 523->522
                                                                  APIs
                                                                  • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,00D72616,?,?,?,?,?), ref: 00D72548
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3338357309.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000007.00000002.3338074043.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3338357309.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340450990.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340755543.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341125594.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341177961.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: FilePointer
                                                                  • String ID:
                                                                  • API String ID: 973152223-0
                                                                  • Opcode ID: 28f5b4d1e6c968a1a568a81df5e0fac028bfdc86db0186ad478c7ceca221d79e
                                                                  • Instruction ID: 3219854714ac0f7e0828defb1c0dece87cd1d9d6d2f0e281e326ea38a7fbbacb
                                                                  • Opcode Fuzzy Hash: 28f5b4d1e6c968a1a568a81df5e0fac028bfdc86db0186ad478c7ceca221d79e
                                                                  • Instruction Fuzzy Hash: 2E012633610255AFCF098F19DC15CAE3B19DB85324B284248F8049B291FA71EE428BB0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 527 d332d0-d332e0 528 d332e2-d332e7 527->528 529 d33306-d33308 527->529 532 d332e9-d332ea call d63662 528->532 533 d3331f call d32b50 528->533 530 d3330a-d33317 call d63662 529->530 531 d33318-d3331e 529->531 537 d332ef-d332f6 532->537 539 d33324-d33329 call d68c60 533->539 537->539 540 d332f8-d33305 537->540
                                                                  APIs
                                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00D3331F
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3338357309.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000007.00000002.3338074043.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3338357309.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340450990.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340755543.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341125594.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341177961.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: Concurrency::cancel_current_task
                                                                  • String ID:
                                                                  • API String ID: 118556049-0
                                                                  • Opcode ID: 88e0f75f83d5f9e69285ef2088a1dfdc1055322beeb667a90db4e8c6ac7f301f
                                                                  • Instruction ID: d96ecb890acfc2df5fde90d066479fd60f9863e2c308ca2a15aeeb36e3577e43
                                                                  • Opcode Fuzzy Hash: 88e0f75f83d5f9e69285ef2088a1dfdc1055322beeb667a90db4e8c6ac7f301f
                                                                  • Instruction Fuzzy Hash: AEF0E9725401049BCB147FA4D5158E9B3E8EF243A1B14497BE88DC7212EF26DA90C7F1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 543 d7a64c-d7a657 544 d7a665-d7a66b 543->544 545 d7a659-d7a663 543->545 547 d7a684-d7a695 RtlAllocateHeap 544->547 548 d7a66d-d7a66e 544->548 545->544 546 d7a699-d7a6a4 call d716ef 545->546 552 d7a6a6-d7a6a8 546->552 549 d7a697 547->549 550 d7a670-d7a677 call d78270 547->550 548->547 549->552 550->546 556 d7a679-d7a682 call d75a79 550->556 556->546 556->547
                                                                  APIs
                                                                  • RtlAllocateHeap.NTDLL(00000008,?,00000001,?,00D79FD2,00000001,00000364,00000001,00000006,000000FF,?,00D64B2F,?,?,761B23A0,?), ref: 00D7A68D
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3338357309.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000007.00000002.3338074043.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3338357309.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340450990.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340755543.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341125594.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341177961.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1279760036-0
                                                                  • Opcode ID: bf9d61f89d9a8dc4931f654318ca184f44bbdf2f3dceae7f6e57d9e6f9f1e3b9
                                                                  • Instruction ID: fc5d3eaedb759ec1820b48753540c3a6994754e149837ad16c5187d8fceb5f5b
                                                                  • Opcode Fuzzy Hash: bf9d61f89d9a8dc4931f654318ca184f44bbdf2f3dceae7f6e57d9e6f9f1e3b9
                                                                  • Instruction Fuzzy Hash: 69F0E932510E216ADB226A6E9C05E5E374DAFC1770B1DC226F80CAA1A0FA20EC0085F7
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 559 d7b086-d7b092 560 d7b0c4-d7b0cf call d716ef 559->560 561 d7b094-d7b096 559->561 568 d7b0d1-d7b0d3 560->568 563 d7b0af-d7b0c0 RtlAllocateHeap 561->563 564 d7b098-d7b099 561->564 565 d7b0c2 563->565 566 d7b09b-d7b0a2 call d78270 563->566 564->563 565->568 566->560 571 d7b0a4-d7b0ad call d75a79 566->571 571->560 571->563
                                                                  APIs
                                                                  • RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00D64B2F,?,?,761B23A0,?,?,00D33522,?,?), ref: 00D7B0B8
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3338357309.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000007.00000002.3338074043.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3338357309.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340450990.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340755543.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341125594.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341177961.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1279760036-0
                                                                  • Opcode ID: 508a64a63c9e6221e243bd65db310fa1c8af988616e241a05ca0ec172ea50803
                                                                  • Instruction ID: cab3fe606f10eaa3c6caba9ca1e70929ad7c967a994ff2e059d5bf4a3f5f45ed
                                                                  • Opcode Fuzzy Hash: 508a64a63c9e6221e243bd65db310fa1c8af988616e241a05ca0ec172ea50803
                                                                  • Instruction Fuzzy Hash: B6E06D311416216AEA3126769C00BAF264AEF433B0F298223FD6CA70D2FB60DC0081F1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3352930613.0000000005770000.00000040.00001000.00020000.00000000.sdmp, Offset: 05770000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5770000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 446b85f94506d5ba4413216299452c7a54812176e53d01b20c82e4699d95096f
                                                                  • Instruction ID: 1f97564c426c9ce5c21dc67a7cf38fc56e61ee5c4ce4d442f0aa4c8f31f989c8
                                                                  • Opcode Fuzzy Hash: 446b85f94506d5ba4413216299452c7a54812176e53d01b20c82e4699d95096f
                                                                  • Instruction Fuzzy Hash: 1F218BEB2580647DEE02D1527A5CBFB2F6FE796730B308426F047C6583E19405C6B972
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3352930613.0000000005770000.00000040.00001000.00020000.00000000.sdmp, Offset: 05770000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5770000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1e0ba3fd133d8564de02694ad2ac6110eb9b9bf8dea44007e87e94024455ba51
                                                                  • Instruction ID: fb912467636bc9a53cda4b58b7eefb86ba6b2d5c7a3e5debbcf429c5a90d941c
                                                                  • Opcode Fuzzy Hash: 1e0ba3fd133d8564de02694ad2ac6110eb9b9bf8dea44007e87e94024455ba51
                                                                  • Instruction Fuzzy Hash: 921148EB15C1247EA442D0567B58BFB6F5FE7D7770B308427F007C2642E29805887872
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3352930613.0000000005770000.00000040.00001000.00020000.00000000.sdmp, Offset: 05770000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5770000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 91eb2c10da637dbf8d360f53186e552870c2bde18852f1d5c7596af4e989a773
                                                                  • Instruction ID: 53116017eac4cea128f454d9c61b4df59b6217eac69fce64673d4e08e26ee274
                                                                  • Opcode Fuzzy Hash: 91eb2c10da637dbf8d360f53186e552870c2bde18852f1d5c7596af4e989a773
                                                                  • Instruction Fuzzy Hash: 2E0147FB5681247DB541E1667A58BFB5B5EE7D67B0B30842BB007C2542D68409883831
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3352930613.0000000005770000.00000040.00001000.00020000.00000000.sdmp, Offset: 05770000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5770000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ad4bd7cfc8d3cc7281cef923527fba75110934ea08c7e5b1132923f100219d77
                                                                  • Instruction ID: 429dd44dd4fd864e5b5586f8e136ffaee3c1c983718ed734cb576ddff07e5cde
                                                                  • Opcode Fuzzy Hash: ad4bd7cfc8d3cc7281cef923527fba75110934ea08c7e5b1132923f100219d77
                                                                  • Instruction Fuzzy Hash: BEF022FB1190157DB510D1567B68BFBA76EE2DAB70B308827F00BD3A42D6940A8D2832
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3352930613.0000000005770000.00000040.00001000.00020000.00000000.sdmp, Offset: 05770000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5770000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c687e4c7903b83d29a1d55c406b1269d811fee2aabd1e02ed92124736b13f65f
                                                                  • Instruction ID: aa9d1e5639c93b60baba68679086f1fa12279fae119d101804e5ca99b35283e2
                                                                  • Opcode Fuzzy Hash: c687e4c7903b83d29a1d55c406b1269d811fee2aabd1e02ed92124736b13f65f
                                                                  • Instruction Fuzzy Hash: E20121FB1191586EA540D1627B58BFF6B2EE7D6B70B30882AF007C2542D694098E2532
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3352930613.0000000005770000.00000040.00001000.00020000.00000000.sdmp, Offset: 05770000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5770000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a494867bb7470fc78c825d4310479c5f5de22256a5b8a5471158362324644c22
                                                                  • Instruction ID: 00fb91babbd7fa9a3024fc8048c92bc5397307c67fde45471083b3253553be26
                                                                  • Opcode Fuzzy Hash: a494867bb7470fc78c825d4310479c5f5de22256a5b8a5471158362324644c22
                                                                  • Instruction Fuzzy Hash: E0F022EB1290147DB441D2667B58BFBA72EE7D6B30B308827F007C2942D79409892432
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3338357309.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000007.00000002.3338074043.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3338357309.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340450990.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340755543.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341125594.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341177961.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d832fe2a0f42001a57c9b2c34ab75cd1b9a187cae735d2738bff895b2773b599
                                                                  • Instruction ID: 822493bed64289690c4b9e760dec192b6e3be34b8d38d3966396461561cfe354
                                                                  • Opcode Fuzzy Hash: d832fe2a0f42001a57c9b2c34ab75cd1b9a187cae735d2738bff895b2773b599
                                                                  • Instruction Fuzzy Hash: 53024B71E112199FDF14CFA8C8806AEFBF1FF48314F25826AE959E7340D731A9418BA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3338357309.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000007.00000002.3338074043.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3338357309.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340450990.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340755543.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341125594.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341177961.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: _strrchr
                                                                  • String ID:
                                                                  • API String ID: 3213747228-0
                                                                  • Opcode ID: 88e4da6258101c5fc24b34185784eb547dfa0330ad300027970d950eece25734
                                                                  • Instruction ID: 6ac9909c2ab2deadf8966eb2e6a96b8f88ecabeaa7a595ee24b1eb0957d32f5a
                                                                  • Opcode Fuzzy Hash: 88e4da6258101c5fc24b34185784eb547dfa0330ad300027970d950eece25734
                                                                  • Instruction Fuzzy Hash: 43B104729002559FDB228F68CC82BEE7BA5EF55360F18C157E949AB382E774D901C7B0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • _ValidateLocalCookies.LIBCMT ref: 00D672F7
                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00D672FF
                                                                  • _ValidateLocalCookies.LIBCMT ref: 00D67388
                                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00D673B3
                                                                  • _ValidateLocalCookies.LIBCMT ref: 00D67408
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3338357309.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000007.00000002.3338074043.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3338357309.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340450990.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340755543.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341125594.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341177961.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                  • String ID: csm
                                                                  • API String ID: 1170836740-1018135373
                                                                  • Opcode ID: a32203a777392eea07b1abcb2da8b7cf1a2b5f679c86771f8e6f5f9edb969b0e
                                                                  • Instruction ID: a0dee32716cabd8a6040127881849418e052c2c87085626860683389e7232b61
                                                                  • Opcode Fuzzy Hash: a32203a777392eea07b1abcb2da8b7cf1a2b5f679c86771f8e6f5f9edb969b0e
                                                                  • Instruction Fuzzy Hash: 4D419334A0420D9FCF10DF69C885A9EBBA5EF44318F188155EC28AB352DB71ED15DBB1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D4A09D
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D4A0BF
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D4A0E7
                                                                  • __Getctype.LIBCPMT ref: 00D4A1C5
                                                                  • std::_Facet_Register.LIBCPMT ref: 00D4A1F9
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D4A223
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3338357309.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000007.00000002.3338074043.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3338357309.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340450990.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340755543.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341125594.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341177961.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                                                  • String ID:
                                                                  • API String ID: 1102183713-0
                                                                  • Opcode ID: ea669c24d6074018bea35690f89d4072cbb5e919ae0dcb6bc5f8c006737e3ddf
                                                                  • Instruction ID: f407ba745d1b7fca995098d4cf35ecc7fe35028143da6b4ab16c3a35c7914e05
                                                                  • Opcode Fuzzy Hash: ea669c24d6074018bea35690f89d4072cbb5e919ae0dcb6bc5f8c006737e3ddf
                                                                  • Instruction Fuzzy Hash: 795175B1D40749CFDB10DF98C941BAEBBF0EB14314F188259E845AB391D774AA48CBA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D4C45A
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D4C47C
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D4C4A4
                                                                  • std::_Facet_Register.LIBCPMT ref: 00D4C59A
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D4C5C4
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3338357309.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000007.00000002.3338074043.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3338357309.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340450990.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340755543.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341125594.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341177961.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                                  • String ID:
                                                                  • API String ID: 459529453-0
                                                                  • Opcode ID: 81639a337ff9908acc89664b060bc76286af9b0aa0adeec5ca7dacd6235a6021
                                                                  • Instruction ID: 4af6cb20e2a9c0c4c158a56c99a078be4a77891c9b41650f44bc3bf0487a3926
                                                                  • Opcode Fuzzy Hash: 81639a337ff9908acc89664b060bc76286af9b0aa0adeec5ca7dacd6235a6021
                                                                  • Instruction Fuzzy Hash: B051ACB0901249DFDB11DF98C945BAEBBF0FF00314F288159E849AB381D779AA05CBE1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00D3499F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3338357309.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000007.00000002.3338074043.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3338357309.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340450990.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340755543.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341125594.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341177961.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: Ios_base_dtorstd::ios_base::_
                                                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                  • API String ID: 323602529-1866435925
                                                                  • Opcode ID: 17f1f03d725ff68d3e8070488d6b613be4297954b89218142c10b58e43a3083b
                                                                  • Instruction ID: 821ec15aa68e1157febce3e5a0f544e2e097fdef38470767272cdab600b8830f
                                                                  • Opcode Fuzzy Hash: 17f1f03d725ff68d3e8070488d6b613be4297954b89218142c10b58e43a3083b
                                                                  • Instruction Fuzzy Hash: 06112CB29447487BCB10DE58DC03B967398DB45710F08452DFA589B2C1EB39B900CBB2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 00D62720
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D6272B
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D62799
                                                                    • Part of subcall function 00D6287C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00D62894
                                                                  • std::locale::_Setgloballocale.LIBCPMT ref: 00D62746
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3338357309.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000007.00000002.3338074043.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3338357309.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340450990.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340755543.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341125594.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341177961.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                                                  • String ID:
                                                                  • API String ID: 677527491-0
                                                                  • Opcode ID: 749e5b65d137289c198f486e48c28e3d47698b393b8fc43fdce78376e0657658
                                                                  • Instruction ID: cdc45f09202b1a3b954ae6b4ccb6bc9084e5a4ac73124eb45e6debdd3ebdaada
                                                                  • Opcode Fuzzy Hash: 749e5b65d137289c198f486e48c28e3d47698b393b8fc43fdce78376e0657658
                                                                  • Instruction Fuzzy Hash: B001BC36A00A109FDB06AB20DC41A7E7BA1FF94780B184109E80127386CF74AA06CBF1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00D3750C
                                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00D37522
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3338357309.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000007.00000002.3338074043.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3338357309.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340450990.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340755543.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341125594.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341177961.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: ___std_exception_destroy
                                                                  • String ID: [json.exception.
                                                                  • API String ID: 4194217158-791563284
                                                                  • Opcode ID: 431e4370529a1b4a051d7e12eb2f5832c433563090fdd43c274c82602ae34c97
                                                                  • Instruction ID: b947de9e7765512361509c34759a1b5e3bf3a910da4c0bf26b5dd4d5a43790fc
                                                                  • Opcode Fuzzy Hash: 431e4370529a1b4a051d7e12eb2f5832c433563090fdd43c274c82602ae34c97
                                                                  • Instruction Fuzzy Hash: C651F0B1D00748AFDB10DFA8D905BAEBBB4EF11314F144269E854A7382E7B85A44CBF1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00D3499F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3338357309.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000007.00000002.3338074043.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3338357309.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340450990.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340755543.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341125594.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341177961.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: Ios_base_dtorstd::ios_base::_
                                                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                                                  • API String ID: 323602529-1240500531
                                                                  • Opcode ID: 74cff98f67c8304312bc4fb57ef7bf697da2f9e055e1d5205d8b6039f6e52be8
                                                                  • Instruction ID: e5096f2c14c2c72e7f4454dc5c4be0872893aada90495cd473f49c4617e86040
                                                                  • Opcode Fuzzy Hash: 74cff98f67c8304312bc4fb57ef7bf697da2f9e055e1d5205d8b6039f6e52be8
                                                                  • Instruction Fuzzy Hash: FE41F5B1900648AFCB04DF58CD46BAEB7B8EF45710F18825DF554AB281D779AA40CBB1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D34061
                                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00D340C4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.3338357309.0000000000D31000.00000040.00000001.01000000.00000005.sdmp, Offset: 00D30000, based on PE: true
                                                                  • Associated: 00000007.00000002.3338074043.0000000000D30000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3338357309.0000000000EB2000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EB7000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339420181.0000000000EBF000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000000EC4000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001046000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001112000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.000000000114E000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001157000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3339709367.0000000001165000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340450990.0000000001166000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340755543.00000000012EE000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012EF000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F4000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3340797928.00000000012F7000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341125594.00000000012FA000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                  • Associated: 00000007.00000002.3341177961.00000000012FB000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_d30000_MPGPH131.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                                  • String ID: bad locale name
                                                                  • API String ID: 3988782225-1405518554
                                                                  • Opcode ID: ddc45b0576a55a337209f2e8a88c8ea466b114e4ca1f00f194bad706dca1a438
                                                                  • Instruction ID: 3131b17ea144b5c72e107f9d85fa95e456a7107684d54d689a9483f07d93dd63
                                                                  • Opcode Fuzzy Hash: ddc45b0576a55a337209f2e8a88c8ea466b114e4ca1f00f194bad706dca1a438
                                                                  • Instruction Fuzzy Hash: B511B170905B84EFD721CF68C50574BBFE4AF15714F14868DD09597B81D3B9AA04CBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • setsockopt.WS2_32(000003FC,0000FFFF,00001006,?,00000008), ref: 00FA4F57
                                                                  • recv.WS2_32(?,00000004,00000002), ref: 00FA4F71
                                                                  • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 00FA4FF3
                                                                  • recv.WS2_32(00000000,0000000C,00000008), ref: 00FA5014
                                                                  • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?,00000000), ref: 00FA50B0
                                                                    • Part of subcall function 00FA5940: WSAStartup.WS2_32 ref: 00FA596B
                                                                    • Part of subcall function 00FA5940: socket.WS2_32(?,?,?,?,?,?,01066328,?,?), ref: 00FA5A0E
                                                                    • Part of subcall function 00FA5940: connect.WS2_32(00000000,01036B31,?,?,?,?,01066328,?,?), ref: 00FA5A22
                                                                    • Part of subcall function 00FA5940: closesocket.WS2_32(00000000), ref: 00FA5A2D
                                                                  • recv.WS2_32(00000000,?,00000008), ref: 00FA50CB
                                                                  • recv.WS2_32(?,00000004,00000008), ref: 00FA51D3
                                                                  • __Xtime_get_ticks.LIBCPMT ref: 00FA51DA
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FA51E8
                                                                  • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 00FA5261
                                                                  • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 00FA5269
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.3340080174.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340135861.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3341457310.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343395123.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3344362930.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3345064536.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: recv$Sleepsetsockopt$StartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectsocket
                                                                  • String ID:
                                                                  • API String ID: 301102601-0
                                                                  • Opcode ID: a14caddb7d022bfcb6df697abf8f1be0c7c602e63dae466fffc6c01e313a8e90
                                                                  • Instruction ID: 4a686754c2ec3dcbf0a2da9cf7a3d0bce0178a00e9c55d99c10fc0bc1ca77e2d
                                                                  • Opcode Fuzzy Hash: a14caddb7d022bfcb6df697abf8f1be0c7c602e63dae466fffc6c01e313a8e90
                                                                  • Instruction Fuzzy Hash: FBB1ADB1D04308DFEB24DFA4CC89BADBBF5EB45710F204219E494AB2D2D77A5944DB81
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 57 ee9280-ee92dd call ef63b0 60 ee9413-ee9521 call ee2df0 call fc77d0 57->60 61 ee92e3-ee92e9 57->61 77 ee9537-ee953f call ef8dc0 60->77 78 ee9523-ee9535 60->78 63 ee92f0-ee9313 61->63 65 ee9324-ee9331 63->65 66 ee9315-ee931f 63->66 68 ee9342-ee934f 65->68 69 ee9333-ee933d 65->69 67 ee9403-ee9406 66->67 71 ee9409-ee940d 67->71 72 ee9360-ee936d 68->72 73 ee9351-ee935b 68->73 69->67 71->60 71->63 75 ee937e-ee938b 72->75 76 ee936f-ee9379 72->76 73->67 79 ee938d-ee9397 75->79 80 ee9399-ee93a6 75->80 76->67 81 ee9544-ee9597 call fc77d0 * 2 77->81 78->81 79->67 83 ee93a8-ee93b2 80->83 84 ee93b4-ee93c1 80->84 94 ee95cb-ee95e1 call fc77d0 81->94 95 ee9599-ee95c8 call fc77d0 call f15260 81->95 83->67 86 ee93cf-ee93dc 84->86 87 ee93c3-ee93cd 84->87 89 ee93de-ee93e8 86->89 90 ee93ea-ee93f4 86->90 87->67 89->67 90->71 93 ee93f6-ee93ff 90->93 93->67 101 ee95e7-ee95ed 94->101 102 ee96e2 94->102 95->94 104 ee95f0-ee96ce WSASend 101->104 105 ee96e6-ee96f0 102->105 124 ee975f-ee9763 104->124 125 ee96d4-ee96dc 104->125 106 ee971e-ee973d 105->106 107 ee96f2-ee96fe 105->107 110 ee976f-ee9796 106->110 111 ee973f-ee974b 106->111 108 ee9714-ee971b call f138e3 107->108 109 ee9700-ee970e 107->109 108->106 109->108 113 ee9797-ee97fe call f18c60 call ee2df0 * 2 109->113 115 ee974d-ee975b 111->115 116 ee9765-ee976c call f138e3 111->116 115->113 118 ee975d 115->118 116->110 118->116 124->105 125->102 125->104
                                                                  APIs
                                                                  • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,0102A4DC,00000000,761B23A0,-01066880), ref: 00EE96C9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.3340080174.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340135861.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3341457310.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343395123.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3344362930.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3345064536.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: Send
                                                                  • String ID: 4oST$4oST$Ws2_32.dll
                                                                  • API String ID: 121738739-1839276265
                                                                  • Opcode ID: c543706cb0730a57533f6e5257682f6231cacfdbde459ca37ce6adb39335b47c
                                                                  • Instruction ID: b35fc5e71e1aaf027704c7c0109c6f199024d60a098b2c5589539551b4c5f6e0
                                                                  • Opcode Fuzzy Hash: c543706cb0730a57533f6e5257682f6231cacfdbde459ca37ce6adb39335b47c
                                                                  • Instruction Fuzzy Hash: C902EB70E04288DFDF25CFA5C8907ACBBB0EF55314F24428DE8857B686C7741A86CB92
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 130 fa5940-fa5972 WSAStartup 131 fa5978-fa59a2 call fc77d0 * 2 130->131 132 fa5a46-fa5a4f 130->132 137 fa59ae-fa59f4 131->137 138 fa59a4-fa59a8 131->138 140 fa5a40 137->140 141 fa59f6-fa59fc 137->141 138->132 138->137 140->132 142 fa59fe 141->142 143 fa5a54-fa5a5e 141->143 144 fa5a04-fa5a18 socket 142->144 143->140 147 fa5a60-fa5a68 143->147 144->140 146 fa5a1a-fa5a2a connect 144->146 148 fa5a2c-fa5a34 closesocket 146->148 149 fa5a50 146->149 148->144 150 fa5a36-fa5a3a 148->150 149->143 150->140
                                                                  APIs
                                                                  • WSAStartup.WS2_32 ref: 00FA596B
                                                                  • socket.WS2_32(?,?,?,?,?,?,01066328,?,?), ref: 00FA5A0E
                                                                  • connect.WS2_32(00000000,01036B31,?,?,?,?,01066328,?,?), ref: 00FA5A22
                                                                  • closesocket.WS2_32(00000000), ref: 00FA5A2D
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.3340080174.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340135861.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3341457310.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343395123.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3344362930.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3345064536.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: Startupclosesocketconnectsocket
                                                                  • String ID:
                                                                  • API String ID: 3098855095-0
                                                                  • Opcode ID: 26766c300b19d71ffa1a405774362fa1058e2c72d63a0c4acc7bbd66f4b5b44b
                                                                  • Instruction ID: 3a9b0d59eb2c4622dca833789f1af8adcbb51e72a0d8587189577ace91b8b2d4
                                                                  • Opcode Fuzzy Hash: 26766c300b19d71ffa1a405774362fa1058e2c72d63a0c4acc7bbd66f4b5b44b
                                                                  • Instruction Fuzzy Hash: 37310771A057015BC7209F648C89B6BB7E4FFC6734F101F1DF9A8932D0D37598049692
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 151 4d80000-4d801a3 call 4d80010 170 4d801b3-4d801c6 GetCurrentHwProfileW 151->170 171 4d801d3-4d802ca call 4d802cc 170->171
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3352104310.0000000004D80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4d80000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d5b8489db28cdd7c2a0dbee52366f5cf8e2e8897f7f8eb3e6a588e7c9f0106c5
                                                                  • Instruction ID: d567db08257cf14c98cdc5f94ae0a97ecc9020d3e551c64c0111d7beec192646
                                                                  • Opcode Fuzzy Hash: d5b8489db28cdd7c2a0dbee52366f5cf8e2e8897f7f8eb3e6a588e7c9f0106c5
                                                                  • Instruction Fuzzy Hash: A34179EB34C214BDB213A5816B54AFB677DE6D6730732882EF883D2002F2D4AE4D2171
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 184 4d80023-4d80026 185 4d80028-4d80073 184->185 186 4d80074-4d801a3 184->186 185->186 202 4d801b3-4d801c6 GetCurrentHwProfileW 186->202 203 4d801d3-4d802ca call 4d802cc 202->203
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3352104310.0000000004D80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4d80000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ade9fb08730e53d91e085f0fd1d3c41ba2c93ac474f070b4a1a76d678b0c63f5
                                                                  • Instruction ID: e2e6fb6499906c477857a9e418ca66b4dd976df8121586781e3f706d121be0ab
                                                                  • Opcode Fuzzy Hash: ade9fb08730e53d91e085f0fd1d3c41ba2c93ac474f070b4a1a76d678b0c63f5
                                                                  • Instruction Fuzzy Hash: 61415BEB74C114BDB213A5816B54BFB677DE6D6B30732846AF843D2006F2D4AA4E2131
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 216 4d80010-4d801a3 233 4d801b3-4d801c6 GetCurrentHwProfileW 216->233 234 4d801d3-4d802ca call 4d802cc 233->234
                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04D801BF
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3352104310.0000000004D80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4d80000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: 82ce2e06fe0d5f2b03c4f3f7e442a0ab8fd2de81d377ec4c79b4ca7dc48beb7a
                                                                  • Instruction ID: b792543dd8f6f977a8b83ff59026f0bb7b11d89bf4f5926ec317bf6449ccd0e7
                                                                  • Opcode Fuzzy Hash: 82ce2e06fe0d5f2b03c4f3f7e442a0ab8fd2de81d377ec4c79b4ca7dc48beb7a
                                                                  • Instruction Fuzzy Hash: 17415BEB74C224BDB213A5816B54AFB677DE6D6730732842AF843D2006F2D49E4E2131
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 247 4d80049-4d801a3 263 4d801b3-4d801c6 GetCurrentHwProfileW 247->263 264 4d801d3-4d802ca call 4d802cc 263->264
                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04D801BF
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3352104310.0000000004D80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4d80000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: dd95b09082cf450e2ebc4008c0888fd80ffc608c151615d1d3b381295303c684
                                                                  • Instruction ID: 1996df986b012708145bb98641c4d3c471fcd971ecaae5e5738c806b0ae44572
                                                                  • Opcode Fuzzy Hash: dd95b09082cf450e2ebc4008c0888fd80ffc608c151615d1d3b381295303c684
                                                                  • Instruction Fuzzy Hash: 71416CEB74C114BCB203A5916B54BFB677DE6D6730732846AF843D6006F2D49E8D2071
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 277 4d80066-4d801a3 292 4d801b3-4d801c6 GetCurrentHwProfileW 277->292 293 4d801d3-4d802ca call 4d802cc 292->293
                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04D801BF
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3352104310.0000000004D80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4d80000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: e3619bb962846884d7f15f3b25dec6daf2386a1ce618c117989f4af75541f521
                                                                  • Instruction ID: f6e4320e8717aab6629c5fcd8d2fc3a4aa99b10e72e1f7dcea9408a5b097217e
                                                                  • Opcode Fuzzy Hash: e3619bb962846884d7f15f3b25dec6daf2386a1ce618c117989f4af75541f521
                                                                  • Instruction Fuzzy Hash: 7D413AEB74C124BCB203A5826B54BFB677DE6D6730732846AF847D2406F2D49B8E2171
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 306 f29779-f2979b 307 f297a1-f297a3 306->307 308 f2998e 306->308 309 f297a5-f297c4 call f18bd3 307->309 310 f297cf-f297f2 307->310 311 f29990-f29994 308->311 317 f297c7-f297ca 309->317 313 f297f4-f297f6 310->313 314 f297f8-f297fe 310->314 313->314 316 f29800-f29811 313->316 314->309 314->316 318 f29813-f29821 call f2262d 316->318 319 f29824-f29834 call f292be 316->319 317->311 318->319 324 f29836-f2983c 319->324 325 f2987d-f2988f 319->325 326 f29865-f2987b call f28e8f 324->326 327 f2983e-f29841 324->327 328 f29891-f29897 325->328 329 f298e6-f29906 WriteFile 325->329 348 f2985e-f29860 326->348 330 f29843-f29846 327->330 331 f2984c-f2985b call f29256 327->331 335 f298d2-f298e4 call f2933b 328->335 336 f29899-f2989c 328->336 333 f29911 329->333 334 f29908-f2990e 329->334 330->331 337 f29926-f29929 330->337 331->348 341 f29914-f2991f 333->341 334->333 357 f298b9-f298bc 335->357 342 f298be-f298d0 call f294ff 336->342 343 f2989e-f298a1 336->343 344 f2992c-f2992e 337->344 350 f29921-f29924 341->350 351 f29989-f2998c 341->351 342->357 343->344 352 f298a7-f298b4 call f29416 343->352 354 f29930-f29935 344->354 355 f2995c-f29968 344->355 348->341 350->337 351->311 352->357 358 f29937-f29949 354->358 359 f2994e-f29957 call f216b8 354->359 360 f29972-f29984 355->360 361 f2996a-f29970 355->361 357->348 358->317 359->317 360->317 361->308 361->360
                                                                  APIs
                                                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00F298FE
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.3340080174.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340135861.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3341457310.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343395123.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3344362930.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3345064536.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: FileWrite
                                                                  • String ID:
                                                                  • API String ID: 3934441357-0
                                                                  • Opcode ID: dfeb19a03e0b72736068ad708f99b5a8754766af374acf3438ebc61c4dd815fe
                                                                  • Instruction ID: 226f9ed719b3937da6e89233887c951f695643a366cbe24519dff38848911b6c
                                                                  • Opcode Fuzzy Hash: dfeb19a03e0b72736068ad708f99b5a8754766af374acf3438ebc61c4dd815fe
                                                                  • Instruction Fuzzy Hash: 7261DA72C08129AFDF11DFA8EC40AEE7BB9AF09324F140159E904A7246D775D941EB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 364 4d80088-4d801a3 376 4d801b3-4d801c6 GetCurrentHwProfileW 364->376 377 4d801d3-4d802ca call 4d802cc 376->377
                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04D801BF
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3352104310.0000000004D80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4d80000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: 781e418afe041fa80e8a991f4cd71fd7da36a69b582e00dee45bce99835f5509
                                                                  • Instruction ID: 65f92a376184a99034305d7d758e72204f1fdb30033be364cdf2807de99eb3e8
                                                                  • Opcode Fuzzy Hash: 781e418afe041fa80e8a991f4cd71fd7da36a69b582e00dee45bce99835f5509
                                                                  • Instruction Fuzzy Hash: 5B313AEB74C114BCB203A9816B54BFB677DE6D6730732846AF847D2406F2D49B8E2171
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 390 4d800b8-4d801a3 400 4d801b3-4d801c6 GetCurrentHwProfileW 390->400 401 4d801d3-4d802ca call 4d802cc 400->401
                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04D801BF
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3352104310.0000000004D80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4d80000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: b6c8b3b76d9cd7ca43afb7899555ee6f903822db28c23b8b60c2a80def8df161
                                                                  • Instruction ID: 94dcb1a4c3adf893e7e27be25f95b14feb5266327fb4efe0df515cadba8fb419
                                                                  • Opcode Fuzzy Hash: b6c8b3b76d9cd7ca43afb7899555ee6f903822db28c23b8b60c2a80def8df161
                                                                  • Instruction Fuzzy Hash: 76319AEB74C224BCB603A9916B14AFA677DE6D3730732847AF843D2006F2D49A4E2171
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 414 4d800e7-4d801a3 423 4d801b3-4d801c6 GetCurrentHwProfileW 414->423 424 4d801d3-4d802ca call 4d802cc 423->424
                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04D801BF
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3352104310.0000000004D80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4d80000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: 7b6a47e516569f314a7d9249f5bde3e19830ae7d7168e0045dffd0f5ec4a3746
                                                                  • Instruction ID: 94136cf91e93b99ed679f1c50893ab5508b930cea8e4e57c78314683a2a81ed8
                                                                  • Opcode Fuzzy Hash: 7b6a47e516569f314a7d9249f5bde3e19830ae7d7168e0045dffd0f5ec4a3746
                                                                  • Instruction Fuzzy Hash: B8215EEB74C215BCB613A9916B54BFB677DE6D6730732846AF843D2002F2D49B4D2071
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 437 4d800fb-4d801a3 444 4d801b3-4d801c6 GetCurrentHwProfileW 437->444 445 4d801d3-4d802ca call 4d802cc 444->445
                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04D801BF
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3352104310.0000000004D80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4d80000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: 8034314d5e699c2ba034621f378d11fb4793edf27dc99d22dd94dcc41dd3ac6f
                                                                  • Instruction ID: 7604b705265f8bf61d613e988b958558c0b2626f377dc724fae5839741cad96b
                                                                  • Opcode Fuzzy Hash: 8034314d5e699c2ba034621f378d11fb4793edf27dc99d22dd94dcc41dd3ac6f
                                                                  • Instruction Fuzzy Hash: 07216BEB74C215BCB613A9916B54AFB677DE5D2730732846AF843D2402F2D49B8D2071
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 458 4d80115-4d801a3 465 4d801b3-4d801c6 GetCurrentHwProfileW 458->465 466 4d801d3-4d802ca call 4d802cc 465->466
                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04D801BF
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3352104310.0000000004D80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4d80000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: 2e936e78d313e3180cebbc14c2a6a441f338006ef45fe84b52506bdc5364e540
                                                                  • Instruction ID: f8ccbada7c663a79b2e19611dac30518e3e7216a4c128264d8c185ea3d7796f1
                                                                  • Opcode Fuzzy Hash: 2e936e78d313e3180cebbc14c2a6a441f338006ef45fe84b52506bdc5364e540
                                                                  • Instruction Fuzzy Hash: 59217CEB74C225BCB613A9916B14AFB677DE5D3730732846AF443D6102F2D4AB8D2071
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 479 4d80197-4d80198 480 4d8019a 479->480 481 4d80137-4d80191 479->481 483 4d8019c-4d801a3 480->483 481->483 485 4d801b3-4d801c6 GetCurrentHwProfileW 483->485 487 4d801d3-4d802ca call 4d802cc 485->487
                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04D801BF
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3352104310.0000000004D80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4d80000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: d831730751d000904ab29c470baf02998f19a642a5a862ddcdef04370b9d3d74
                                                                  • Instruction ID: bb547e24da7338459cf764b135dd2632cd4ee047c07e08cb95157f771389bc68
                                                                  • Opcode Fuzzy Hash: d831730751d000904ab29c470baf02998f19a642a5a862ddcdef04370b9d3d74
                                                                  • Instruction Fuzzy Hash: D521A1EB74C215BCA213A9916B14BFAA77DE6D7730732846AF843D6002F2D4AB4D2471
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04D801BF
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3352104310.0000000004D80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4d80000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: d50b5fc729da7a23029849ef931e5c7b04db114fb09f081e10a9ca3ebebc1bde
                                                                  • Instruction ID: ceb2f85f17aaf790608c26afc6500d8d8a955ba07344c39e3e6a098bbfab9e12
                                                                  • Opcode Fuzzy Hash: d50b5fc729da7a23029849ef931e5c7b04db114fb09f081e10a9ca3ebebc1bde
                                                                  • Instruction Fuzzy Hash: 0221AFEB74C214BDA213A9916B14BFA677DE6D7730732847AF843E6102F2D49B4D2070
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04D801BF
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3352104310.0000000004D80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4d80000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: f16705e3c49586805a8e257f5f724f03210470caef0acca5f1f777f73f775668
                                                                  • Instruction ID: 66dc9c5175b48b1543e224d2bbd1f1bb386cc4254914a5d806d62e0813e4ac68
                                                                  • Opcode Fuzzy Hash: f16705e3c49586805a8e257f5f724f03210470caef0acca5f1f777f73f775668
                                                                  • Instruction Fuzzy Hash: CF119DEB64C211BCF213A9916B14BFA6B7DE6D2730732846EF443D6102F2D49B4D2171
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04D801BF
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3352104310.0000000004D80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4d80000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: 8120b2ed04fc4fda3ff59f9124e03a4e5e22ceb25513c4b693df9f197f3505bf
                                                                  • Instruction ID: b39490a34d7dbcf9ef7124a9a24c5eea9c07869eef6bd3905baee241cc7ef97a
                                                                  • Opcode Fuzzy Hash: 8120b2ed04fc4fda3ff59f9124e03a4e5e22ceb25513c4b693df9f197f3505bf
                                                                  • Instruction Fuzzy Hash: AF115EEB74C211BCB203A9916B58AFB6B7DE5D2730332886AF443D6505F2D49B4D2070
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(?), ref: 04D801BF
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3352104310.0000000004D80000.00000040.00001000.00020000.00000000.sdmp, Offset: 04D80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4d80000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: 0ed74d6a08a7759f9998945e636b7c8931ed1da5120e9710f074bb6cbbbd0270
                                                                  • Instruction ID: 9e3a10fdcf202cb3def3a6fa097c442439cdf26b8bfcd70c35b40f834291bcd3
                                                                  • Opcode Fuzzy Hash: 0ed74d6a08a7759f9998945e636b7c8931ed1da5120e9710f074bb6cbbbd0270
                                                                  • Instruction Fuzzy Hash: E51191EB748214BCA203A5916B58BFAA77DE6D2730732847AF443E2505F2D49B4D2070
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,00F28CD6,00000000,?,01057178,0000000C,00F28D92,?,?,?), ref: 00F28E45
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.3340080174.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340135861.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3341457310.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343395123.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3344362930.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3345064536.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: ChangeCloseFindNotification
                                                                  • String ID:
                                                                  • API String ID: 2591292051-0
                                                                  • Opcode ID: 26cf4bf3b9094097ebddaa8988286ec8816932c05c4c3cdda39689768cd672ad
                                                                  • Instruction ID: a385430c8c0f8220787a1eba8e7a36719ddf380347a2aa352f42c2403b8ce795
                                                                  • Opcode Fuzzy Hash: 26cf4bf3b9094097ebddaa8988286ec8816932c05c4c3cdda39689768cd672ad
                                                                  • Instruction Fuzzy Hash: 21112F33E0653456E63521B47C46B7E374D8B927B4F3B0659F814A71D2DE29AC82B190
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,00F22616,?,?,?,?,?), ref: 00F22548
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.3340080174.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340135861.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3341457310.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343395123.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3344362930.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3345064536.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: FilePointer
                                                                  • String ID:
                                                                  • API String ID: 973152223-0
                                                                  • Opcode ID: 3b98fb07cb91978e997d37e8bf7a7bffc437a5fc8650f81af8ba0330dad4924d
                                                                  • Instruction ID: 6485ae9c3e4581b2f1ded6c71ff48094b1be3a5ddd91b52260af760091690ea9
                                                                  • Opcode Fuzzy Hash: 3b98fb07cb91978e997d37e8bf7a7bffc437a5fc8650f81af8ba0330dad4924d
                                                                  • Instruction Fuzzy Hash: 3A0149336201257FCF19CF19EC52D9E3B19DB81334B384208F8109B291E675ED51AB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00EE331F
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.3340080174.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340135861.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3341457310.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343395123.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3344362930.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3345064536.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: Concurrency::cancel_current_task
                                                                  • String ID:
                                                                  • API String ID: 118556049-0
                                                                  • Opcode ID: 88e0f75f83d5f9e69285ef2088a1dfdc1055322beeb667a90db4e8c6ac7f301f
                                                                  • Instruction ID: e0d60eb349ea39bf7c47352d77c8fa6ce64f775574e129306e8dc4ddb07ca503
                                                                  • Opcode Fuzzy Hash: 88e0f75f83d5f9e69285ef2088a1dfdc1055322beeb667a90db4e8c6ac7f301f
                                                                  • Instruction Fuzzy Hash: E6F02472100108DBCB146F75D809CE9B3E8EF143A1710097AE89CE7212EB2ADA809BC0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00F14B2F,?,?,761B23A0,?,?,00EE3522,?,?), ref: 00F2B0B9
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.3340080174.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340135861.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3341457310.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343395123.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3344362930.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3345064536.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1279760036-0
                                                                  • Opcode ID: f56f0eeae70a29449f966604ce156f264aebd978159cbab6207af0f05ea65963
                                                                  • Instruction ID: fbc7e82be9d4713031f28f6c8e29bed187251e3319c03f552dbfa9ff509c2874
                                                                  • Opcode Fuzzy Hash: f56f0eeae70a29449f966604ce156f264aebd978159cbab6207af0f05ea65963
                                                                  • Instruction Fuzzy Hash: 60E06D329026316AEA33A6B57C05B6F3749EF427B0F190121FE24A70C1DF28DC40A1E1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.3340080174.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340135861.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3341457310.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343395123.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3344362930.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3345064536.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d832fe2a0f42001a57c9b2c34ab75cd1b9a187cae735d2738bff895b2773b599
                                                                  • Instruction ID: 72fd7202fcea208793c3da3b84e4c0570227d7c24e8642cedffc544939c0b87d
                                                                  • Opcode Fuzzy Hash: d832fe2a0f42001a57c9b2c34ab75cd1b9a187cae735d2738bff895b2773b599
                                                                  • Instruction Fuzzy Hash: E1023B71E412199BDF14CFA9D8806EEBBF1FF48324F248269D919E7380D731AD819B90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00EFA09D
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00EFA0BF
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00EFA0E7
                                                                  • __Getctype.LIBCPMT ref: 00EFA1C5
                                                                  • std::_Facet_Register.LIBCPMT ref: 00EFA1F9
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00EFA223
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.3340080174.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340135861.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3341457310.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343395123.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3344362930.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3345064536.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                                                  • String ID: PD$PG$E
                                                                  • API String ID: 1102183713-3756609794
                                                                  • Opcode ID: aab0cc738f37cbe9c9535c931c33d2fd39ddf3c154bc2bc446f97df8bc8c311d
                                                                  • Instruction ID: fcb204dc5daeb52866930640c04df1eec54ae523214d9a9c913690869c039267
                                                                  • Opcode Fuzzy Hash: aab0cc738f37cbe9c9535c931c33d2fd39ddf3c154bc2bc446f97df8bc8c311d
                                                                  • Instruction Fuzzy Hash: 6551A8B0D01259DFDB20CF98C9417AEBBB4BB00714F18826DD885AB391D779AE44CBD2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • _ValidateLocalCookies.LIBCMT ref: 00F172F7
                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00F172FF
                                                                  • _ValidateLocalCookies.LIBCMT ref: 00F17388
                                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00F173B3
                                                                  • _ValidateLocalCookies.LIBCMT ref: 00F17408
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.3340080174.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340135861.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3341457310.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343395123.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3344362930.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3345064536.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                  • String ID: " Yk$`-$csm
                                                                  • API String ID: 1170836740-2743354744
                                                                  • Opcode ID: 3dbde307851a4881d6a586a9a3ff1d2ecc6f7f7d1e351879b48bd45b2078f379
                                                                  • Instruction ID: 9fc2deefddc9ad5e3bd827ce5aab939c348583ba65c6a8fe563c629b5c493246
                                                                  • Opcode Fuzzy Hash: 3dbde307851a4881d6a586a9a3ff1d2ecc6f7f7d1e351879b48bd45b2078f379
                                                                  • Instruction Fuzzy Hash: 2941A634E043099BCF10EF69C884ADEBBB5AF44324F148155FC189B352DB75D981EB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00EFC45A
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00EFC47C
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00EFC4A4
                                                                  • std::_Facet_Register.LIBCPMT ref: 00EFC59A
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00EFC5C4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.3340080174.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340135861.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3341457310.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343395123.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3344362930.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3345064536.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                                  • String ID: E$PD
                                                                  • API String ID: 459529453-4195941332
                                                                  • Opcode ID: b61fbdf34898064d4e0776105a9ad7140a6068162e9b57dd61385dcf8d9da799
                                                                  • Instruction ID: 772ccedb06100e01e71930ef81637d4e2f5194d408760917b29a68d93e25b3d5
                                                                  • Opcode Fuzzy Hash: b61fbdf34898064d4e0776105a9ad7140a6068162e9b57dd61385dcf8d9da799
                                                                  • Instruction Fuzzy Hash: DD519FB0900258DFDB21DF98C944BAEBBF0FB00714F348159E595AB381D77AAA45CBD1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.3340080174.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340135861.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3341457310.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343395123.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3344362930.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3345064536.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: _strrchr
                                                                  • String ID:
                                                                  • API String ID: 3213747228-0
                                                                  • Opcode ID: 88e4da6258101c5fc24b34185784eb547dfa0330ad300027970d950eece25734
                                                                  • Instruction ID: 7780c9766bd11b65cb46b35bd2ae4d7fa6b0f95ba70b5e0f0024d40862159b55
                                                                  • Opcode Fuzzy Hash: 88e4da6258101c5fc24b34185784eb547dfa0330ad300027970d950eece25734
                                                                  • Instruction Fuzzy Hash: ECB15732D007759FDB218F24DC82BEE7BA5EF55360F158155ED04AF282D7789901E7A0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 00F12720
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00F1272B
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00F12799
                                                                    • Part of subcall function 00F1287C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00F12894
                                                                  • std::locale::_Setgloballocale.LIBCPMT ref: 00F12746
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.3340080174.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340135861.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3341457310.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343395123.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3344362930.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3345064536.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                                                  • String ID: `-
                                                                  • API String ID: 677527491-2038111592
                                                                  • Opcode ID: 658776ac60dba29e95c195e1ed3101aed3cf512b83bedcbbfe5cdc5d2591d3c3
                                                                  • Instruction ID: c1d9868e0adbcf76c7a22bc0aef562c6b0878f5b92ab5e0270d3372e8d71fd7a
                                                                  • Opcode Fuzzy Hash: 658776ac60dba29e95c195e1ed3101aed3cf512b83bedcbbfe5cdc5d2591d3c3
                                                                  • Instruction Fuzzy Hash: 3E01BC75A002209BCB09EB60C8455BD7BB1BF84BA0B088009E84157385CF78AE92EB81
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __freea.LIBCMT ref: 00F2A85E
                                                                    • Part of subcall function 00F2B086: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00F14B2F,?,?,761B23A0,?,?,00EE3522,?,?), ref: 00F2B0B9
                                                                  • __freea.LIBCMT ref: 00F2A871
                                                                  • __freea.LIBCMT ref: 00F2A87E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.3340080174.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340135861.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3341457310.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343395123.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3344362930.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3345064536.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: __freea$AllocateHeap
                                                                  • String ID: " Yk
                                                                  • API String ID: 2243444508-2720768132
                                                                  • Opcode ID: 88f66833408e155d4ed57f60c18743fbaa9b6de0b08571bfc3803d9bc3bc9c92
                                                                  • Instruction ID: 50e8a042383bf17fe164c3e4773d15b3c303fdf49e80d897a1af1984cf3ac336
                                                                  • Opcode Fuzzy Hash: 88f66833408e155d4ed57f60c18743fbaa9b6de0b08571bfc3803d9bc3bc9c92
                                                                  • Instruction Fuzzy Hash: 9051E672A00226AFEB215F64EC85EFB3BA9DF84760F150128FD05E6151EB34DC52F662
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00EE750C
                                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00EE7522
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.3340080174.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340135861.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3341457310.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343395123.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3344362930.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3345064536.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: ___std_exception_destroy
                                                                  • String ID: )$[json.exception.
                                                                  • API String ID: 4194217158-1768919221
                                                                  • Opcode ID: ff0270d93c32449ddaa9fb3980c4dc93047469222e5d958a40322e13772aab38
                                                                  • Instruction ID: 0168660a548facac41d33ec035fcc13f6ed68320b5db229d1c4cb42068e88c55
                                                                  • Opcode Fuzzy Hash: ff0270d93c32449ddaa9fb3980c4dc93047469222e5d958a40322e13772aab38
                                                                  • Instruction Fuzzy Hash: 1B51CFB1D042889FDB00DFA8CD05B9EBBF4EF51314F144269E854AB282E7B85A44D7A1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00EE499F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.3340080174.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340135861.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3341457310.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343395123.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3344362930.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3345064536.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: Ios_base_dtorstd::ios_base::_
                                                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                  • API String ID: 323602529-1866435925
                                                                  • Opcode ID: d03ead5eed8096f33f1742a28478e628eb5df25f341fcfd746a65d4178517b46
                                                                  • Instruction ID: 65a63939f362c9978889a6d1c3d7ef7660ef732d0797351b0316a7dde93124aa
                                                                  • Opcode Fuzzy Hash: d03ead5eed8096f33f1742a28478e628eb5df25f341fcfd746a65d4178517b46
                                                                  • Instruction Fuzzy Hash: 761129F2904688BBCB10DE5DEC42B96739CEB45710F044669FD98B72C2EA35A900D796
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00EE3819
                                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00EE38F0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.3340080174.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340135861.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3341457310.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343395123.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3344362930.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3345064536.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: ___std_exception_copy___std_exception_destroy
                                                                  • String ID: )
                                                                  • API String ID: 2970364248-2934624886
                                                                  • Opcode ID: 56e7ee72c96b7a3829f5594d5cc31c61c2e065e6e60f216ca773ba39a203f7f0
                                                                  • Instruction ID: 2be47082885ac62cebf1f8ead2620ef3052c8b4b736cfabcf97204fb1c6633e9
                                                                  • Opcode Fuzzy Hash: 56e7ee72c96b7a3829f5594d5cc31c61c2e065e6e60f216ca773ba39a203f7f0
                                                                  • Instruction Fuzzy Hash: F76189B1D00258DFDB14CF98C948B9DFBB4FF58324F148259E854BB282D7B55A84CBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00EE499F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.3340080174.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340135861.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3341457310.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343395123.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3344362930.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3345064536.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: Ios_base_dtorstd::ios_base::_
                                                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                                                  • API String ID: 323602529-1240500531
                                                                  • Opcode ID: 4e144f3690b2e536f2e9a4abf8d6189152886989c7cedbdfeecc19f7935dc9a2
                                                                  • Instruction ID: 30cac973552674c3a3c654078d4f333de3dcd4ce832ae2774caa39c8c37cdcde
                                                                  • Opcode Fuzzy Hash: 4e144f3690b2e536f2e9a4abf8d6189152886989c7cedbdfeecc19f7935dc9a2
                                                                  • Instruction Fuzzy Hash: F24101B1900288ABCB04DF69CC45BAEBBF8EB45710F14825DF454BB382D775AA00DBA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00EE4061
                                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00EE40C4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.3340080174.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340135861.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3341457310.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343395123.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3344362930.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3345064536.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                                  • String ID: bad locale name
                                                                  • API String ID: 3988782225-1405518554
                                                                  • Opcode ID: 242190953e814f941779ea5059ec7335afd62a7269a4a0091cb29ceb2c73007e
                                                                  • Instruction ID: 0a361bede260366bacd68d240575a90c4f933af2437b93e0ab889637e6a5874a
                                                                  • Opcode Fuzzy Hash: 242190953e814f941779ea5059ec7335afd62a7269a4a0091cb29ceb2c73007e
                                                                  • Instruction Fuzzy Hash: 1A11D3B0905BC4DED721CFA8C90478BBFF4AF15714F14869DE09597B81D3B9AA04C792
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00EF65C9
                                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00EF65FC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.3340080174.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340135861.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3341457310.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343395123.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3344362930.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3345064536.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: ___std_exception_copy
                                                                  • String ID: )
                                                                  • API String ID: 2659868963-2934624886
                                                                  • Opcode ID: 80035c20609282a71bc875d013ec7be81933b4a88d491c62ab3208981e333fc5
                                                                  • Instruction ID: e5f5babede17e87bb98c029d3f8547f18819ac5b23c6c3f694796235e4af498d
                                                                  • Opcode Fuzzy Hash: 80035c20609282a71bc875d013ec7be81933b4a88d491c62ab3208981e333fc5
                                                                  • Instruction Fuzzy Hash: 65112EB5900648EBCB15CF99C980B86F7FCFB59720F10876AE95497641E774A540CBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00EE7A5C
                                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00EE7A72
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.3340080174.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340135861.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3341457310.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343395123.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3344362930.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3345064536.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: ___std_exception_destroy
                                                                  • String ID: )
                                                                  • API String ID: 4194217158-2934624886
                                                                  • Opcode ID: 16d7c0e4796cebb205c5b6bd63252cb387e9a0bc4ef5b97fd6e5eaa68825a7a6
                                                                  • Instruction ID: c941d6a45f55f47e8724ea66b04de343fc52953cbcddea1d93731e32500db8d0
                                                                  • Opcode Fuzzy Hash: 16d7c0e4796cebb205c5b6bd63252cb387e9a0bc4ef5b97fd6e5eaa68825a7a6
                                                                  • Instruction Fuzzy Hash: 7FF06DB1905748EFC710DF98C90178DBBFCEB45B24F50066AE8A4E3780D77966048BA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetSystemTimePreciseAsFileTime.KERNEL32(?,00F13067,?,?,?,?,00FA51DF), ref: 00F13645
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.3340135861.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.3340080174.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340135861.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340478076.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3340597184.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3341457310.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343395123.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3343450432.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3344362930.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000008.00000002.3345064536.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: Time$FilePreciseSystem
                                                                  • String ID: " Yk$`-
                                                                  • API String ID: 1802150274-3396297887
                                                                  • Opcode ID: f3836966f2640ca0ba67f546a96a7bf89bd741895001a6e143fe2b6141fd78b4
                                                                  • Instruction ID: a1e7020600245f9ec9114aab2c557485cfc790f462e2ade0740a3e2201f1d2ee
                                                                  • Opcode Fuzzy Hash: f3836966f2640ca0ba67f546a96a7bf89bd741895001a6e143fe2b6141fd78b4
                                                                  • Instruction Fuzzy Hash: D3F06532A446A4EFCB119F55DC05F99B7A9F708F60F11412AE852D7784DB79A9009B80
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • setsockopt.WS2_32(000003E0,0000FFFF,00001006,?,00000008), ref: 00FA4F57
                                                                  • recv.WS2_32(?,00000004,00000002), ref: 00FA4F71
                                                                  • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 00FA4FF3
                                                                  • recv.WS2_32(00000000,0000000C,00000008), ref: 00FA5014
                                                                  • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?,00000000), ref: 00FA50B0
                                                                    • Part of subcall function 00FA5940: WSAStartup.WS2_32 ref: 00FA596A
                                                                    • Part of subcall function 00FA5940: socket.WS2_32(?,?,?,?,?,?,01066328,?,?), ref: 00FA5A0E
                                                                    • Part of subcall function 00FA5940: connect.WS2_32(00000000,01036B31,?,?,?,?,01066328,?,?), ref: 00FA5A21
                                                                    • Part of subcall function 00FA5940: closesocket.WS2_32(00000000), ref: 00FA5A2D
                                                                  • recv.WS2_32(00000000,?,00000008), ref: 00FA50CB
                                                                  • recv.WS2_32(?,00000004,00000008), ref: 00FA51D3
                                                                  • __Xtime_get_ticks.LIBCPMT ref: 00FA51DA
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FA51E8
                                                                  • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 00FA5261
                                                                  • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 00FA5269
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 0000000C.00000002.3340427755.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340478716.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3343463702.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346149762.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346402716.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346488774.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: recv$Sleepsetsockopt$StartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectsocket
                                                                  • String ID:
                                                                  • API String ID: 301102601-0
                                                                  • Opcode ID: 98c65aa0bf86f2255bceec0d93320c9ba4ba7270f55d922bbf15caa44f804fa3
                                                                  • Instruction ID: d6bba0f83edd258ec69373b4f42b7e820f0d56bcad554f3d159c95f4246492a6
                                                                  • Opcode Fuzzy Hash: 98c65aa0bf86f2255bceec0d93320c9ba4ba7270f55d922bbf15caa44f804fa3
                                                                  • Instruction Fuzzy Hash: 4FB1AEB1D00308DFEB24DFA4CD89BADBBB5FB45710F204219E494AB2D2D77A5944DB81
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 57 ee9280-ee92dd call ef63b0 60 ee9413-ee9521 call ee2df0 call fc77d0 57->60 61 ee92e3-ee92e9 57->61 77 ee9537-ee953f call ef8dc0 60->77 78 ee9523-ee9535 60->78 62 ee92f0-ee9313 61->62 64 ee9324-ee9331 62->64 65 ee9315-ee931f 62->65 68 ee9342-ee934f 64->68 69 ee9333-ee933d 64->69 67 ee9403-ee9406 65->67 71 ee9409-ee940d 67->71 72 ee9360-ee936d 68->72 73 ee9351-ee935b 68->73 69->67 71->60 71->62 75 ee937e-ee938b 72->75 76 ee936f-ee9379 72->76 73->67 79 ee938d-ee9397 75->79 80 ee9399-ee93a6 75->80 76->67 81 ee9544-ee9597 call fc77d0 * 2 77->81 78->81 79->67 84 ee93a8-ee93b2 80->84 85 ee93b4-ee93c1 80->85 94 ee95cb-ee95e1 call fc77d0 81->94 95 ee9599-ee95c8 call fc77d0 call f15260 81->95 84->67 86 ee93cf-ee93dc 85->86 87 ee93c3-ee93cd 85->87 89 ee93de-ee93e8 86->89 90 ee93ea-ee93f4 86->90 87->67 89->67 90->71 93 ee93f6-ee93ff 90->93 93->67 101 ee95e7-ee95ed 94->101 102 ee96e2 94->102 95->94 105 ee95f0-ee96ce WSASend 101->105 103 ee96e6-ee96f0 102->103 106 ee971e-ee973d 103->106 107 ee96f2-ee96fe 103->107 123 ee975f-ee9763 105->123 124 ee96d4-ee96dc 105->124 110 ee976f-ee9796 106->110 111 ee973f-ee974b 106->111 108 ee9714-ee971b call f138e3 107->108 109 ee9700-ee970e 107->109 108->106 109->108 113 ee9797-ee97fe call f18c60 call ee2df0 * 2 109->113 115 ee974d-ee975b 111->115 116 ee9765-ee976c call f138e3 111->116 115->113 121 ee975d 115->121 116->110 121->116 123->103 124->102 124->105
                                                                  APIs
                                                                  • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,0102A4DC,00000000,761B23A0,-01066880), ref: 00EE96C9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 0000000C.00000002.3340427755.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340478716.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3343463702.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346149762.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346402716.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346488774.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: Send
                                                                  • String ID: 4oST$4oST$Ws2_32.dll
                                                                  • API String ID: 121738739-1839276265
                                                                  • Opcode ID: 1476c099a8ea749ce7b31b2cf5567bb057f3c728d1bc78c95b4c2db0cf9d49e3
                                                                  • Instruction ID: 76ecf45683fbfdc8c1e97cbab7cf2632301cdfec2774fa8a49058a11e159eee7
                                                                  • Opcode Fuzzy Hash: 1476c099a8ea749ce7b31b2cf5567bb057f3c728d1bc78c95b4c2db0cf9d49e3
                                                                  • Instruction Fuzzy Hash: C902DA70E04288DFCF25CFA4C8907ACBBB0EF55314F244289E8857B686D7741A86CB92
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 130 fa5940-fa5972 WSAStartup 131 fa5978-fa59a2 call fc77d0 * 2 130->131 132 fa5a46-fa5a4f 130->132 137 fa59ae-fa59f4 131->137 138 fa59a4-fa59a8 131->138 140 fa5a40 137->140 141 fa59f6-fa59fc 137->141 138->132 138->137 140->132 142 fa59fe 141->142 143 fa5a54-fa5a5e 141->143 144 fa5a04-fa5a18 socket 142->144 143->140 149 fa5a60-fa5a68 143->149 144->140 145 fa5a1a-fa5a2a connect 144->145 147 fa5a2c-fa5a34 closesocket 145->147 148 fa5a50 145->148 147->144 150 fa5a36-fa5a3a 147->150 148->143 150->140
                                                                  APIs
                                                                  • WSAStartup.WS2_32 ref: 00FA596A
                                                                  • socket.WS2_32(?,?,?,?,?,?,01066328,?,?), ref: 00FA5A0E
                                                                  • connect.WS2_32(00000000,01036B31,?,?,?,?,01066328,?,?), ref: 00FA5A21
                                                                  • closesocket.WS2_32(00000000), ref: 00FA5A2D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 0000000C.00000002.3340427755.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340478716.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3343463702.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346149762.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346402716.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346488774.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: Startupclosesocketconnectsocket
                                                                  • String ID:
                                                                  • API String ID: 3098855095-0
                                                                  • Opcode ID: ee3049776f3e03f06002833078ddfe9db936e2d81b5592968ff27cbc93fc41fd
                                                                  • Instruction ID: b014de7f2dba4cf93563dd0f8d93fa47b9cfa069b7f30810d463224e8c3d69db
                                                                  • Opcode Fuzzy Hash: ee3049776f3e03f06002833078ddfe9db936e2d81b5592968ff27cbc93fc41fd
                                                                  • Instruction Fuzzy Hash: C7310772A057015BC7209F648C89B6BB7E8FFCA734F101F1DF9A8931D0D37598049692
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 151 f29779-f2979b 152 f297a1-f297a3 151->152 153 f2998e 151->153 155 f297a5-f297c4 call f18bd3 152->155 156 f297cf-f297f2 152->156 154 f29990-f29994 153->154 164 f297c7-f297ca 155->164 158 f297f4-f297f6 156->158 159 f297f8-f297fe 156->159 158->159 160 f29800-f29811 158->160 159->155 159->160 162 f29813-f29821 call f2262d 160->162 163 f29824-f29834 call f292be 160->163 162->163 169 f29836-f2983c 163->169 170 f2987d-f2988f 163->170 164->154 173 f29865-f2987b call f28e8f 169->173 174 f2983e-f29841 169->174 171 f29891-f29897 170->171 172 f298e6-f29906 WriteFile 170->172 175 f298d2-f298e4 call f2933b 171->175 176 f29899-f2989c 171->176 179 f29911 172->179 180 f29908-f2990e 172->180 190 f2985e-f29860 173->190 177 f29843-f29846 174->177 178 f2984c-f2985b call f29256 174->178 202 f298b9-f298bc 175->202 184 f298be-f298d0 call f294ff 176->184 185 f2989e-f298a1 176->185 177->178 186 f29926-f29929 177->186 178->190 183 f29914-f2991f 179->183 180->179 191 f29921-f29924 183->191 192 f29989-f2998c 183->192 184->202 193 f298a7-f298b4 call f29416 185->193 194 f2992c-f2992e 185->194 186->194 190->183 191->186 192->154 193->202 199 f29930-f29935 194->199 200 f2995c-f29968 194->200 203 f29937-f29949 199->203 204 f2994e-f29957 call f216b8 199->204 205 f29972-f29984 200->205 206 f2996a-f29970 200->206 202->190 203->164 204->164 205->164 206->153 206->205
                                                                  APIs
                                                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00F298FE
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 0000000C.00000002.3340427755.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340478716.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3343463702.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346149762.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346402716.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346488774.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: FileWrite
                                                                  • String ID:
                                                                  • API String ID: 3934441357-0
                                                                  • Opcode ID: 6224bda4925643a7d1f3144d22ff1c62994d7fb75f26ca2ae111efac172e2403
                                                                  • Instruction ID: 1255251ff783324553651b094a929eaf648fece0622c525f1be42dca69fdc57f
                                                                  • Opcode Fuzzy Hash: 6224bda4925643a7d1f3144d22ff1c62994d7fb75f26ca2ae111efac172e2403
                                                                  • Instruction Fuzzy Hash: 3461EB72C08129AFDF11DFA8EC44EEE7BB9BF09324F180149E900A7246D375D941EB50
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 209 5150196-515026b 217 5150276-5150292 GetCurrentHwProfileW 209->217 219 51502a2-5150380 call 5150381 217->219
                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(5C32B243), ref: 0515028D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3352890589.0000000005150000.00000040.00001000.00020000.00000000.sdmp, Offset: 05150000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_5150000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: 19a2609ecdd55a4e5fa4eab6b4f7af072f833925da7605f4a9ee661bae4eb84b
                                                                  • Instruction ID: b2fbd271137a0463095d3589092382b2bc521dfe80b1576ef72499e371abc396
                                                                  • Opcode Fuzzy Hash: 19a2609ecdd55a4e5fa4eab6b4f7af072f833925da7605f4a9ee661bae4eb84b
                                                                  • Instruction Fuzzy Hash: 382103E790C124ED772AC5C11B88AF667AFEA8E3703724066BD27D6601E3E45F8D0171
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 230 5150187-515026b 238 5150276-5150292 GetCurrentHwProfileW 230->238 240 51502a2-5150380 call 5150381 238->240
                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(5C32B243), ref: 0515028D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3352890589.0000000005150000.00000040.00001000.00020000.00000000.sdmp, Offset: 05150000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_5150000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: b45b9355640da2c55af23e39e7818cb2ed313ca2e2f4f3f8cbf07d2f74b90975
                                                                  • Instruction ID: 9e15a208379d48c9b3b99360f84cf0dcdf911699f2b5aa66243b6d2ef7109445
                                                                  • Opcode Fuzzy Hash: b45b9355640da2c55af23e39e7818cb2ed313ca2e2f4f3f8cbf07d2f74b90975
                                                                  • Instruction Fuzzy Hash: 2321D6A750C224EDB72AC5C15B496F667AEEA8E3707724066BD27D2601E3F41E8C0171
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 251 51501c7-51501d5 252 51501d7-51501d9 251->252 253 51501b6-51501c2 251->253 254 51501db-515026b 252->254 253->254 260 5150276-5150292 GetCurrentHwProfileW 254->260 262 51502a2-5150380 call 5150381 260->262
                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(5C32B243), ref: 0515028D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3352890589.0000000005150000.00000040.00001000.00020000.00000000.sdmp, Offset: 05150000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_5150000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: cbc8cc37da67053cd854d8b1925f74d4c17735813b2dd61b70b328621adc13d7
                                                                  • Instruction ID: 0701253338992943785b0e89eafe0937902150f09e3a179e17f55bfac0d6daee
                                                                  • Opcode Fuzzy Hash: cbc8cc37da67053cd854d8b1925f74d4c17735813b2dd61b70b328621adc13d7
                                                                  • Instruction Fuzzy Hash: A22122A790C224EEA37AC6D10B486F667ABAA9F3307724066BD2396501E3F01E8C0171
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 273 51501f2-515026b 278 5150276-5150292 GetCurrentHwProfileW 273->278 280 51502a2-5150380 call 5150381 278->280
                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(5C32B243), ref: 0515028D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3352890589.0000000005150000.00000040.00001000.00020000.00000000.sdmp, Offset: 05150000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_5150000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: b86ac79a56f1bcbeba4f284d3a937b87cb8dcc42c3fb41fda103ea51b7a660c7
                                                                  • Instruction ID: 0b686ed515bb6f53044a042d1e9601f119f7d2bb708b9cca561a7f513c3aae53
                                                                  • Opcode Fuzzy Hash: b86ac79a56f1bcbeba4f284d3a937b87cb8dcc42c3fb41fda103ea51b7a660c7
                                                                  • Instruction Fuzzy Hash: E21108AB90C114EDA76AC6C15B186F6676EA68F3707764076BD23D6101E3F01F8D4131
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 291 515020d-515026b 296 5150276-5150292 GetCurrentHwProfileW 291->296 298 51502a2-5150380 call 5150381 296->298
                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(5C32B243), ref: 0515028D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3352890589.0000000005150000.00000040.00001000.00020000.00000000.sdmp, Offset: 05150000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_5150000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: dbf532ed936abff1dc374952cf321e524d33553c7341cb71c6980bc390eaaf91
                                                                  • Instruction ID: 1789be3ec031c95dbb836a031113c58c5cdb0270b1cc45fd89fdcc21c18d8f26
                                                                  • Opcode Fuzzy Hash: dbf532ed936abff1dc374952cf321e524d33553c7341cb71c6980bc390eaaf91
                                                                  • Instruction Fuzzy Hash: 581127A750C114EDA72AC6C15708AF6A76EEA8F3707724472BD13D6101E3F01E8C4531
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 309 5150297-5150298 310 5150237-515026b 309->310 311 515029a-515029c 309->311 315 5150276-5150292 GetCurrentHwProfileW 310->315 311->310 313 515029e-51502a0 311->313 314 51502a2-5150380 call 5150381 313->314 315->314
                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(5C32B243), ref: 0515028D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3352890589.0000000005150000.00000040.00001000.00020000.00000000.sdmp, Offset: 05150000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_5150000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: 264006926374d90303e48177ecd8cf5adf7f33bb89f80e2eeb3057b44eaf1e88
                                                                  • Instruction ID: 05e03aef7c360b5ac9bd4eb1451ae414ac0fb92f3263677916cd5d95a2bc683c
                                                                  • Opcode Fuzzy Hash: 264006926374d90303e48177ecd8cf5adf7f33bb89f80e2eeb3057b44eaf1e88
                                                                  • Instruction Fuzzy Hash: 5C1127E790C264EDA766C1C40709AF66B6FEA8E7707764066FD13C6101E3F40E8D8571
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 327 5150229-515026b 331 5150276-5150292 GetCurrentHwProfileW 327->331 333 51502a2-5150380 call 5150381 331->333
                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(5C32B243), ref: 0515028D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3352890589.0000000005150000.00000040.00001000.00020000.00000000.sdmp, Offset: 05150000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_5150000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: 6b5a247197c64134697269beced961130d5246fc9d80cc47263f4316b958d35f
                                                                  • Instruction ID: 069cdc5a682596fcf75ec821a21ab396b8ea95a5acf76ac38bcff0837599a4f8
                                                                  • Opcode Fuzzy Hash: 6b5a247197c64134697269beced961130d5246fc9d80cc47263f4316b958d35f
                                                                  • Instruction Fuzzy Hash: C4115BE790C258EEA756C1D40A59AF66BAE9A8F3707724076FD13D7102E3B00D488171
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 344 51501eb-515026b 348 5150276-5150292 GetCurrentHwProfileW 344->348 350 51502a2-5150380 call 5150381 348->350
                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(5C32B243), ref: 0515028D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3352890589.0000000005150000.00000040.00001000.00020000.00000000.sdmp, Offset: 05150000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_5150000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: 2069e830a8143a965962a1f9d51266b830763f5577d3d8765a241643afe53aaa
                                                                  • Instruction ID: 656665b8e12ceef2754002c3f7651432a0c7682c4aeb3efe5b31f6c751fc19cd
                                                                  • Opcode Fuzzy Hash: 2069e830a8143a965962a1f9d51266b830763f5577d3d8765a241643afe53aaa
                                                                  • Instruction Fuzzy Hash: 50113AE780C264EDA76AC1D00649AF667AF9A8F3707724076FD13D6101E3F00D8C4171
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 361 51502af-51502bb 362 5150280-5150292 GetCurrentHwProfileW 361->362 363 51502bd-5150380 call 5150381 361->363 367 51502a2-51502a6 362->367 367->363
                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(5C32B243), ref: 0515028D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3352890589.0000000005150000.00000040.00001000.00020000.00000000.sdmp, Offset: 05150000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_5150000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: e28e2cf53b30ce5011cd78f88d9d8511f1779d8146670a14c7138ff0b01a9a25
                                                                  • Instruction ID: ddfbb52d88de580ff3bcb899315405866def686e8acfd50f79bdfe5862c81b17
                                                                  • Opcode Fuzzy Hash: e28e2cf53b30ce5011cd78f88d9d8511f1779d8146670a14c7138ff0b01a9a25
                                                                  • Instruction Fuzzy Hash: 8C019CE790C124EEAB1AD6D58699BF62BABDA8E3707330066FD03C7101E3B04DC94561
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 375 5150263-5150266 376 515026d-5150274 375->376 377 5150268-515026b 375->377 378 5150276-5150292 GetCurrentHwProfileW 376->378 377->378 380 51502a2-5150380 call 5150381 378->380
                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(5C32B243), ref: 0515028D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3352890589.0000000005150000.00000040.00001000.00020000.00000000.sdmp, Offset: 05150000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_5150000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: 57afe6dceb976a835f77ad7c0f2a170acb74e4eb5e5b881c2fac9b9bf5f73fd9
                                                                  • Instruction ID: ed53e0ddc0988d6716dd53233968966713371a4d7952321c9fd76258decdc527
                                                                  • Opcode Fuzzy Hash: 57afe6dceb976a835f77ad7c0f2a170acb74e4eb5e5b881c2fac9b9bf5f73fd9
                                                                  • Instruction Fuzzy Hash: E40168A390C264EEE72AC1D00A586F627AB9A8F3307264067AD23CA201E7B00D884132
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 391 f28def-f28e03 call f2e92e 394 f28e05-f28e07 391->394 395 f28e09-f28e11 391->395 396 f28e57-f28e77 call f2e89d 394->396 397 f28e13-f28e1a 395->397 398 f28e1c-f28e1f 395->398 408 f28e89 396->408 409 f28e79-f28e87 call f216b8 396->409 397->398 402 f28e27-f28e3b call f2e92e * 2 397->402 399 f28e21-f28e25 398->399 400 f28e3d-f28e4d call f2e92e FindCloseChangeNotification 398->400 399->400 399->402 400->394 413 f28e4f-f28e55 400->413 402->394 402->400 411 f28e8b-f28e8e 408->411 409->411 413->396
                                                                  APIs
                                                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,00F28CD6,00000000,?,01057178,0000000C,00F28D92,?,?,?), ref: 00F28E45
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 0000000C.00000002.3340427755.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340478716.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3343463702.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346149762.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346402716.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346488774.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: ChangeCloseFindNotification
                                                                  • String ID:
                                                                  • API String ID: 2591292051-0
                                                                  • Opcode ID: e34978cc719c2105f4576b8e74ec186658d6b6c9af7cf8391cb6432c41005f82
                                                                  • Instruction ID: 97b1334dad14eaf796074a6c3206dc273412a534eb74aa0fef33f2f51c967436
                                                                  • Opcode Fuzzy Hash: e34978cc719c2105f4576b8e74ec186658d6b6c9af7cf8391cb6432c41005f82
                                                                  • Instruction Fuzzy Hash: 18114233E0653459E63521B47C4ABBE378D8B927B4F3B065DF814A71D2DE299CC27190
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(5C32B243), ref: 0515028D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3352890589.0000000005150000.00000040.00001000.00020000.00000000.sdmp, Offset: 05150000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_5150000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: dd199aac3bc00f8f015829aaee613aa0f0208e20d676fef4a70c49b8b1d345f2
                                                                  • Instruction ID: 84a684986aa9d1a79081656fd13162aa8bb0b0b6d6cacc69a69e411c0baad5dc
                                                                  • Opcode Fuzzy Hash: dd199aac3bc00f8f015829aaee613aa0f0208e20d676fef4a70c49b8b1d345f2
                                                                  • Instruction Fuzzy Hash: 5C017BE790C154EEA716C5D54659BFA2BAADACE3707274466BE038B100E3B04DC84561
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentHwProfileW.ADVAPI32(5C32B243), ref: 0515028D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3352890589.0000000005150000.00000040.00001000.00020000.00000000.sdmp, Offset: 05150000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_5150000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentProfile
                                                                  • String ID:
                                                                  • API String ID: 2104809126-0
                                                                  • Opcode ID: 7e83c57c15605dd99c26de0e011116e64b878d923874f375c4ea287aaa6ef2a6
                                                                  • Instruction ID: 6f1eb0a81a98b9d0e73e9da6ba5d1507922931201a04d5d697d25f40a116743f
                                                                  • Opcode Fuzzy Hash: 7e83c57c15605dd99c26de0e011116e64b878d923874f375c4ea287aaa6ef2a6
                                                                  • Instruction Fuzzy Hash: 7BF07DA390C124DEA729C5D407457F667AB9A8E3707230062BE13DB200E3F00E8C4132
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,00F22616,?,?,?,?,?), ref: 00F22548
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 0000000C.00000002.3340427755.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340478716.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3343463702.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346149762.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346402716.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346488774.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: FilePointer
                                                                  • String ID:
                                                                  • API String ID: 973152223-0
                                                                  • Opcode ID: b6694411b62d138f0fe8100f90ceaee20ca9f2fdae59df577543f18ef5bf509d
                                                                  • Instruction ID: 44d2d880a4f5b2145e42d1957bf3826e0041e01819e4f3bbe4d2334dbef60a24
                                                                  • Opcode Fuzzy Hash: b6694411b62d138f0fe8100f90ceaee20ca9f2fdae59df577543f18ef5bf509d
                                                                  • Instruction Fuzzy Hash: B0014933610125BFCF19CF18EC56DAE3B19DB81330B384208F8109B291E675EE419B90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00EE331F
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 0000000C.00000002.3340427755.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340478716.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3343463702.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346149762.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346402716.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346488774.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: Concurrency::cancel_current_task
                                                                  • String ID:
                                                                  • API String ID: 118556049-0
                                                                  • Opcode ID: 88e0f75f83d5f9e69285ef2088a1dfdc1055322beeb667a90db4e8c6ac7f301f
                                                                  • Instruction ID: e0d60eb349ea39bf7c47352d77c8fa6ce64f775574e129306e8dc4ddb07ca503
                                                                  • Opcode Fuzzy Hash: 88e0f75f83d5f9e69285ef2088a1dfdc1055322beeb667a90db4e8c6ac7f301f
                                                                  • Instruction Fuzzy Hash: E6F02472100108DBCB146F75D809CE9B3E8EF143A1710097AE89CE7212EB2ADA809BC0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • RtlAllocateHeap.NTDLL(00000008,?,00000001,?,00F29FD2,00000001,00000364,00000001,00000006,000000FF,?,00F14B2F,?,?,761B23A0,?), ref: 00F2A68E
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 0000000C.00000002.3340427755.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340478716.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3343463702.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346149762.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346402716.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346488774.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1279760036-0
                                                                  • Opcode ID: 31f6f83a07125cd935c685362f9d7c00ab3e8e5931cb91eed464b41599a3f1c0
                                                                  • Instruction ID: 4806e45798d3a0f9fea84059695dd7f6a6b8c72e51cc297c8046c834f93c4add
                                                                  • Opcode Fuzzy Hash: 31f6f83a07125cd935c685362f9d7c00ab3e8e5931cb91eed464b41599a3f1c0
                                                                  • Instruction Fuzzy Hash: 97F0E9329106326F9B225A62BC05F6B3F49AF41770B1D4112FC089A190DB38D801AAE7
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00F14B2F,?,?,761B23A0,?,?,00EE3522,?,?), ref: 00F2B0B9
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 0000000C.00000002.3340427755.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340478716.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3343463702.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346149762.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346402716.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346488774.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1279760036-0
                                                                  • Opcode ID: f56f0eeae70a29449f966604ce156f264aebd978159cbab6207af0f05ea65963
                                                                  • Instruction ID: fbc7e82be9d4713031f28f6c8e29bed187251e3319c03f552dbfa9ff509c2874
                                                                  • Opcode Fuzzy Hash: f56f0eeae70a29449f966604ce156f264aebd978159cbab6207af0f05ea65963
                                                                  • Instruction Fuzzy Hash: 60E06D329026316AEA33A6B57C05B6F3749EF427B0F190121FE24A70C1DF28DC40A1E1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 0000000C.00000002.3340427755.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340478716.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3343463702.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346149762.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346402716.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346488774.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d832fe2a0f42001a57c9b2c34ab75cd1b9a187cae735d2738bff895b2773b599
                                                                  • Instruction ID: 72fd7202fcea208793c3da3b84e4c0570227d7c24e8642cedffc544939c0b87d
                                                                  • Opcode Fuzzy Hash: d832fe2a0f42001a57c9b2c34ab75cd1b9a187cae735d2738bff895b2773b599
                                                                  • Instruction Fuzzy Hash: E1023B71E412199BDF14CFA9D8806EEBBF1FF48324F248269D919E7380D731AD819B90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00EFA09D
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00EFA0BF
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00EFA0E7
                                                                  • __Getctype.LIBCPMT ref: 00EFA1C5
                                                                  • std::_Facet_Register.LIBCPMT ref: 00EFA1F9
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00EFA223
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 0000000C.00000002.3340427755.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340478716.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3343463702.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346149762.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346402716.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346488774.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                                                                  • String ID: PD$PG$E
                                                                  • API String ID: 1102183713-3756609794
                                                                  • Opcode ID: aab0cc738f37cbe9c9535c931c33d2fd39ddf3c154bc2bc446f97df8bc8c311d
                                                                  • Instruction ID: fcb204dc5daeb52866930640c04df1eec54ae523214d9a9c913690869c039267
                                                                  • Opcode Fuzzy Hash: aab0cc738f37cbe9c9535c931c33d2fd39ddf3c154bc2bc446f97df8bc8c311d
                                                                  • Instruction Fuzzy Hash: 6551A8B0D01259DFDB20CF98C9417AEBBB4BB00714F18826DD885AB391D779AE44CBD2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • _ValidateLocalCookies.LIBCMT ref: 00F172F7
                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00F172FF
                                                                  • _ValidateLocalCookies.LIBCMT ref: 00F17388
                                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00F173B3
                                                                  • _ValidateLocalCookies.LIBCMT ref: 00F17408
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 0000000C.00000002.3340427755.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340478716.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3343463702.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346149762.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346402716.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346488774.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                  • String ID: `-$csm
                                                                  • API String ID: 1170836740-3034041616
                                                                  • Opcode ID: 3dbde307851a4881d6a586a9a3ff1d2ecc6f7f7d1e351879b48bd45b2078f379
                                                                  • Instruction ID: 9fc2deefddc9ad5e3bd827ce5aab939c348583ba65c6a8fe563c629b5c493246
                                                                  • Opcode Fuzzy Hash: 3dbde307851a4881d6a586a9a3ff1d2ecc6f7f7d1e351879b48bd45b2078f379
                                                                  • Instruction Fuzzy Hash: 2941A634E043099BCF10EF69C884ADEBBB5AF44324F148155FC189B352DB75D981EB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00EFC45A
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00EFC47C
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00EFC4A4
                                                                  • std::_Facet_Register.LIBCPMT ref: 00EFC59A
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00EFC5C4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 0000000C.00000002.3340427755.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340478716.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3343463702.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346149762.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346402716.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346488774.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                                  • String ID: E$PD
                                                                  • API String ID: 459529453-4195941332
                                                                  • Opcode ID: b61fbdf34898064d4e0776105a9ad7140a6068162e9b57dd61385dcf8d9da799
                                                                  • Instruction ID: 772ccedb06100e01e71930ef81637d4e2f5194d408760917b29a68d93e25b3d5
                                                                  • Opcode Fuzzy Hash: b61fbdf34898064d4e0776105a9ad7140a6068162e9b57dd61385dcf8d9da799
                                                                  • Instruction Fuzzy Hash: DD519FB0900258DFDB21DF98C944BAEBBF0FB00714F348159E595AB381D77AAA45CBD1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 0000000C.00000002.3340427755.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340478716.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3343463702.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346149762.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346402716.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346488774.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: _strrchr
                                                                  • String ID:
                                                                  • API String ID: 3213747228-0
                                                                  • Opcode ID: 88e4da6258101c5fc24b34185784eb547dfa0330ad300027970d950eece25734
                                                                  • Instruction ID: 7780c9766bd11b65cb46b35bd2ae4d7fa6b0f95ba70b5e0f0024d40862159b55
                                                                  • Opcode Fuzzy Hash: 88e4da6258101c5fc24b34185784eb547dfa0330ad300027970d950eece25734
                                                                  • Instruction Fuzzy Hash: ECB15732D007759FDB218F24DC82BEE7BA5EF55360F158155ED04AF282D7789901E7A0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 00F12720
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00F1272B
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00F12799
                                                                    • Part of subcall function 00F1287C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00F12894
                                                                  • std::locale::_Setgloballocale.LIBCPMT ref: 00F12746
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 0000000C.00000002.3340427755.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340478716.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3343463702.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346149762.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346402716.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346488774.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                                                  • String ID: `-
                                                                  • API String ID: 677527491-2038111592
                                                                  • Opcode ID: 658776ac60dba29e95c195e1ed3101aed3cf512b83bedcbbfe5cdc5d2591d3c3
                                                                  • Instruction ID: c1d9868e0adbcf76c7a22bc0aef562c6b0878f5b92ab5e0270d3372e8d71fd7a
                                                                  • Opcode Fuzzy Hash: 658776ac60dba29e95c195e1ed3101aed3cf512b83bedcbbfe5cdc5d2591d3c3
                                                                  • Instruction Fuzzy Hash: 3E01BC75A002209BCB09EB60C8455BD7BB1BF84BA0B088009E84157385CF78AE92EB81
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00EE750C
                                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00EE7522
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 0000000C.00000002.3340427755.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340478716.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3343463702.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346149762.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346402716.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346488774.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: ___std_exception_destroy
                                                                  • String ID: )$[json.exception.
                                                                  • API String ID: 4194217158-1768919221
                                                                  • Opcode ID: ff0270d93c32449ddaa9fb3980c4dc93047469222e5d958a40322e13772aab38
                                                                  • Instruction ID: 0168660a548facac41d33ec035fcc13f6ed68320b5db229d1c4cb42068e88c55
                                                                  • Opcode Fuzzy Hash: ff0270d93c32449ddaa9fb3980c4dc93047469222e5d958a40322e13772aab38
                                                                  • Instruction Fuzzy Hash: 1B51CFB1D042889FDB00DFA8CD05B9EBBF4EF51314F144269E854AB282E7B85A44D7A1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00EE499F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 0000000C.00000002.3340427755.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340478716.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3343463702.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346149762.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346402716.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346488774.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: Ios_base_dtorstd::ios_base::_
                                                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                  • API String ID: 323602529-1866435925
                                                                  • Opcode ID: d03ead5eed8096f33f1742a28478e628eb5df25f341fcfd746a65d4178517b46
                                                                  • Instruction ID: 65a63939f362c9978889a6d1c3d7ef7660ef732d0797351b0316a7dde93124aa
                                                                  • Opcode Fuzzy Hash: d03ead5eed8096f33f1742a28478e628eb5df25f341fcfd746a65d4178517b46
                                                                  • Instruction Fuzzy Hash: 761129F2904688BBCB10DE5DEC42B96739CEB45710F044669FD98B72C2EA35A900D796
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00EE3819
                                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00EE38F0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 0000000C.00000002.3340427755.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340478716.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3343463702.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346149762.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346402716.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346488774.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: ___std_exception_copy___std_exception_destroy
                                                                  • String ID: )
                                                                  • API String ID: 2970364248-2934624886
                                                                  • Opcode ID: 56e7ee72c96b7a3829f5594d5cc31c61c2e065e6e60f216ca773ba39a203f7f0
                                                                  • Instruction ID: 2be47082885ac62cebf1f8ead2620ef3052c8b4b736cfabcf97204fb1c6633e9
                                                                  • Opcode Fuzzy Hash: 56e7ee72c96b7a3829f5594d5cc31c61c2e065e6e60f216ca773ba39a203f7f0
                                                                  • Instruction Fuzzy Hash: F76189B1D00258DFDB14CF98C948B9DFBB4FF58324F148259E854BB282D7B55A84CBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00EE499F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 0000000C.00000002.3340427755.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340478716.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3343463702.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346149762.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346402716.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346488774.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: Ios_base_dtorstd::ios_base::_
                                                                  • String ID: ios_base::badbit set$ios_base::failbit set
                                                                  • API String ID: 323602529-1240500531
                                                                  • Opcode ID: 4e144f3690b2e536f2e9a4abf8d6189152886989c7cedbdfeecc19f7935dc9a2
                                                                  • Instruction ID: 30cac973552674c3a3c654078d4f333de3dcd4ce832ae2774caa39c8c37cdcde
                                                                  • Opcode Fuzzy Hash: 4e144f3690b2e536f2e9a4abf8d6189152886989c7cedbdfeecc19f7935dc9a2
                                                                  • Instruction Fuzzy Hash: F24101B1900288ABCB04DF69CC45BAEBBF8EB45710F14825DF454BB382D775AA00DBA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00EE4061
                                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00EE40C4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 0000000C.00000002.3340427755.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340478716.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3343463702.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346149762.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346402716.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346488774.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                                  • String ID: bad locale name
                                                                  • API String ID: 3988782225-1405518554
                                                                  • Opcode ID: 242190953e814f941779ea5059ec7335afd62a7269a4a0091cb29ceb2c73007e
                                                                  • Instruction ID: 0a361bede260366bacd68d240575a90c4f933af2437b93e0ab889637e6a5874a
                                                                  • Opcode Fuzzy Hash: 242190953e814f941779ea5059ec7335afd62a7269a4a0091cb29ceb2c73007e
                                                                  • Instruction Fuzzy Hash: 1A11D3B0905BC4DED721CFA8C90478BBFF4AF15714F14869DE09597B81D3B9AA04C792
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00EF65C9
                                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00EF65FC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 0000000C.00000002.3340427755.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340478716.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3343463702.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346149762.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346402716.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346488774.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: ___std_exception_copy
                                                                  • String ID: )
                                                                  • API String ID: 2659868963-2934624886
                                                                  • Opcode ID: 80035c20609282a71bc875d013ec7be81933b4a88d491c62ab3208981e333fc5
                                                                  • Instruction ID: e5f5babede17e87bb98c029d3f8547f18819ac5b23c6c3f694796235e4af498d
                                                                  • Opcode Fuzzy Hash: 80035c20609282a71bc875d013ec7be81933b4a88d491c62ab3208981e333fc5
                                                                  • Instruction Fuzzy Hash: 65112EB5900648EBCB15CF99C980B86F7FCFB59720F10876AE95497641E774A540CBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00EE7A5C
                                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00EE7A72
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.3340478716.0000000000EE1000.00000040.00000001.01000000.00000006.sdmp, Offset: 00EE0000, based on PE: true
                                                                  • Associated: 0000000C.00000002.3340427755.0000000000EE0000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340478716.0000000001062000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.0000000001067000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106C000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3340826541.000000000106F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001074000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000011F6000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012C2000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.00000000012FE000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001307000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3341151629.0000000001315000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3343463702.0000000001316000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346149762.000000000149E000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.000000000149F000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A4000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346209804.00000000014A7000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346402716.00000000014AA000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 0000000C.00000002.3346488774.00000000014AB000.00000080.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_ee0000_RageMP131.jbxd
                                                                  Similarity
                                                                  • API ID: ___std_exception_destroy
                                                                  • String ID: )
                                                                  • API String ID: 4194217158-2934624886
                                                                  • Opcode ID: 16d7c0e4796cebb205c5b6bd63252cb387e9a0bc4ef5b97fd6e5eaa68825a7a6
                                                                  • Instruction ID: c941d6a45f55f47e8724ea66b04de343fc52953cbcddea1d93731e32500db8d0
                                                                  • Opcode Fuzzy Hash: 16d7c0e4796cebb205c5b6bd63252cb387e9a0bc4ef5b97fd6e5eaa68825a7a6
                                                                  • Instruction Fuzzy Hash: 7FF06DB1905748EFC710DF98C90178DBBFCEB45B24F50066AE8A4E3780D77966048BA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%