Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
AlCsIOd0pd.exe

Overview

General Information

Sample name:AlCsIOd0pd.exe
renamed because original name is a hash value
Original sample name:de584dd4970a8099454611ee0c739ea8.exe
Analysis ID:1460268
MD5:de584dd4970a8099454611ee0c739ea8
SHA1:f22fe3bfb22b55d1f0dc2fd802a32d2beb157e0b
SHA256:d0eff53cfd30f061451987b4e98205d81f9495e8f26def46aec15f7a4c171c20
Tags:exeRiseProStealer
Infos:

Detection

RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected RisePro Stealer
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject threads in other processes
Found stalling execution ending in API Sleep call
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to evade debugger and weak emulator (self modifying code)
Uses schtasks.exe or at.exe to add and modify task schedules
Contains capabilities to detect virtual machines
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found evasive API chain (date check)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • AlCsIOd0pd.exe (PID: 4852 cmdline: "C:\Users\user\Desktop\AlCsIOd0pd.exe" MD5: DE584DD4970A8099454611EE0C739EA8)
    • schtasks.exe (PID: 1900 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 4304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 2004 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 6128 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • MPGPH131.exe (PID: 5644 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: DE584DD4970A8099454611EE0C739EA8)
  • MPGPH131.exe (PID: 5740 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: DE584DD4970A8099454611EE0C739EA8)
  • RageMP131.exe (PID: 3720 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: DE584DD4970A8099454611EE0C739EA8)
  • RageMP131.exe (PID: 4460 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: DE584DD4970A8099454611EE0C739EA8)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: AlCsIOd0pd.exe PID: 4852JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    Process Memory Space: MPGPH131.exe PID: 5644JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
      Process Memory Space: MPGPH131.exe PID: 5740JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
        Process Memory Space: RageMP131.exe PID: 3720JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
          Process Memory Space: RageMP131.exe PID: 4460JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security

            System Summary

            barindex
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\AlCsIOd0pd.exe, ProcessId: 4852, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RageMP131
            Timestamp:06/20/24-18:18:46.029864
            SID:2046269
            Source Port:49741
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:16:18.111786
            SID:2049060
            Source Port:49731
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:18:43.639253
            SID:2046269
            Source Port:49732
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:18:46.029916
            SID:2046269
            Source Port:49735
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:18:45.967425
            SID:2046269
            Source Port:49731
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:16:22.687972
            SID:2046266
            Source Port:58709
            Destination Port:49732
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:16:40.743118
            SID:2046266
            Source Port:58709
            Destination Port:49741
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:16:18.693887
            SID:2046266
            Source Port:58709
            Destination Port:49731
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:16:22.714525
            SID:2046266
            Source Port:58709
            Destination Port:49733
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:18:43.701803
            SID:2046269
            Source Port:49733
            Destination Port:58709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:06/20/24-18:16:34.458767
            SID:2046266
            Source Port:58709
            Destination Port:49735
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeReversingLabs: Detection: 63%
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeReversingLabs: Detection: 63%
            Source: AlCsIOd0pd.exeReversingLabs: Detection: 63%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJoe Sandbox ML: detected
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeJoe Sandbox ML: detected
            Source: AlCsIOd0pd.exeJoe Sandbox ML: detected
            Source: AlCsIOd0pd.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_00431F9C FindClose,FindFirstFileExW,GetLastError,0_2_00431F9C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00431F9C FindClose,FindFirstFileExW,GetLastError,5_2_00431F9C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00431F9C FindClose,FindFirstFileExW,GetLastError,6_2_00431F9C

            Networking

            barindex
            Source: TrafficSnort IDS: 2049060 ET TROJAN RisePro TCP Heartbeat Packet 192.168.2.4:49731 -> 77.91.77.66:58709
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 77.91.77.66:58709 -> 192.168.2.4:49731
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.4:49731 -> 77.91.77.66:58709
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 77.91.77.66:58709 -> 192.168.2.4:49732
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 77.91.77.66:58709 -> 192.168.2.4:49733
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.4:49732 -> 77.91.77.66:58709
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.4:49733 -> 77.91.77.66:58709
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 77.91.77.66:58709 -> 192.168.2.4:49735
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.4:49735 -> 77.91.77.66:58709
            Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 77.91.77.66:58709 -> 192.168.2.4:49741
            Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.4:49741 -> 77.91.77.66:58709
            Source: global trafficTCP traffic: 77.91.77.66 ports 0,5,7,8,58709,9
            Source: global trafficTCP traffic: 192.168.2.4:49731 -> 77.91.77.66:58709
            Source: Joe Sandbox ViewIP Address: 77.91.77.66 77.91.77.66
            Source: Joe Sandbox ViewASN Name: FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: unknownTCP traffic detected without corresponding DNS query: 77.91.77.66
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_00409280 recv,GetProcAddress,GetModuleHandleA,GetProcAddress,WSASend,0_2_00409280
            Source: AlCsIOd0pd.exe, 00000000.00000003.1748570602.0000000000CD0000.00000004.00001000.00020000.00000000.sdmp, AlCsIOd0pd.exe, 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000005.00000003.1783897542.0000000002850000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000003.1784572733.0000000002850000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.3251444322.000000000055D000.00000002.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000007.00000003.1896625468.0000000002850000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000003.1976471958.0000000002840000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3251481803.000000000055D000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
            Source: MPGPH131.exeString found in binary or memory: https://ipinfo.io/
            Source: AlCsIOd0pd.exe, 00000000.00000003.1748570602.0000000000CD0000.00000004.00001000.00020000.00000000.sdmp, AlCsIOd0pd.exe, 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000005.00000003.1783897542.0000000002850000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000003.1784572733.0000000002850000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.3251444322.000000000055D000.00000002.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000007.00000003.1896625468.0000000002850000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000003.1976471958.0000000002840000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3251481803.000000000055D000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
            Source: AlCsIOd0pd.exe, 00000000.00000002.3253969387.0000000000D1E000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3255069543.0000000000CED000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3253912060.0000000000C37000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.3253787477.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3253822490.0000000000E38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
            Source: AlCsIOd0pd.exe, 00000000.00000002.3253969387.0000000000D1E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORTB
            Source: RageMP131.exe, 00000007.00000002.3253787477.0000000000D3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORTX
            Source: MPGPH131.exe, 00000006.00000002.3253912060.0000000000C37000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORToE
            Source: MPGPH131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address

            System Summary

            barindex
            Source: AlCsIOd0pd.exeStatic PE information: section name:
            Source: AlCsIOd0pd.exeStatic PE information: section name:
            Source: AlCsIOd0pd.exeStatic PE information: section name:
            Source: AlCsIOd0pd.exeStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_0043C9600_2_0043C960
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_0043A9280_2_0043A928
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_004371A00_2_004371A0
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_0044DA860_2_0044DA86
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_0044036F0_2_0044036F
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_00458BB00_2_00458BB0
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_004EFC400_2_004EFC40
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_0042F5800_2_0042F580
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_004526100_2_00452610
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_004F2FD00_2_004F2FD0
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_004547BF0_2_004547BF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_0043C9605_2_0043C960
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_0043A9285_2_0043A928
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_004371A05_2_004371A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_0044DA865_2_0044DA86
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_0044036F5_2_0044036F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00458BB05_2_00458BB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_004EFC405_2_004EFC40
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_0042F5805_2_0042F580
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_004526105_2_00452610
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_004F2FD05_2_004F2FD0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_004547BF5_2_004547BF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0043C9606_2_0043C960
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0043A9286_2_0043A928
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_004371A06_2_004371A0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0044DA866_2_0044DA86
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0044036F6_2_0044036F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00458BB06_2_00458BB0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_004EFC406_2_004EFC40
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0042F5806_2_0042F580
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_004526106_2_00452610
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_004F2FD06_2_004F2FD0
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_004547BF6_2_004547BF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: String function: 00434380 appears 48 times
            Source: AlCsIOd0pd.exeBinary or memory string: OriginalFilename vs AlCsIOd0pd.exe
            Source: AlCsIOd0pd.exe, 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedotnet.exe6 vs AlCsIOd0pd.exe
            Source: AlCsIOd0pd.exe, 00000000.00000000.1745421628.000000000058A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedotnet.exe6 vs AlCsIOd0pd.exe
            Source: AlCsIOd0pd.exeBinary or memory string: OriginalFilenamedotnet.exe6 vs AlCsIOd0pd.exe
            Source: AlCsIOd0pd.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: AlCsIOd0pd.exeStatic PE information: Section: ZLIB complexity 0.9988486351431981
            Source: AlCsIOd0pd.exeStatic PE information: Section: ZLIB complexity 0.9942874765037594
            Source: AlCsIOd0pd.exeStatic PE information: Section: ZLIB complexity 0.98974609375
            Source: AlCsIOd0pd.exeStatic PE information: Section: .reloc ZLIB complexity 1.5
            Source: RageMP131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9988486351431981
            Source: RageMP131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9942874765037594
            Source: RageMP131.exe.0.drStatic PE information: Section: ZLIB complexity 0.98974609375
            Source: RageMP131.exe.0.drStatic PE information: Section: .reloc ZLIB complexity 1.5
            Source: MPGPH131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9988486351431981
            Source: MPGPH131.exe.0.drStatic PE information: Section: ZLIB complexity 0.9942874765037594
            Source: MPGPH131.exe.0.drStatic PE information: Section: ZLIB complexity 0.98974609375
            Source: MPGPH131.exe.0.drStatic PE information: Section: .reloc ZLIB complexity 1.5
            Source: classification engineClassification label: mal100.troj.evad.winEXE@11/5@0/1
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeFile created: C:\Users\user\AppData\Local\RageMP131Jump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4304:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6128:120:WilError_03
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeFile created: C:\Users\user\AppData\Local\Temp\rage131MP.tmpJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: AlCsIOd0pd.exe, 00000000.00000003.1748570602.0000000000CD0000.00000004.00001000.00020000.00000000.sdmp, AlCsIOd0pd.exe, 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000005.00000003.1783897542.0000000002850000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000003.1784572733.0000000002850000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.3251444322.000000000055D000.00000002.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000007.00000003.1896625468.0000000002850000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000003.1976471958.0000000002840000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3251481803.000000000055D000.00000002.00000001.01000000.00000005.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: AlCsIOd0pd.exe, 00000000.00000003.1748570602.0000000000CD0000.00000004.00001000.00020000.00000000.sdmp, AlCsIOd0pd.exe, 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000005.00000003.1783897542.0000000002850000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000003.1784572733.0000000002850000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.3251444322.000000000055D000.00000002.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000007.00000003.1896625468.0000000002850000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000003.1976471958.0000000002840000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3251481803.000000000055D000.00000002.00000001.01000000.00000005.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: AlCsIOd0pd.exeReversingLabs: Detection: 63%
            Source: AlCsIOd0pd.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: MPGPH131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: MPGPH131.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeFile read: C:\Users\user\Desktop\AlCsIOd0pd.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\AlCsIOd0pd.exe "C:\Users\user\Desktop\AlCsIOd0pd.exe"
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHESTJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHESTJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSection loaded: devobj.dllJump to behavior
            Source: AlCsIOd0pd.exeStatic file information: File size 3259920 > 1048576
            Source: AlCsIOd0pd.exeStatic PE information: Raw size of .boot is bigger than: 0x100000 < 0x264600
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_004CF280 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,0_2_004CF280
            Source: initial sampleStatic PE information: section where entry point is pointing to: .boot
            Source: AlCsIOd0pd.exeStatic PE information: section name:
            Source: AlCsIOd0pd.exeStatic PE information: section name:
            Source: AlCsIOd0pd.exeStatic PE information: section name:
            Source: AlCsIOd0pd.exeStatic PE information: section name:
            Source: AlCsIOd0pd.exeStatic PE information: section name: .themida
            Source: AlCsIOd0pd.exeStatic PE information: section name: .boot
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name:
            Source: RageMP131.exe.0.drStatic PE information: section name: .themida
            Source: RageMP131.exe.0.drStatic PE information: section name: .boot
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name:
            Source: MPGPH131.exe.0.drStatic PE information: section name: .themida
            Source: MPGPH131.exe.0.drStatic PE information: section name: .boot
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_00598B86 push 677583F0h; mov dword ptr [esp], ecx0_2_00873ADB
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_00598B86 push edx; mov dword ptr [esp], 7E9A49CCh0_2_00873B0A
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_00598B86 push 0EDD01E1h; mov dword ptr [esp], ecx0_2_00873B1D
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_00433F59 push ecx; ret 0_2_00433F6C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00598B86 push 677583F0h; mov dword ptr [esp], ecx5_2_00873ADB
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00598B86 push edx; mov dword ptr [esp], 7E9A49CCh5_2_00873B0A
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00598B86 push 0EDD01E1h; mov dword ptr [esp], ecx5_2_00873B1D
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00433F59 push ecx; ret 5_2_00433F6C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00598B86 push 677583F0h; mov dword ptr [esp], ecx6_2_00873ADB
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00598B86 push edx; mov dword ptr [esp], 7E9A49CCh6_2_00873B0A
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00598B86 push 0EDD01E1h; mov dword ptr [esp], ecx6_2_00873B1D
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00433F59 push ecx; ret 6_2_00433F6C
            Source: AlCsIOd0pd.exeStatic PE information: section name: entropy: 7.980197821543003
            Source: RageMP131.exe.0.drStatic PE information: section name: entropy: 7.980197821543003
            Source: MPGPH131.exe.0.drStatic PE information: section name: entropy: 7.980197821543003
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeFile created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJump to dropped file
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeStalling execution: Execution stalls by calling Sleepgraph_0-13659
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeStalling execution: Execution stalls by calling Sleepgraph_5-13659
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSystem information queried: FirmwareTableInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSystem information queried: FirmwareTableInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSystem information queried: FirmwareTableInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSystem information queried: FirmwareTableInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSystem information queried: FirmwareTableInformationJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeSpecial instruction interceptor: First address: 625E3C instructions caused by: Self-modifying code
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 625E3C instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: 625E3C instructions caused by: Self-modifying code
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeWindow / User API: threadDelayed 3495Jump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeWindow / User API: threadDelayed 6379Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 9806Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 9807Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 9782Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeWindow / User API: threadDelayed 9885Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_5-13659
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-13659
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-16262
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_5-16262
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exe TID: 3084Thread sleep count: 3495 > 30Jump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exe TID: 3084Thread sleep time: -352995s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exe TID: 3084Thread sleep count: 6379 > 30Jump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exe TID: 3084Thread sleep time: -644279s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1376Thread sleep count: 78 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1376Thread sleep count: 9806 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 1376Thread sleep time: -990406s >= -30000sJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5436Thread sleep count: 74 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5436Thread sleep count: 9807 > 30Jump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5436Thread sleep time: -990507s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 1896Thread sleep count: 101 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 1896Thread sleep count: 9782 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 1896Thread sleep time: -987982s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 4520Thread sleep count: 9885 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 4520Thread sleep time: -998385s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_00431F9C FindClose,FindFirstFileExW,GetLastError,0_2_00431F9C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00431F9C FindClose,FindFirstFileExW,GetLastError,5_2_00431F9C
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00431F9C FindClose,FindFirstFileExW,GetLastError,6_2_00431F9C
            Source: AlCsIOd0pd.exe, 00000000.00000003.1768008425.0000000000D81000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}|
            Source: AlCsIOd0pd.exe, 00000000.00000002.3253969387.0000000000D81000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}i
            Source: RageMP131.exe, 0000000B.00000002.3253822490.0000000000E30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&
            Source: MPGPH131.exe, 00000006.00000002.3253912060.0000000000C7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllU
            Source: MPGPH131.exe, 00000005.00000002.3255069543.0000000000D3A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}@_
            Source: MPGPH131.exe, 00000006.00000002.3253912060.0000000000C7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}M81
            Source: AlCsIOd0pd.exe, 00000000.00000002.3253969387.0000000000D6A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}-K
            Source: RageMP131.exe, 0000000B.00000003.1988485374.0000000000E97000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: MPGPH131.exe, 00000005.00000002.3255069543.0000000000CED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&m
            Source: AlCsIOd0pd.exe, 00000000.00000003.1768008425.0000000000D81000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}]
            Source: RageMP131.exe, 00000007.00000002.3253787477.0000000000D3E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__orpo
            Source: MPGPH131.exe, 00000005.00000002.3255069543.0000000000CED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}t #7NVD slot #7
            Source: AlCsIOd0pd.exe, 00000000.00000002.3253969387.0000000000D6A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000%
            Source: RageMP131.exe, 00000007.00000002.3253787477.0000000000D8F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll4
            Source: MPGPH131.exe, 00000006.00000002.3253912060.0000000000C56000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}>jD
            Source: RageMP131.exe, 00000007.00000002.3253787477.0000000000D8B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}yj
            Source: AlCsIOd0pd.exe, 00000000.00000002.3253969387.0000000000D3F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 9e146be9-c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_BEB2C06B
            Source: MPGPH131.exe, 00000005.00000003.1808009410.0000000000D51000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}O
            Source: RageMP131.exe, 0000000B.00000003.1988485374.0000000000E97000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
            Source: RageMP131.exe, 0000000B.00000002.3253822490.0000000000E7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll=
            Source: AlCsIOd0pd.exe, 00000000.00000002.3253969387.0000000000D1E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}NVD slot #44NVD slot #44
            Source: AlCsIOd0pd.exe, 00000000.00000002.3253969387.0000000000D1E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b} slot #34
            Source: AlCsIOd0pd.exe, 00000000.00000002.3253969387.0000000000D6A000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3255069543.0000000000D3A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_00438A64 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00438A64
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_004CF280 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,0_2_004CF280
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_00438A64 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00438A64
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_0043451D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0043451D
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_00438A64 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00438A64
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_0043451D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_0043451D
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_00438A64 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00438A64
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_0043451D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_0043451D

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_004CF280 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,0_2_004CF280
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 5_2_004CF280 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,5_2_004CF280
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: 6_2_004CF280 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,6_2_004CF280
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: GetLocaleInfoW,0_2_004531CA
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: EnumSystemLocalesW,0_2_0044B1B1
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_004532F3
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,0_2_00452B5A
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: GetLocaleInfoW,0_2_004533F9
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_004534CF
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: GetLocaleInfoW,0_2_00452D5F
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: EnumSystemLocalesW,0_2_00452E51
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: EnumSystemLocalesW,0_2_00452E06
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: EnumSystemLocalesW,0_2_00452EEC
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00452F77
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: GetLocaleInfoW,0_2_0044B734
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,5_2_004531CA
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,5_2_0044B1B1
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,5_2_004532F3
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,5_2_00452B5A
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,5_2_004533F9
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,5_2_004534CF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,5_2_00452D5F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,5_2_00452E51
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,5_2_00452E06
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,5_2_00452EEC
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,5_2_00452F77
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,5_2_0044B734
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,6_2_004531CA
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,6_2_0044B1B1
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,6_2_004532F3
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,6_2_00452B5A
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,6_2_004533F9
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,6_2_004534CF
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,6_2_00452D5F
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,6_2_00452E51
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,6_2_00452E06
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: EnumSystemLocalesW,6_2_00452EEC
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,6_2_00452F77
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeCode function: GetLocaleInfoW,6_2_0044B734
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeCode function: 0_2_0043361D GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,GetSystemTimeAsFileTime,0_2_0043361D
            Source: C:\Users\user\Desktop\AlCsIOd0pd.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: Process Memory Space: AlCsIOd0pd.exe PID: 4852, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 5644, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 5740, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 3720, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 4460, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: Process Memory Space: AlCsIOd0pd.exe PID: 4852, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 5644, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 5740, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 3720, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 4460, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Command and Scripting Interpreter
            1
            Scheduled Task/Job
            11
            Process Injection
            1
            Masquerading
            OS Credential Dumping1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Scheduled Task/Job
            1
            Registry Run Keys / Startup Folder
            1
            Scheduled Task/Job
            12
            Virtualization/Sandbox Evasion
            LSASS Memory421
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts2
            Native API
            1
            DLL Side-Loading
            1
            Registry Run Keys / Startup Folder
            11
            Process Injection
            Security Account Manager12
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive1
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
            Obfuscated Files or Information
            LSA Secrets1
            File and Directory Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
            Software Packing
            Cached Domain Credentials123
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 1460268 Sample: AlCsIOd0pd.exe Startdate: 20/06/2024 Architecture: WINDOWS Score: 100 36 Snort IDS alert for network traffic 2->36 38 Multi AV Scanner detection for submitted file 2->38 40 Yara detected RisePro Stealer 2->40 42 4 other signatures 2->42 7 AlCsIOd0pd.exe 1 9 2->7         started        12 MPGPH131.exe 2 2->12         started        14 RageMP131.exe 2 2->14         started        16 2 other processes 2->16 process3 dnsIp4 34 77.91.77.66, 49731, 49732, 49733 FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU Russian Federation 7->34 26 C:\Users\user\AppData\Local\...\RageMP131.exe, PE32 7->26 dropped 28 C:\ProgramData\MPGPH131\MPGPH131.exe, PE32 7->28 dropped 30 C:\Users\...\RageMP131.exe:Zone.Identifier, ASCII 7->30 dropped 32 C:\...\MPGPH131.exe:Zone.Identifier, ASCII 7->32 dropped 44 Query firmware table information (likely to detect VMs) 7->44 46 Found stalling execution ending in API Sleep call 7->46 48 Contains functionality to inject threads in other processes 7->48 50 Uses schtasks.exe or at.exe to add and modify task schedules 7->50 18 schtasks.exe 1 7->18         started        20 schtasks.exe 1 7->20         started        52 Multi AV Scanner detection for dropped file 12->52 54 Machine Learning detection for dropped file 12->54 56 Tries to evade debugger and weak emulator (self modifying code) 12->56 58 Tries to detect sandboxes / dynamic malware analysis system (registry check) 14->58 file5 signatures6 process7 process8 22 conhost.exe 18->22         started        24 conhost.exe 20->24         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            AlCsIOd0pd.exe63%ReversingLabsWin32.Trojan.RiseProStealer
            AlCsIOd0pd.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe100%Joe Sandbox ML
            C:\ProgramData\MPGPH131\MPGPH131.exe100%Joe Sandbox ML
            C:\ProgramData\MPGPH131\MPGPH131.exe63%ReversingLabsWin32.Trojan.RiseProStealer
            C:\Users\user\AppData\Local\RageMP131\RageMP131.exe63%ReversingLabsWin32.Trojan.RiseProStealer
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://ipinfo.io/0%URL Reputationsafe
            https://t.me/RiseProSUPPORT0%Avira URL Cloudsafe
            http://www.winimage.com/zLibDll0%Avira URL Cloudsafe
            https://t.me/RiseProSUPPORTX0%Avira URL Cloudsafe
            https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%Avira URL Cloudsafe
            https://www.maxmind.com/en/locate-my-ip-address0%Avira URL Cloudsafe
            https://t.me/RiseProSUPPORTB0%Avira URL Cloudsafe
            https://t.me/RiseProSUPPORToE0%Avira URL Cloudsafe
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dllAlCsIOd0pd.exe, 00000000.00000003.1748570602.0000000000CD0000.00000004.00001000.00020000.00000000.sdmp, AlCsIOd0pd.exe, 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000005.00000003.1783897542.0000000002850000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000003.1784572733.0000000002850000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.3251444322.000000000055D000.00000002.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000007.00000003.1896625468.0000000002850000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000003.1976471958.0000000002840000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3251481803.000000000055D000.00000002.00000001.01000000.00000005.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://t.me/RiseProSUPPORTXRageMP131.exe, 00000007.00000002.3253787477.0000000000D3E000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.winimage.com/zLibDllAlCsIOd0pd.exe, 00000000.00000003.1748570602.0000000000CD0000.00000004.00001000.00020000.00000000.sdmp, AlCsIOd0pd.exe, 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmp, MPGPH131.exe, 00000005.00000003.1783897542.0000000002850000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmp, MPGPH131.exe, 00000006.00000003.1784572733.0000000002850000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.3251444322.000000000055D000.00000002.00000001.01000000.00000005.sdmp, RageMP131.exe, 00000007.00000003.1896625468.0000000002850000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000003.1976471958.0000000002840000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3251481803.000000000055D000.00000002.00000001.01000000.00000005.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://t.me/RiseProSUPPORTAlCsIOd0pd.exe, 00000000.00000002.3253969387.0000000000D1E000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000005.00000002.3255069543.0000000000CED000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 00000006.00000002.3253912060.0000000000C37000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 00000007.00000002.3253787477.0000000000D3E000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000000B.00000002.3253822490.0000000000E38000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://ipinfo.io/MPGPH131.exefalse
            • URL Reputation: safe
            unknown
            https://t.me/RiseProSUPPORTBAlCsIOd0pd.exe, 00000000.00000002.3253969387.0000000000D1E000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://t.me/RiseProSUPPORToEMPGPH131.exe, 00000006.00000002.3253912060.0000000000C37000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.maxmind.com/en/locate-my-ip-addressMPGPH131.exefalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            77.91.77.66
            unknownRussian Federation
            42861FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRUtrue
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1460268
            Start date and time:2024-06-20 18:15:16 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 8m 22s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:13
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:AlCsIOd0pd.exe
            renamed because original name is a hash value
            Original Sample Name:de584dd4970a8099454611ee0c739ea8.exe
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@11/5@0/1
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:Failed
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report creation exceeded maximum time and may have missing disassembly code information.
            • VT rate limit hit for: AlCsIOd0pd.exe
            TimeTypeDescription
            12:16:49API Interceptor331415x Sleep call for process: AlCsIOd0pd.exe modified
            12:16:53API Interceptor593250x Sleep call for process: MPGPH131.exe modified
            12:17:05API Interceptor410683x Sleep call for process: RageMP131.exe modified
            17:16:18Task SchedulerRun new task: MPGPH131 HR path: C:\ProgramData\MPGPH131\MPGPH131.exe
            17:16:18Task SchedulerRun new task: MPGPH131 LG path: C:\ProgramData\MPGPH131\MPGPH131.exe
            17:16:21AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
            17:16:29AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            77.91.77.66setup.exeGet hashmaliciousAmadey, RisePro StealerBrowse
              D44CPdpkNk.exeGet hashmaliciousRisePro StealerBrowse
                WGEfBWbWQI.exeGet hashmaliciousRisePro StealerBrowse
                  2bT2lTwRku.exeGet hashmaliciousRisePro StealerBrowse
                    T17sbXrL3i.exeGet hashmaliciousRisePro StealerBrowse
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRUsetup.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                      • 77.91.77.81
                      setup.exeGet hashmaliciousPython Stealer, Amadey, Monster Stealer, PureLog Stealer, RedLine, XWorm, zgRATBrowse
                      • 77.91.77.81
                      FN MultiHack v2.exeGet hashmaliciousRedLineBrowse
                      • 77.91.77.6
                      D44CPdpkNk.exeGet hashmaliciousRisePro StealerBrowse
                      • 77.91.77.66
                      https://drive.google.com/file/d/1SCCeBL3Md8Sct7wQF5bfbtLysFqXCW6y/view?ts=667387acGet hashmaliciousUnknownBrowse
                      • 77.91.77.5
                      https://drive.google.com/file/d/1SCCeBL3Md8Sct7wQF5bfbtLysFqXCW6y/view?ts=667387acGet hashmaliciousUnknownBrowse
                      • 77.91.77.5
                      WGEfBWbWQI.exeGet hashmaliciousRisePro StealerBrowse
                      • 77.91.77.66
                      2bT2lTwRku.exeGet hashmaliciousRisePro StealerBrowse
                      • 77.91.77.66
                      T17sbXrL3i.exeGet hashmaliciousRisePro StealerBrowse
                      • 77.91.77.66
                      2022and2023TaxDocuments.zipGet hashmaliciousRemcosBrowse
                      • 77.91.77.107
                      No context
                      No context
                      Process:C:\Users\user\Desktop\AlCsIOd0pd.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):3259920
                      Entropy (8bit):7.966792574709497
                      Encrypted:false
                      SSDEEP:98304:t+VDlD+ah2X5f2CiioP8peU/Ju4+iU2lfOZy81+1l:AnZYuTcRxuZiUiW9+1l
                      MD5:DE584DD4970A8099454611EE0C739EA8
                      SHA1:F22FE3BFB22B55D1F0DC2FD802A32D2BEB157E0B
                      SHA-256:D0EFF53CFD30F061451987B4E98205D81F9495E8F26DEF46AEC15F7A4C171C20
                      SHA-512:58470AB84C35022860036CB5DFDCCEC9BB1F1EBEA37E4745EFC70C464E2FFB9B9835A1251CDF76C012F56DD0A72A4D448B0AC298DA02F4676EBCCCC03B2A0B76
                      Malicious:true
                      Antivirus:
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      • Antivirus: ReversingLabs, Detection: 63%
                      Reputation:low
                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L....iLf...............'.....|......X.X...........@..........................`~......W2......................................a..........8....................P~..............................p...............................6..@................... ........................... ..` 2~..........................@..@ 0I...P......................@....rsrc...8...........................@..@ X........r..................@..B.idata.......`.......r..............@....tls.........p.......v...................themida..>..........x..............`....boot....F&...X..F&..x..............`..`.reloc.......P~.......1................@................................................................
                      Process:C:\Users\user\Desktop\AlCsIOd0pd.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):26
                      Entropy (8bit):3.95006375643621
                      Encrypted:false
                      SSDEEP:3:ggPYV:rPYV
                      MD5:187F488E27DB4AF347237FE461A079AD
                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                      Malicious:true
                      Reputation:high, very likely benign file
                      Preview:[ZoneTransfer]....ZoneId=0
                      Process:C:\Users\user\Desktop\AlCsIOd0pd.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):3259920
                      Entropy (8bit):7.966792574709497
                      Encrypted:false
                      SSDEEP:98304:t+VDlD+ah2X5f2CiioP8peU/Ju4+iU2lfOZy81+1l:AnZYuTcRxuZiUiW9+1l
                      MD5:DE584DD4970A8099454611EE0C739EA8
                      SHA1:F22FE3BFB22B55D1F0DC2FD802A32D2BEB157E0B
                      SHA-256:D0EFF53CFD30F061451987B4E98205D81F9495E8F26DEF46AEC15F7A4C171C20
                      SHA-512:58470AB84C35022860036CB5DFDCCEC9BB1F1EBEA37E4745EFC70C464E2FFB9B9835A1251CDF76C012F56DD0A72A4D448B0AC298DA02F4676EBCCCC03B2A0B76
                      Malicious:true
                      Antivirus:
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      • Antivirus: ReversingLabs, Detection: 63%
                      Reputation:low
                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L....iLf...............'.....|......X.X...........@..........................`~......W2......................................a..........8....................P~..............................p...............................6..@................... ........................... ..` 2~..........................@..@ 0I...P......................@....rsrc...8...........................@..@ X........r..................@..B.idata.......`.......r..............@....tls.........p.......v...................themida..>..........x..............`....boot....F&...X..F&..x..............`..`.reloc.......P~.......1................@................................................................
                      Process:C:\Users\user\Desktop\AlCsIOd0pd.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):26
                      Entropy (8bit):3.95006375643621
                      Encrypted:false
                      SSDEEP:3:ggPYV:rPYV
                      MD5:187F488E27DB4AF347237FE461A079AD
                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                      Malicious:true
                      Reputation:high, very likely benign file
                      Preview:[ZoneTransfer]....ZoneId=0
                      Process:C:\Users\user\Desktop\AlCsIOd0pd.exe
                      File Type:ASCII text, with no line terminators
                      Category:modified
                      Size (bytes):13
                      Entropy (8bit):2.8731406795131336
                      Encrypted:false
                      SSDEEP:3:L1VRXxn:TRXxn
                      MD5:2D8F5D015AFD07E66F8F107CA36CCB48
                      SHA1:FD9059874E9195951B8F1BEC90C2006B3263A6C9
                      SHA-256:6C8364F8F9303EAE139976F9FDA7A9231F560D1173BBD4CC8C6A0269CCBB555D
                      SHA-512:EBAE6B06D775C9BC8DFCDA058DE1DD41784C074409D2D17DBB399037E5635F3C7993E8670F64376AA8FCDAF5795FBF152134C3C356FF37E5070C1648306FD722
                      Malicious:false
                      Reputation:low
                      Preview:1718904293224
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):7.966792574709497
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:AlCsIOd0pd.exe
                      File size:3'259'920 bytes
                      MD5:de584dd4970a8099454611ee0c739ea8
                      SHA1:f22fe3bfb22b55d1f0dc2fd802a32d2beb157e0b
                      SHA256:d0eff53cfd30f061451987b4e98205d81f9495e8f26def46aec15f7a4c171c20
                      SHA512:58470ab84c35022860036cb5dfdccec9bb1f1ebea37e4745efc70c464e2ffb9b9835a1251cdf76c012f56dd0a72a4d448b0ac298da02f4676ebcccc03b2a0b76
                      SSDEEP:98304:t+VDlD+ah2X5f2CiioP8peU/Ju4+iU2lfOZy81+1l:AnZYuTcRxuZiUiW9+1l
                      TLSH:94E533201ED31790C1B713F6AE7B2D1A1B43F26A51B47D20812F7ED9D9AE21C6BD506C
                      File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s...../.s
                      Icon Hash:8596a1a0a1a1b171
                      Entrypoint:0x980058
                      Entrypoint Section:.boot
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:TERMINAL_SERVER_AWARE
                      Time Stamp:0x664C6914 [Tue May 21 09:27:48 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:63814aaf116ba6abb6496ce4bcad24c6
                      Instruction
                      call 00007FD0F11318A0h
                      push ebx
                      mov ebx, esp
                      push ebx
                      mov esi, dword ptr [ebx+08h]
                      mov edi, dword ptr [ebx+10h]
                      cld
                      mov dl, 80h
                      mov al, byte ptr [esi]
                      inc esi
                      mov byte ptr [edi], al
                      inc edi
                      mov ebx, 00000002h
                      add dl, dl
                      jne 00007FD0F1131757h
                      mov dl, byte ptr [esi]
                      inc esi
                      adc dl, dl
                      jnc 00007FD0F113173Ch
                      add dl, dl
                      jne 00007FD0F1131757h
                      mov dl, byte ptr [esi]
                      inc esi
                      adc dl, dl
                      jnc 00007FD0F11317A3h
                      xor eax, eax
                      add dl, dl
                      jne 00007FD0F1131757h
                      mov dl, byte ptr [esi]
                      inc esi
                      adc dl, dl
                      jnc 00007FD0F1131837h
                      add dl, dl
                      jne 00007FD0F1131757h
                      mov dl, byte ptr [esi]
                      inc esi
                      adc dl, dl
                      adc eax, eax
                      add dl, dl
                      jne 00007FD0F1131757h
                      mov dl, byte ptr [esi]
                      inc esi
                      adc dl, dl
                      adc eax, eax
                      add dl, dl
                      jne 00007FD0F1131757h
                      mov dl, byte ptr [esi]
                      inc esi
                      adc dl, dl
                      adc eax, eax
                      add dl, dl
                      jne 00007FD0F1131757h
                      mov dl, byte ptr [esi]
                      inc esi
                      adc dl, dl
                      adc eax, eax
                      je 00007FD0F113175Ah
                      push edi
                      mov eax, eax
                      sub edi, eax
                      mov al, byte ptr [edi]
                      pop edi
                      mov byte ptr [edi], al
                      inc edi
                      mov ebx, 00000002h
                      jmp 00007FD0F11316EBh
                      mov eax, 00000001h
                      add dl, dl
                      jne 00007FD0F1131757h
                      mov dl, byte ptr [esi]
                      inc esi
                      adc dl, dl
                      adc eax, eax
                      add dl, dl
                      jne 00007FD0F1131757h
                      mov dl, byte ptr [esi]
                      inc esi
                      adc dl, dl
                      jc 00007FD0F113173Ch
                      sub eax, ebx
                      mov ebx, 00000001h
                      jne 00007FD0F113177Ah
                      mov ecx, 00000001h
                      add dl, dl
                      jne 00007FD0F1131757h
                      mov dl, byte ptr [esi]
                      inc esi
                      adc dl, dl
                      adc ecx, ecx
                      add dl, dl
                      jne 00007FD0F1131757h
                      mov dl, byte ptr [esi]
                      inc esi
                      adc dl, dl
                      jc 00007FD0F113173Ch
                      push esi
                      mov esi, edi
                      sub esi, ebp
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x19618b0x184.idata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x18a0000x1638.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x7e50000x10.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x1970180x18.tls
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x18369c0x40
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      0x10000x15bbc80x9d20072be48f03fa29b125860aa4b7040515fFalse0.9988486351431981data7.980197821543003IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      0x15d0000x27e320x10a00632b628419d20fc973bcfda8cff5f3beFalse0.9942874765037594data7.949044417592158IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      0x1850000x49300x80013c7d36a38dc58d8a970d8d422275803False0.98974609375OpenPGP Public Key7.765144396837099IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x18a0000x16380x1800fe6f3fdb9e7e97cba92d8ce4e4fcc95bFalse0.7220052083333334data6.54017046361188IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      0x18c0000x98580x720096fc680932cb7019c6055702e4e238e3False0.9789953399122807data7.930725168164811IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      .idata0x1960000x10000x4001b20e07443fa333ff9692026d1e6c6c2False0.3984375data3.42439969016873IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .tls0x1970000x10000x20054a50a058e0f3b6aa2fe1b22e2033106False0.056640625data0.18120187678200297IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .themida0x1980000x3e80000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .boot0x5800000x2646000x26460053baa03dffef8344a9262941737c70c7unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .reloc0x7e50000x10000x10f5bc99b71bad9e8a775cc32747e3ca58False1.5GLS_BINARY_LSB_FIRST2.474601752714581IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0x18a4400x1060PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedRussianRussia0.8838263358778626
                      RT_GROUP_ICON0x18b4a00x14dataRussianRussia1.05
                      RT_VERSION0x18a1300x310dataRussianRussia0.45408163265306123
                      RT_MANIFEST0x18b4b80x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                      DLLImport
                      kernel32.dllGetModuleHandleA
                      USER32.dllwsprintfA
                      GDI32.dllCreateCompatibleBitmap
                      ADVAPI32.dllRegQueryValueExA
                      SHELL32.dllShellExecuteA
                      ole32.dllCoInitialize
                      WS2_32.dllWSAStartup
                      CRYPT32.dllCryptUnprotectData
                      SHLWAPI.dllPathFindExtensionA
                      gdiplus.dllGdipGetImageEncoders
                      SETUPAPI.dllSetupDiEnumDeviceInfo
                      ntdll.dllRtlUnicodeStringToAnsiString
                      RstrtMgr.DLLRmStartSession
                      Language of compilation systemCountry where language is spokenMap
                      RussianRussia
                      EnglishUnited States
                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                      06/20/24-18:18:46.029864TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4974158709192.168.2.477.91.77.66
                      06/20/24-18:16:18.111786TCP2049060ET TROJAN RisePro TCP Heartbeat Packet4973158709192.168.2.477.91.77.66
                      06/20/24-18:18:43.639253TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4973258709192.168.2.477.91.77.66
                      06/20/24-18:18:46.029916TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4973558709192.168.2.477.91.77.66
                      06/20/24-18:18:45.967425TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4973158709192.168.2.477.91.77.66
                      06/20/24-18:16:22.687972TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)587094973277.91.77.66192.168.2.4
                      06/20/24-18:16:40.743118TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)587094974177.91.77.66192.168.2.4
                      06/20/24-18:16:18.693887TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)587094973177.91.77.66192.168.2.4
                      06/20/24-18:16:22.714525TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)587094973377.91.77.66192.168.2.4
                      06/20/24-18:18:43.701803TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4973358709192.168.2.477.91.77.66
                      06/20/24-18:16:34.458767TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)587094973577.91.77.66192.168.2.4
                      TimestampSource PortDest PortSource IPDest IP
                      Jun 20, 2024 18:16:18.082406998 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:18.087196112 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:18.087280989 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:18.111785889 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:18.116616964 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:18.693886995 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:18.748128891 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:21.826422930 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:21.849236012 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:22.083770037 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:22.084619045 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:22.088967085 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:22.089078903 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:22.090025902 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:22.090116024 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:22.097835064 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:22.097959995 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:22.102804899 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:22.103224039 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:22.687972069 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:22.714524984 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:22.732546091 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:22.763778925 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:25.810913086 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:25.816184998 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:25.826411963 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:25.831402063 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:33.820631027 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:33.827883959 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:33.827955961 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:33.850049019 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:33.855003119 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:34.458766937 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:34.513776064 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:37.592094898 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:37.597034931 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:40.131934881 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:40.137490034 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:40.137599945 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:40.154479027 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:40.159463882 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:40.743118048 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:40.795069933 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:43.857678890 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:43.862550020 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:53.139162064 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:53.144341946 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:57.092277050 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:57.097079992 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:16:57.170197964 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:16:57.175059080 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:08.920384884 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:08.925599098 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:11.936005116 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:11.941045046 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:15.185986042 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:15.190887928 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:15.873939037 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:15.879354954 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:15.967291117 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:15.972165108 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:21.310914993 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:21.316880941 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:24.454423904 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:24.459355116 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:25.279653072 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:25.284882069 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:25.389334917 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:25.394721985 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:27.576925993 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:27.582823038 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:27.702027082 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:27.708401918 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:28.420510054 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:28.425458908 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:28.517594099 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:28.522556067 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:30.736263990 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:30.745033026 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:31.561017036 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:31.566310883 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:31.654854059 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:31.659856081 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:33.858002901 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:33.863140106 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:33.967370033 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:33.973140955 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:34.686566114 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:34.692332029 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:34.780193090 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:34.785100937 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:36.998781919 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:37.003981113 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:37.108062983 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:37.112979889 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:37.826740980 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:37.832756996 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:37.906755924 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:37.911712885 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:40.123719931 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:40.128653049 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:40.248564005 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:40.253926992 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:40.967447042 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:40.972373962 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:41.029810905 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:41.034718037 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:43.264266968 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:43.269362926 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:43.373465061 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:43.376195908 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:43.380398989 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:43.381427050 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:44.092204094 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:44.097125053 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:44.170373917 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:44.175200939 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:46.404901028 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:46.409967899 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:46.498620033 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:46.498620033 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:46.503508091 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:46.503520012 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:47.217345953 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:47.222398043 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:47.295483112 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:47.300584078 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:49.545661926 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:49.550859928 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:49.623709917 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:49.627721071 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:49.628674984 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:49.632498026 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:50.342365980 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:50.347349882 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:50.436182022 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:50.441106081 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:52.670891047 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:52.676013947 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:52.748569965 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:52.748569965 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:52.754863977 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:52.754878044 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:53.467386961 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:53.472249031 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:53.576813936 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:53.581693888 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:55.795363903 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:55.800189018 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:55.889224052 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:55.889260054 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:55.894006014 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:55.894095898 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:56.607949972 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:56.613042116 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:56.717566967 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:56.722527981 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:58.937108994 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:58.942126989 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:59.014260054 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:59.014303923 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:59.020181894 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:59.020253897 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:59.748775959 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:59.753906965 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:17:59.858185053 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:17:59.863053083 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:02.061353922 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:02.066590071 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:02.154870987 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:02.154917002 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:02.160830021 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:02.160846949 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:02.889441013 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:02.896599054 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:02.983768940 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:02.991080046 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:05.201714993 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:05.206844091 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:05.295502901 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:05.300564051 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:05.300678968 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:05.305542946 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:06.014344931 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:06.019401073 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:06.108160973 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:06.113195896 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:08.343862057 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:08.348886013 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:08.420466900 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:08.424453020 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:08.425554037 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:08.429310083 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:09.154839993 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:09.160027981 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:09.248553991 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:09.254897118 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:11.483021975 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:11.488552094 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:11.561369896 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:11.561443090 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:11.570662022 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:11.571245909 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:12.279865026 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:12.285075903 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:12.389247894 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:12.394246101 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:14.623620033 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:14.628688097 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:14.686108112 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:14.686141968 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:14.691111088 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:14.691131115 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:15.404898882 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:15.412401915 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:15.514271021 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:15.519392967 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:17.749006987 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:17.753881931 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:17.826817036 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:17.826817036 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:17.834220886 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:17.834240913 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:18.545907021 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:18.550836086 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:18.639486074 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:18.644351959 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:20.874095917 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:20.879035950 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:20.967571974 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:20.967650890 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:20.973581076 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:20.973701000 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:21.670627117 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:21.675652027 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:21.780040979 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:21.785063028 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:24.014272928 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:24.020559072 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:24.108004093 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:24.108004093 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:24.298521996 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:24.298697948 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:24.811269045 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:24.816102982 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:24.905145884 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:24.910788059 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:27.154906034 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:27.159956932 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:27.248706102 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:27.248742104 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:27.254652977 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:27.254673004 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:27.951773882 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:27.956631899 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:28.045533895 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:28.051101923 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:30.295551062 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:30.389306068 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:30.391441107 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:30.493395090 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:30.493438005 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:30.493468046 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:31.092443943 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:31.097237110 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:31.170707941 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:31.175538063 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:33.420533895 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:33.425492048 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:33.514206886 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:33.514251947 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:33.519130945 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:33.519500017 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:34.233072042 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:34.237952948 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:34.311182022 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:34.317667961 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:36.561214924 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:36.566143036 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:36.639219046 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:36.639262915 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:36.645170927 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:36.645188093 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:37.373574972 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:37.378360987 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:37.436151981 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:37.441423893 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:39.686177969 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:39.690995932 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:39.764250994 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:39.764300108 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:39.769045115 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:39.769207954 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:40.514302015 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:40.519665956 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:40.576776028 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:40.581871033 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:42.826821089 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:42.831593990 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:42.905057907 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:42.905111074 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:42.911545992 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:42.911560059 CEST587094973577.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:43.639252901 CEST4973258709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:43.644092083 CEST587094973277.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:43.701802969 CEST4973358709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:43.706597090 CEST587094973377.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:45.967425108 CEST4973158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:45.972402096 CEST587094973177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:46.029864073 CEST4974158709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:46.029916048 CEST4973558709192.168.2.477.91.77.66
                      Jun 20, 2024 18:18:46.035264015 CEST587094974177.91.77.66192.168.2.4
                      Jun 20, 2024 18:18:46.035303116 CEST587094973577.91.77.66192.168.2.4

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:12:16:14
                      Start date:20/06/2024
                      Path:C:\Users\user\Desktop\AlCsIOd0pd.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\AlCsIOd0pd.exe"
                      Imagebase:0x400000
                      File size:3'259'920 bytes
                      MD5 hash:DE584DD4970A8099454611EE0C739EA8
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:false

                      Target ID:1
                      Start time:12:16:16
                      Start date:20/06/2024
                      Path:C:\Windows\SysWOW64\schtasks.exe
                      Wow64 process (32bit):true
                      Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
                      Imagebase:0xb50000
                      File size:187'904 bytes
                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:2
                      Start time:12:16:16
                      Start date:20/06/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:3
                      Start time:12:16:16
                      Start date:20/06/2024
                      Path:C:\Windows\SysWOW64\schtasks.exe
                      Wow64 process (32bit):true
                      Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
                      Imagebase:0xb50000
                      File size:187'904 bytes
                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:4
                      Start time:12:16:16
                      Start date:20/06/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:5
                      Start time:12:16:18
                      Start date:20/06/2024
                      Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                      Wow64 process (32bit):true
                      Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                      Imagebase:0x400000
                      File size:3'259'920 bytes
                      MD5 hash:DE584DD4970A8099454611EE0C739EA8
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Antivirus matches:
                      • Detection: 100%, Joe Sandbox ML
                      • Detection: 63%, ReversingLabs
                      Reputation:low
                      Has exited:false

                      Target ID:6
                      Start time:12:16:18
                      Start date:20/06/2024
                      Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                      Wow64 process (32bit):true
                      Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                      Imagebase:0x400000
                      File size:3'259'920 bytes
                      MD5 hash:DE584DD4970A8099454611EE0C739EA8
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:false

                      Target ID:7
                      Start time:12:16:29
                      Start date:20/06/2024
                      Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                      Imagebase:0x400000
                      File size:3'259'920 bytes
                      MD5 hash:DE584DD4970A8099454611EE0C739EA8
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Antivirus matches:
                      • Detection: 100%, Joe Sandbox ML
                      • Detection: 63%, ReversingLabs
                      Reputation:low
                      Has exited:false

                      Target ID:11
                      Start time:12:16:37
                      Start date:20/06/2024
                      Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                      Imagebase:0x400000
                      File size:3'259'920 bytes
                      MD5 hash:DE584DD4970A8099454611EE0C739EA8
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:false

                      Reset < >

                        Execution Graph

                        Execution Coverage:4.5%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:4.5%
                        Total number of Nodes:2000
                        Total number of Limit Nodes:34
                        execution_graph 13655 4c7b00 13656 4c7ecc 13655->13656 13674 4c7b3e std::ios_base::_Ios_base_dtor __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 13655->13674 13657 4c7b87 setsockopt recv WSAGetLastError 13657->13656 13657->13674 13659 4c7eb7 Sleep 13659->13656 13659->13674 13660 4c7e15 recv 13662 4c7eaf Sleep 13660->13662 13662->13659 13664 4c7c2d recv 13665 4c7c4e recv 13664->13665 13664->13674 13665->13674 13667 4c7ee1 13793 438c70 13667->13793 13670 4c7cd6 setsockopt recv 13670->13674 13671 418dc0 42 API calls 13671->13670 13674->13657 13674->13659 13674->13660 13674->13662 13674->13667 13674->13670 13674->13671 13675 4c8590 WSAStartup 13674->13675 13688 418dc0 13674->13688 13697 4163b0 13674->13697 13702 4c7ef0 13674->13702 13774 433069 13674->13774 13777 409280 13674->13777 13676 4c8696 13675->13676 13677 4c85c8 13675->13677 13676->13674 13677->13676 13678 4c85fe getaddrinfo 13677->13678 13679 4c8646 13678->13679 13680 4c8690 WSACleanup 13678->13680 13681 4c86a4 FreeAddrInfoW 13679->13681 13683 4c8654 socket 13679->13683 13680->13676 13681->13680 13682 4c86b0 13681->13682 13682->13674 13683->13680 13684 4c866a connect 13683->13684 13685 4c867c closesocket 13684->13685 13686 4c86a0 13684->13686 13685->13683 13687 4c8686 FreeAddrInfoW 13685->13687 13686->13681 13687->13680 13690 418e11 13688->13690 13691 418de2 std::locale::_Setgloballocale 13688->13691 13689 418ef8 13690->13689 13798 4032d0 13690->13798 13691->13664 13693 418e66 std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 13694 418ecb std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 13693->13694 13812 402fe0 13693->13812 13694->13664 13696 418eb8 13696->13664 13699 4163d8 13697->13699 13698 4163e7 13698->13674 13699->13698 13700 4032d0 std::_Throw_Cpp_error 42 API calls 13699->13700 13701 41642a std::_Locinfo::_Locinfo_ctor 13700->13701 13701->13674 13703 4c7f6c 13702->13703 13704 4c7f3e 13702->13704 13706 4c7f8e 13703->13706 13707 4c7f74 13703->13707 13705 402cf0 std::_Throw_Cpp_error 42 API calls 13704->13705 13708 4c7f50 13705->13708 13710 4c7f96 13706->13710 13711 4c7fb0 13706->13711 14137 416290 13707->14137 13715 409280 45 API calls 13708->13715 13712 416290 42 API calls 13710->13712 13713 4c7fb8 13711->13713 13714 4c7fd5 13711->13714 13738 4c7f64 13712->13738 13718 416290 42 API calls 13713->13718 13713->13738 13716 4c7fdd 13714->13716 13717 4c7ffb 13714->13717 13715->13738 14141 4412b7 13716->14141 13722 4c801b 13717->13722 13723 4c82c0 13717->13723 13717->13738 13718->13738 13720 402df0 std::_Throw_Cpp_error 42 API calls 13721 4c84f1 13720->13721 13721->13674 14089 405400 13722->14089 13724 4c82c8 13723->13724 13725 4c831b 13723->13725 14189 41b430 13724->14189 13728 4c8376 13725->13728 13729 4c8323 13725->13729 13730 4c837e 13728->13730 13731 4c83d1 13728->13731 13732 41b430 55 API calls 13729->13732 13733 41b430 55 API calls 13730->13733 13735 4c842c 13731->13735 13736 4c83d9 13731->13736 13732->13738 13733->13738 13734 4c82a5 14186 432baa 13734->14186 13741 4c8484 13735->13741 13742 4c8434 13735->13742 13740 41b430 55 API calls 13736->13740 13738->13720 13740->13738 13741->13738 14198 458b00 13741->14198 13743 41b430 55 API calls 13742->13743 13743->13738 13745 4c849a 14203 4162c0 13745->14203 13749 402df0 std::_Throw_Cpp_error 42 API calls 13749->13738 13750 402df0 42 API calls std::_Throw_Cpp_error 13752 4c8040 13750->13752 13751 4c810b 14106 402d30 13751->14106 13752->13734 13752->13750 13752->13751 14099 402cf0 13752->14099 14103 41ace0 13752->14103 13756 4c8140 14123 402df0 13756->14123 13758 4c814f 13759 4c81b2 GetCurrentProcess 13758->13759 13762 4c81e5 13758->13762 13760 4163b0 std::_Throw_Cpp_error 42 API calls 13759->13760 13761 4c81ce 13760->13761 14147 4cf280 VirtualAllocEx WriteProcessMemory 13761->14147 14134 439820 13762->14134 13765 4c81dd 13767 4c8279 13765->13767 14180 415230 13767->14180 13772 402df0 std::_Throw_Cpp_error 42 API calls 13772->13734 16261 43361d 13774->16261 13778 4163b0 std::_Throw_Cpp_error 42 API calls 13777->13778 13780 4092d4 13778->13780 13779 402df0 std::_Throw_Cpp_error 42 API calls 13781 409482 13779->13781 13780->13779 13782 418dc0 42 API calls 13781->13782 13784 409523 std::_Locinfo::_Locinfo_ctor 13781->13784 13782->13784 13783 4095f0 GetModuleHandleA GetProcAddress WSASend 13783->13784 13785 4096e2 std::ios_base::_Ios_base_dtor 13783->13785 13784->13783 13784->13785 13786 40975d std::ios_base::_Ios_base_dtor 13785->13786 13787 438c70 std::_Throw_Cpp_error 40 API calls 13785->13787 13786->13674 13788 40979c 13787->13788 13789 402df0 std::_Throw_Cpp_error 42 API calls 13788->13789 13790 4097d7 13789->13790 13791 402df0 std::_Throw_Cpp_error 42 API calls 13790->13791 13792 4097f0 13791->13792 13792->13674 13794 438bac ___std_exception_copy 40 API calls 13793->13794 13795 438c7f 13794->13795 13796 438c8d __Getctype 11 API calls 13795->13796 13797 438c8c 13796->13797 13799 4032e2 13798->13799 13800 403306 13798->13800 13802 4032e9 13799->13802 13803 40331f 13799->13803 13801 403318 13800->13801 13804 433672 std::_Facet_Register 42 API calls 13800->13804 13801->13693 13817 433672 13802->13817 13828 402b50 13803->13828 13807 403310 13804->13807 13807->13693 13808 4032ef 13809 438c70 std::_Throw_Cpp_error 40 API calls 13808->13809 13810 4032f8 13808->13810 13811 403329 13809->13811 13810->13693 13813 403007 13812->13813 13814 403017 std::ios_base::_Ios_base_dtor 13812->13814 13813->13814 13815 438c70 std::_Throw_Cpp_error 40 API calls 13813->13815 13814->13696 13816 403036 13815->13816 13819 433677 13817->13819 13820 433691 13819->13820 13823 402b50 Concurrency::cancel_current_task 13819->13823 13834 4423ec 13819->13834 13852 445a89 13819->13852 13820->13808 13822 43369d 13822->13822 13823->13822 13841 4351fb 13823->13841 13825 402b6c 13844 434b15 13825->13844 13829 402b5e Concurrency::cancel_current_task 13828->13829 13830 4351fb std::_Throw_Cpp_error RaiseException 13829->13830 13831 402b6c 13830->13831 13832 434b15 ___std_exception_copy 41 API calls 13831->13832 13833 402bac 13832->13833 13833->13808 13840 44b094 __Getctype 13834->13840 13835 44b0d2 13855 4416ff 13835->13855 13836 44b0bd RtlAllocateHeap 13838 44b0d0 13836->13838 13836->13840 13838->13819 13839 445a89 std::_Facet_Register 2 API calls 13839->13840 13840->13835 13840->13836 13840->13839 13842 435242 RaiseException 13841->13842 13843 435215 13841->13843 13842->13825 13843->13842 13845 434b22 13844->13845 13850 402bac 13844->13850 13846 4423ec ___std_exception_copy 15 API calls 13845->13846 13845->13850 13847 434b3f 13846->13847 13851 434b4f 13847->13851 13979 4499a5 13847->13979 13850->13808 13988 441c96 13851->13988 14078 445ab5 13852->14078 13858 449f93 GetLastError 13855->13858 13857 441704 13857->13838 13859 449faf 13858->13859 13860 449fa9 13858->13860 13864 449fb3 SetLastError 13859->13864 13886 44b69b 13859->13886 13881 44b65c 13860->13881 13864->13857 13868 449fe8 13870 44b69b __Getctype 6 API calls 13868->13870 13869 449ff9 13871 44b69b __Getctype 6 API calls 13869->13871 13872 449ff6 13870->13872 13873 44a005 13871->13873 13898 44b01a 13872->13898 13874 44a020 13873->13874 13875 44a009 13873->13875 13904 449c70 13874->13904 13878 44b69b __Getctype 6 API calls 13875->13878 13878->13872 13880 44b01a __freea 12 API calls 13880->13864 13909 44b449 13881->13909 13883 44b678 13884 44b693 TlsGetValue 13883->13884 13885 44b681 13883->13885 13885->13859 13887 44b449 std::locale::_Setgloballocale 5 API calls 13886->13887 13888 44b6b7 13887->13888 13889 44b6d5 TlsSetValue 13888->13889 13890 449fcb 13888->13890 13890->13864 13891 44a65a 13890->13891 13897 44a667 __Getctype 13891->13897 13892 44a6a7 13894 4416ff __floor_pentium4 13 API calls 13892->13894 13893 44a692 RtlAllocateHeap 13895 449fe0 13893->13895 13893->13897 13894->13895 13895->13868 13895->13869 13896 445a89 std::_Facet_Register 2 API calls 13896->13897 13897->13892 13897->13893 13897->13896 13899 44b025 HeapFree 13898->13899 13900 44b04f 13898->13900 13899->13900 13901 44b03a GetLastError 13899->13901 13900->13864 13902 44b047 __freea 13901->13902 13903 4416ff __floor_pentium4 12 API calls 13902->13903 13903->13900 13923 449b04 13904->13923 13910 44b479 13909->13910 13914 44b475 std::locale::_Setgloballocale 13909->13914 13910->13914 13915 44b37e 13910->13915 13913 44b493 GetProcAddress 13913->13914 13914->13883 13916 44b38f std::locale::_Setgloballocale 13915->13916 13917 44b425 13916->13917 13918 44b3ad LoadLibraryExW 13916->13918 13922 44b3fb LoadLibraryExW 13916->13922 13917->13913 13917->13914 13919 44b42c 13918->13919 13920 44b3c8 GetLastError 13918->13920 13919->13917 13921 44b43e FreeLibrary 13919->13921 13920->13916 13921->13917 13922->13916 13922->13919 13924 449b10 std::_Locinfo::_Locinfo_dtor 13923->13924 13937 44424b RtlEnterCriticalSection 13924->13937 13926 449b1a 13938 449b4a 13926->13938 13929 449c16 13930 449c22 std::_Locinfo::_Locinfo_dtor 13929->13930 13942 44424b RtlEnterCriticalSection 13930->13942 13932 449c2c 13943 449df7 13932->13943 13934 449c44 13947 449c64 13934->13947 13937->13926 13941 444293 RtlLeaveCriticalSection 13938->13941 13940 449b38 13940->13929 13941->13940 13942->13932 13944 449e06 __Getctype 13943->13944 13946 449e2d __Getctype 13943->13946 13944->13946 13950 452146 13944->13950 13946->13934 13978 444293 RtlLeaveCriticalSection 13947->13978 13949 449c52 13949->13880 13952 4521c6 13950->13952 13953 45215c 13950->13953 13951 4522b7 __Getctype 14 API calls 13971 452222 13951->13971 13954 44b01a __freea 14 API calls 13952->13954 13977 452214 13952->13977 13953->13952 13958 44b01a __freea 14 API calls 13953->13958 13959 45218f 13953->13959 13955 4521e8 13954->13955 13956 44b01a __freea 14 API calls 13955->13956 13960 4521fb 13956->13960 13957 44b01a __freea 14 API calls 13961 4521bb 13957->13961 13963 452184 13958->13963 13964 44b01a __freea 14 API calls 13959->13964 13976 4521b1 13959->13976 13965 44b01a __freea 14 API calls 13960->13965 13966 44b01a __freea 14 API calls 13961->13966 13962 452282 13967 44b01a __freea 14 API calls 13962->13967 13968 45144a __Getctype 14 API calls 13963->13968 13969 4521a6 13964->13969 13970 452209 13965->13970 13966->13952 13973 452288 13967->13973 13968->13959 13974 4518a9 __Getctype 14 API calls 13969->13974 13975 44b01a __freea 14 API calls 13970->13975 13971->13962 13972 44b01a 14 API calls __freea 13971->13972 13972->13971 13973->13946 13974->13976 13975->13977 13976->13957 13977->13951 13978->13949 13980 4499b3 13979->13980 13982 4499c1 13979->13982 13980->13982 13986 4499d9 13980->13986 13981 4416ff __floor_pentium4 14 API calls 13983 4499c9 13981->13983 13982->13981 13991 438c60 13983->13991 13985 4499d3 13985->13851 13986->13985 13987 4416ff __floor_pentium4 14 API calls 13986->13987 13987->13983 13989 44b01a __freea 14 API calls 13988->13989 13990 441cae 13989->13990 13990->13850 13994 438bac 13991->13994 13995 438bbe ___std_exception_copy 13994->13995 14000 438be3 13995->14000 13997 438bd6 14011 43899c 13997->14011 14001 438bf3 14000->14001 14002 438bfa 14000->14002 14017 438a01 GetLastError 14001->14017 14007 438c08 14002->14007 14021 4389d8 14002->14021 14005 438c2f 14005->14007 14024 438c8d IsProcessorFeaturePresent 14005->14024 14007->13997 14008 438c5f 14009 438bac ___std_exception_copy 40 API calls 14008->14009 14010 438c6c 14009->14010 14010->13997 14012 4389a8 14011->14012 14013 4389bf 14012->14013 14056 438a47 14012->14056 14015 4389d2 14013->14015 14016 438a47 ___std_exception_copy 40 API calls 14013->14016 14015->13985 14016->14015 14018 438a1a 14017->14018 14028 44a044 14018->14028 14022 4389e3 GetLastError SetLastError 14021->14022 14023 4389fc 14021->14023 14022->14005 14023->14005 14025 438c99 14024->14025 14050 438a64 14025->14050 14029 44a057 14028->14029 14033 44a05d 14028->14033 14031 44b65c __Getctype 6 API calls 14029->14031 14030 44b69b __Getctype 6 API calls 14032 44a077 14030->14032 14031->14033 14034 438a32 SetLastError 14032->14034 14035 44a65a __Getctype 14 API calls 14032->14035 14033->14030 14033->14034 14034->14002 14036 44a087 14035->14036 14037 44a0a4 14036->14037 14038 44a08f 14036->14038 14040 44b69b __Getctype 6 API calls 14037->14040 14039 44b69b __Getctype 6 API calls 14038->14039 14042 44a09b 14039->14042 14041 44a0b0 14040->14041 14043 44a0b4 14041->14043 14044 44a0c3 14041->14044 14047 44b01a __freea 14 API calls 14042->14047 14045 44b69b __Getctype 6 API calls 14043->14045 14046 449c70 __Getctype 14 API calls 14044->14046 14045->14042 14048 44a0ce 14046->14048 14047->14034 14049 44b01a __freea 14 API calls 14048->14049 14049->14034 14051 438a80 std::locale::_Setgloballocale 14050->14051 14052 438aac IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 14051->14052 14053 438b7d std::locale::_Setgloballocale 14052->14053 14054 433d77 _ValidateLocalCookies 5 API calls 14053->14054 14055 438b9b GetCurrentProcess TerminateProcess 14054->14055 14055->14008 14057 438a51 14056->14057 14058 438a5a 14056->14058 14059 438a01 ___std_exception_copy 16 API calls 14057->14059 14058->14013 14060 438a56 14059->14060 14060->14058 14063 4441c6 14060->14063 14064 44f620 std::locale::_Setgloballocale RtlEnterCriticalSection RtlLeaveCriticalSection 14063->14064 14065 4441cb 14064->14065 14066 4441d6 14065->14066 14069 44f665 std::locale::_Setgloballocale 39 API calls 14065->14069 14067 4441e0 IsProcessorFeaturePresent 14066->14067 14068 4441ff 14066->14068 14070 4441ec 14067->14070 14071 4436e2 std::locale::_Setgloballocale 20 API calls 14068->14071 14069->14066 14072 438a64 std::locale::_Setgloballocale 8 API calls 14070->14072 14074 444209 14071->14074 14072->14068 14073 44b7f4 std::locale::_Setgloballocale 6 API calls 14073->14074 14074->14073 14075 44423e 14074->14075 14076 438a63 14074->14076 14077 444262 __Getctype RtlDeleteCriticalSection 14075->14077 14077->14076 14079 445ac1 std::_Locinfo::_Locinfo_dtor 14078->14079 14084 44424b RtlEnterCriticalSection 14079->14084 14081 445acc std::locale::_Setgloballocale 14085 445b03 14081->14085 14084->14081 14088 444293 RtlLeaveCriticalSection 14085->14088 14087 445a94 14087->13819 14088->14087 14207 432b99 14089->14207 14092 405410 14093 405419 14092->14093 14095 432534 std::_Throw_Cpp_error 78 API calls 14092->14095 14093->13752 14096 405430 14095->14096 14218 43953c 14096->14218 14100 402d13 14099->14100 14100->14100 14101 403040 std::_Throw_Cpp_error 42 API calls 14100->14101 14102 402d25 14101->14102 14102->13752 14104 41ad10 14103->14104 14104->14104 14784 41fbf0 14104->14784 14107 403040 std::_Throw_Cpp_error 42 API calls 14106->14107 14108 402d55 14107->14108 14109 4d62c0 14108->14109 14110 4d6358 14109->14110 14122 4d6361 std::locale::_Setgloballocale 14109->14122 14793 41e4b0 14110->14793 14113 4d654f 14116 4d6553 14113->14116 14897 416130 14113->14897 14117 4d6580 std::ios_base::_Ios_base_dtor 14116->14117 14118 438c70 std::_Throw_Cpp_error 40 API calls 14116->14118 14117->13756 14119 4d65ce 14118->14119 14120 433069 __Xtime_get_ticks 2 API calls 14119->14120 14121 4d65d6 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 14120->14121 14121->13756 14122->14113 14122->14116 14816 4f4760 14122->14816 14827 424160 14122->14827 14124 402e13 14123->14124 14125 402e2e std::ios_base::_Ios_base_dtor 14123->14125 14124->14125 14126 438c70 std::_Throw_Cpp_error 40 API calls 14124->14126 14125->13758 14127 402e5f 14126->14127 14128 402e88 14127->14128 14129 4032d0 std::_Throw_Cpp_error 42 API calls 14127->14129 14128->13758 14131 402eee std::_Locinfo::_Locinfo_ctor 14129->14131 14130 402f3c std::_Locinfo::_Locinfo_ctor 14130->13758 14131->14130 14132 402fe0 std::_Throw_Cpp_error 40 API calls 14131->14132 14133 402f2b 14132->14133 14133->13758 14995 43975e 14134->14995 14138 4162b1 14137->14138 14139 41629d 14137->14139 14138->13738 14140 416130 42 API calls 14139->14140 14140->14138 14142 4412ca ___std_exception_copy 14141->14142 15046 43d6a5 14142->15046 14144 4412e4 14145 43899c ___std_exception_copy 40 API calls 14144->14145 14146 4412f1 14145->14146 14146->13738 14148 4cf31d 14147->14148 14149 4cf35a VirtualAllocEx 14147->14149 14150 4cf323 WriteProcessMemory 14148->14150 14151 4cf3cf std::locale::_Setgloballocale 14149->14151 14150->14150 14152 4cf357 14150->14152 15262 41ab20 14151->15262 14152->14149 14155 418f00 std::_Throw_Cpp_error 42 API calls 14156 4cf47f 14155->14156 14157 402df0 std::_Throw_Cpp_error 42 API calls 14156->14157 14158 4cf4c9 14157->14158 15267 403440 14158->15267 14161 4cf56d 14162 4cf58b std::ios_base::_Ios_base_dtor 14161->14162 14164 4cf5c9 14161->14164 14163 402df0 std::_Throw_Cpp_error 42 API calls 14162->14163 14165 4cf5b6 14163->14165 14166 438c70 std::_Throw_Cpp_error 40 API calls 14164->14166 14165->13765 14167 4cf5ce 14166->14167 14167->13765 14168 441628 14169 44163b ___std_exception_copy 14168->14169 15524 44140a 14169->15524 14171 441650 14172 43899c ___std_exception_copy 40 API calls 14171->14172 14173 44165d 14172->14173 14174 43d0a8 14173->14174 14175 43d0bb ___std_exception_copy 14174->14175 15694 43cf83 14175->15694 14177 43d0c7 14178 43899c ___std_exception_copy 40 API calls 14177->14178 14179 43d0d3 14178->14179 14179->13767 14181 415286 14180->14181 14182 41524c 14180->14182 14183 402df0 std::_Throw_Cpp_error 42 API calls 14181->14183 14182->14181 14185 402df0 std::_Throw_Cpp_error 42 API calls 14182->14185 14184 415294 14183->14184 14184->13772 14185->14182 14187 432bb6 RtlReleaseSRWLockExclusive 14186->14187 14188 432bc4 14186->14188 14187->14188 14188->13738 15786 417ef0 14189->15786 14191 41b48d 15805 422100 14191->15805 14195 41b503 15875 41d490 14195->15875 14197 41b512 14197->13738 16230 458bb0 14198->16230 14200 458b31 std::_Locinfo::_Locinfo_ctor 14201 403040 std::_Throw_Cpp_error 42 API calls 14200->14201 14202 458b7c 14201->14202 14202->13745 14204 4162ce 14203->14204 14206 4162d3 14203->14206 14205 402df0 std::_Throw_Cpp_error 42 API calls 14204->14205 14205->14206 14206->13749 14224 432bc8 GetCurrentThreadId 14207->14224 14210 432534 14211 43254a std::_Throw_Cpp_error 14210->14211 14250 4324e7 14211->14250 14219 43954f ___std_exception_copy 14218->14219 14758 4393db 14219->14758 14221 43955e 14222 43899c ___std_exception_copy 40 API calls 14221->14222 14223 405450 14222->14223 14223->13752 14225 432bf2 14224->14225 14226 432c11 14224->14226 14227 432bf7 RtlAcquireSRWLockExclusive 14225->14227 14235 432c07 14225->14235 14228 432c31 14226->14228 14229 432c1a 14226->14229 14227->14235 14231 432c90 14228->14231 14237 432c49 14228->14237 14230 432c25 RtlAcquireSRWLockExclusive 14229->14230 14229->14235 14230->14235 14232 432c97 RtlTryAcquireSRWLockExclusive 14231->14232 14231->14235 14232->14235 14234 405409 14234->14092 14234->14210 14242 433d77 14235->14242 14237->14235 14238 432c80 RtlTryAcquireSRWLockExclusive 14237->14238 14239 43302b 14237->14239 14238->14235 14238->14237 14240 433069 __Xtime_get_ticks 2 API calls 14239->14240 14241 433036 __aulldiv __aullrem 14240->14241 14241->14237 14243 433d80 IsProcessorFeaturePresent 14242->14243 14244 433d7f 14242->14244 14246 43455a 14243->14246 14244->14234 14249 43451d SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 14246->14249 14248 43463d 14248->14234 14249->14248 14251 4324f3 __EH_prolog3_GS 14250->14251 14252 402cf0 std::_Throw_Cpp_error 42 API calls 14251->14252 14253 432507 14252->14253 14273 4036e0 14253->14273 14255 43251c 14256 402df0 std::_Throw_Cpp_error 42 API calls 14255->14256 14257 432524 14256->14257 14289 433f6d 14257->14289 14274 4163b0 std::_Throw_Cpp_error 42 API calls 14273->14274 14275 403731 14274->14275 14277 40375a 14275->14277 14292 418f00 14275->14292 14278 418f00 std::_Throw_Cpp_error 42 API calls 14277->14278 14279 40378a 14278->14279 14280 402df0 std::_Throw_Cpp_error 42 API calls 14279->14280 14281 4037a4 14280->14281 14282 434b15 ___std_exception_copy 41 API calls 14281->14282 14284 40381e 14282->14284 14283 40385f std::ios_base::_Ios_base_dtor 14283->14255 14284->14283 14285 438c70 std::_Throw_Cpp_error 40 API calls 14284->14285 14286 4038b0 14285->14286 14301 434b78 14286->14301 14288 4038f5 std::ios_base::_Ios_base_dtor 14288->14255 14290 433d77 _ValidateLocalCookies 5 API calls 14289->14290 14291 433f77 14290->14291 14291->14291 14293 418f22 std::_Locinfo::_Locinfo_ctor 14292->14293 14294 418f4f 14292->14294 14293->14277 14295 4032d0 std::_Throw_Cpp_error 42 API calls 14294->14295 14296 41902f std::ios_base::_Ios_base_dtor 14294->14296 14297 418fa4 std::_Locinfo::_Locinfo_ctor 14295->14297 14296->14277 14298 419002 std::_Locinfo::_Locinfo_ctor 14297->14298 14299 402fe0 std::_Throw_Cpp_error 40 API calls 14297->14299 14298->14277 14300 418fef 14299->14300 14300->14277 14302 434b85 14301->14302 14303 434b8c 14301->14303 14304 441c96 __freea 14 API calls 14302->14304 14303->14288 14304->14303 14759 4393e7 std::_Locinfo::_Locinfo_dtor 14758->14759 14760 4393f0 14759->14760 14761 439414 14759->14761 14763 438be3 ___std_exception_copy 40 API calls 14760->14763 14772 441250 RtlEnterCriticalSection 14761->14772 14771 439409 14763->14771 14764 43941d 14765 439432 14764->14765 14773 44a1e9 14764->14773 14767 4394cf 14765->14767 14768 43949e 14765->14768 14780 439507 14767->14780 14769 438be3 ___std_exception_copy 40 API calls 14768->14769 14769->14771 14771->14221 14772->14764 14774 44a1f5 14773->14774 14775 44a20a 14773->14775 14776 4416ff __floor_pentium4 14 API calls 14774->14776 14775->14765 14777 44a1fa 14776->14777 14778 438c60 ___std_exception_copy 40 API calls 14777->14778 14779 44a205 14778->14779 14779->14765 14783 441264 RtlLeaveCriticalSection 14780->14783 14782 43950d 14782->14771 14783->14782 14785 41fc12 std::_Locinfo::_Locinfo_ctor 14784->14785 14787 41fc8d 14784->14787 14786 41fd5e 14787->14786 14788 4032d0 std::_Throw_Cpp_error 42 API calls 14787->14788 14789 41fce1 std::_Locinfo::_Locinfo_ctor 14788->14789 14790 41fd3a std::_Locinfo::_Locinfo_ctor 14789->14790 14791 402fe0 std::_Throw_Cpp_error 40 API calls 14789->14791 14792 41fd27 14791->14792 14794 41e4c2 14793->14794 14795 41e528 14793->14795 14797 41e4f9 14794->14797 14798 41e4ca 14794->14798 14908 403330 14795->14908 14801 41e516 14797->14801 14804 433672 std::_Facet_Register 42 API calls 14797->14804 14799 41e52d 14798->14799 14800 41e4d1 14798->14800 14802 402b50 Concurrency::cancel_current_task 42 API calls 14799->14802 14803 433672 std::_Facet_Register 42 API calls 14800->14803 14801->14122 14806 41e4d7 14802->14806 14803->14806 14805 41e503 14804->14805 14805->14122 14807 438c70 std::_Throw_Cpp_error 40 API calls 14806->14807 14808 41e4e0 14806->14808 14809 41e537 14807->14809 14808->14122 14911 416ad0 14809->14911 14811 404900 std::_Throw_Cpp_error 42 API calls 14814 41e5fb 14811->14814 14812 41e574 14812->14811 14813 41e613 14813->14122 14814->14813 14915 419b60 14814->14915 14817 4f4767 14816->14817 14818 4f476c 14816->14818 14817->14122 14819 4423ec ___std_exception_copy 15 API calls 14818->14819 14825 4f47af 14818->14825 14819->14825 14820 4f47c2 14820->14122 14821 4f4877 14821->14122 14822 441c96 __freea 14 API calls 14823 4f4867 14822->14823 14823->14122 14824 4f4821 14824->14821 14824->14822 14825->14820 14825->14824 14826 441c96 __freea 14 API calls 14825->14826 14826->14824 14828 424195 14827->14828 14829 424288 14827->14829 14831 4241b1 14828->14831 14832 424202 14828->14832 14833 4241f2 14828->14833 14830 403330 42 API calls 14829->14830 14834 42428d 14830->14834 14836 433672 std::_Facet_Register 42 API calls 14831->14836 14838 433672 std::_Facet_Register 42 API calls 14832->14838 14844 4241cf std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 14832->14844 14833->14831 14833->14834 14835 402b50 Concurrency::cancel_current_task 42 API calls 14834->14835 14837 424292 14835->14837 14839 4241c4 14836->14839 14840 438c70 std::_Throw_Cpp_error 40 API calls 14837->14840 14838->14844 14839->14837 14839->14844 14841 424297 14840->14841 14842 4242fa 14841->14842 14843 4243e9 14841->14843 14961 426ff0 14842->14961 14845 403330 42 API calls 14843->14845 14956 4277d0 14844->14956 14846 4243ee 14845->14846 14848 42445a 14846->14848 14849 424549 14846->14849 14853 426ff0 42 API calls 14848->14853 14852 403330 42 API calls 14849->14852 14851 42425e 14851->14122 14860 42454e 14852->14860 14855 424496 14853->14855 14854 42470b 14857 403330 42 API calls 14854->14857 14859 4163b0 std::_Throw_Cpp_error 42 API calls 14855->14859 14856 424706 14861 402b50 Concurrency::cancel_current_task 42 API calls 14856->14861 14862 4246af 14857->14862 14858 424336 14969 427830 14858->14969 14874 4244c4 14859->14874 14860->14854 14860->14856 14863 424615 14860->14863 14864 4245ee 14860->14864 14861->14854 14865 438c70 std::_Throw_Cpp_error 40 API calls 14862->14865 14888 4246d1 std::ios_base::_Ios_base_dtor 14862->14888 14871 433672 std::_Facet_Register 42 API calls 14863->14871 14876 4245ff 14863->14876 14864->14856 14866 4245f9 14864->14866 14867 424715 14865->14867 14868 433672 std::_Facet_Register 42 API calls 14866->14868 14986 41d010 14867->14986 14868->14876 14871->14876 14872 4243b0 14872->14122 14877 427830 42 API calls 14874->14877 14876->14862 14876->14888 14976 431f9c 14876->14976 14879 424510 14877->14879 14878 42472f 14880 4351fb std::_Throw_Cpp_error RaiseException 14878->14880 14879->14122 14881 424738 14880->14881 14882 424798 14881->14882 14883 42475b 14881->14883 14884 42477f 14881->14884 14885 402b50 Concurrency::cancel_current_task 42 API calls 14882->14885 14883->14882 14886 424762 14883->14886 14887 424791 14884->14887 14891 433672 std::_Facet_Register 42 API calls 14884->14891 14889 424768 14885->14889 14890 433672 std::_Facet_Register 42 API calls 14886->14890 14887->14122 14888->14122 14893 438c70 std::_Throw_Cpp_error 40 API calls 14889->14893 14896 424771 14889->14896 14890->14889 14894 424789 14891->14894 14895 4247a2 14893->14895 14894->14122 14896->14122 14898 416143 std::_Locinfo::_Locinfo_ctor 14897->14898 14899 416174 14897->14899 14898->14116 14900 416200 14899->14900 14901 416180 14899->14901 14903 418f00 std::_Throw_Cpp_error 42 API calls 14900->14903 14902 4032d0 std::_Throw_Cpp_error 42 API calls 14901->14902 14906 4161bf std::_Locinfo::_Locinfo_ctor 14902->14906 14904 416232 14903->14904 14904->14116 14905 4161ed 14905->14116 14906->14905 14907 402fe0 std::_Throw_Cpp_error 40 API calls 14906->14907 14907->14905 14919 431cea 14908->14919 14912 416b02 14911->14912 14913 416b1d 14912->14913 14945 4150e0 14912->14945 14913->14812 14916 419bbb 14915->14916 14917 419b96 14915->14917 14916->14813 14917->14916 14953 4188a0 14917->14953 14932 431a9f 14919->14932 14922 4351fb std::_Throw_Cpp_error RaiseException 14923 431d09 14922->14923 14935 431af4 14923->14935 14926 4351fb std::_Throw_Cpp_error RaiseException 14927 431d29 14926->14927 14938 431b37 14927->14938 14930 4351fb std::_Throw_Cpp_error RaiseException 14931 431d49 14930->14931 14942 4034e0 14932->14942 14936 4034e0 std::regex_error::regex_error 41 API calls 14935->14936 14937 431b06 14936->14937 14937->14926 14939 431b4b std::regex_error::regex_error 14938->14939 14940 4034e0 std::regex_error::regex_error 41 API calls 14939->14940 14941 431b54 14940->14941 14941->14930 14943 434b15 ___std_exception_copy 41 API calls 14942->14943 14944 403522 14943->14944 14944->14922 14946 4151b5 14945->14946 14947 415117 14945->14947 14946->14913 14948 416ad0 42 API calls 14947->14948 14949 415120 14948->14949 14950 41519d 14949->14950 14951 404900 std::_Throw_Cpp_error 42 API calls 14949->14951 14950->14946 14952 419b60 42 API calls 14950->14952 14951->14950 14952->14946 14954 404900 std::_Throw_Cpp_error 42 API calls 14953->14954 14955 4188bf 14954->14955 14955->14916 14957 4277dc 14956->14957 14958 4277f9 std::ios_base::_Ios_base_dtor 14956->14958 14957->14958 14959 438c70 std::_Throw_Cpp_error 40 API calls 14957->14959 14958->14851 14960 427824 14959->14960 14962 42703c 14961->14962 14963 426ff9 14961->14963 14962->14962 14963->14962 14964 427013 14963->14964 14966 433672 std::_Facet_Register 42 API calls 14963->14966 14965 42701c 14964->14965 14967 433672 std::_Facet_Register 42 API calls 14964->14967 14965->14858 14966->14964 14968 427035 14967->14968 14968->14858 14972 427882 std::ios_base::_Ios_base_dtor 14969->14972 14973 42783d 14969->14973 14970 427853 14970->14972 14974 438c70 std::_Throw_Cpp_error 40 API calls 14970->14974 14971 402df0 std::_Throw_Cpp_error 42 API calls 14971->14973 14972->14872 14973->14970 14973->14971 14975 4278b6 14974->14975 14977 431fb2 14976->14977 14978 431fa5 FindClose 14976->14978 14977->14876 14978->14977 14979 431fb6 14978->14979 14980 4441c6 __Getctype 40 API calls 14979->14980 14981 431fbb 14980->14981 14982 431f9c 40 API calls 14981->14982 14983 431fca FindFirstFileExW 14982->14983 14984 431fe5 14983->14984 14985 431fe9 GetLastError 14983->14985 14984->14876 14985->14984 14987 41d01a 14986->14987 14988 41d02e 14986->14988 14987->14988 14989 431f9c 43 API calls 14987->14989 14990 419910 14988->14990 14989->14987 14991 419928 14990->14991 14992 419938 std::ios_base::_Ios_base_dtor 14990->14992 14991->14992 14993 438c70 std::_Throw_Cpp_error 40 API calls 14991->14993 14992->14878 14994 41994d 14993->14994 14997 43976a std::_Locinfo::_Locinfo_dtor 14995->14997 14996 439771 14998 4416ff __floor_pentium4 14 API calls 14996->14998 14997->14996 15000 439791 14997->15000 14999 439776 14998->14999 15001 438c60 ___std_exception_copy 40 API calls 14999->15001 15002 4397a3 15000->15002 15003 439796 15000->15003 15004 439781 15001->15004 15012 44a8ef 15002->15012 15005 4416ff __floor_pentium4 14 API calls 15003->15005 15004->13767 15004->14168 15005->15004 15008 4397b3 15010 4416ff __floor_pentium4 14 API calls 15008->15010 15009 4397c0 15020 4397fe 15009->15020 15010->15004 15013 44a8fb std::_Locinfo::_Locinfo_dtor 15012->15013 15024 44424b RtlEnterCriticalSection 15013->15024 15015 44a909 15025 44a993 15015->15025 15021 439802 15020->15021 15045 441264 RtlLeaveCriticalSection 15021->15045 15023 439813 15023->15004 15024->15015 15032 44a9b6 15025->15032 15026 44aa0e 15027 44a65a __Getctype 14 API calls 15026->15027 15028 44aa17 15027->15028 15030 44b01a __freea 14 API calls 15028->15030 15031 44aa20 15030->15031 15033 44b7f4 std::locale::_Setgloballocale 6 API calls 15031->15033 15037 44a916 15031->15037 15032->15026 15032->15032 15032->15037 15041 441250 RtlEnterCriticalSection 15032->15041 15042 441264 RtlLeaveCriticalSection 15032->15042 15034 44aa3f 15033->15034 15043 441250 RtlEnterCriticalSection 15034->15043 15038 44a94f 15037->15038 15044 444293 RtlLeaveCriticalSection 15038->15044 15040 4397ac 15040->15008 15040->15009 15041->15032 15042->15032 15043->15037 15044->15040 15045->15023 15060 43ce79 15046->15060 15048 43d6ff 15054 43d723 15048->15054 15067 43e1d0 15048->15067 15049 43d6b7 15049->15048 15050 43d6cc 15049->15050 15059 43d6e7 std::_Locinfo::_Locinfo_dtor 15049->15059 15052 438be3 ___std_exception_copy 40 API calls 15050->15052 15052->15059 15056 43d747 15054->15056 15074 43ce94 15054->15074 15055 43d7cf 15057 43ce22 40 API calls 15055->15057 15056->15055 15081 43ce22 15056->15081 15057->15059 15059->14144 15061 43ce91 15060->15061 15062 43ce7e 15060->15062 15061->15049 15063 4416ff __floor_pentium4 14 API calls 15062->15063 15064 43ce83 15063->15064 15065 438c60 ___std_exception_copy 40 API calls 15064->15065 15066 43ce8e 15065->15066 15066->15049 15068 438a47 ___std_exception_copy 40 API calls 15067->15068 15069 43e1e0 15068->15069 15087 44a15a 15069->15087 15075 43cea0 15074->15075 15076 43ceb6 15074->15076 15077 44454e __Getctype 40 API calls 15075->15077 15078 43cec6 15076->15078 15231 449a39 15076->15231 15079 43ceab std::_Locinfo::_Locinfo_dtor 15077->15079 15078->15054 15079->15054 15082 43ce33 15081->15082 15083 43ce47 15081->15083 15082->15083 15084 4416ff __floor_pentium4 14 API calls 15082->15084 15083->15055 15085 43ce3c 15084->15085 15086 438c60 ___std_exception_copy 40 API calls 15085->15086 15086->15083 15088 44a171 15087->15088 15089 43e1fd 15087->15089 15088->15089 15090 452392 __Getctype 40 API calls 15088->15090 15091 44a1b8 15089->15091 15090->15089 15092 43e20a 15091->15092 15093 44a1cf 15091->15093 15092->15054 15093->15092 15095 4506bd 15093->15095 15096 449e42 __Getctype 40 API calls 15095->15096 15097 4506c2 15096->15097 15100 4505d5 15097->15100 15099 4506cd 15099->15092 15101 4505e1 std::_Locinfo::_Locinfo_dtor 15100->15101 15108 4505fb 15101->15108 15115 44424b RtlEnterCriticalSection 15101->15115 15103 45060b 15111 44b01a __freea 14 API calls 15103->15111 15113 450637 15103->15113 15104 450602 15104->15099 15105 4441c6 __Getctype 40 API calls 15107 450674 15105->15107 15109 4506b0 15107->15109 15119 449efd 15107->15119 15108->15104 15108->15105 15109->15099 15111->15113 15116 450654 15113->15116 15115->15103 15167 444293 RtlLeaveCriticalSection 15116->15167 15118 45065b 15118->15108 15120 449f0e 15119->15120 15121 449f08 15119->15121 15122 44b69b __Getctype 6 API calls 15120->15122 15125 449f14 15120->15125 15123 44b65c __Getctype 6 API calls 15121->15123 15124 449f28 15122->15124 15123->15120 15124->15125 15127 44a65a __Getctype 14 API calls 15124->15127 15126 449f19 15125->15126 15128 4441c6 __Getctype 40 API calls 15125->15128 15144 450480 15126->15144 15129 449f38 15127->15129 15130 449f92 15128->15130 15131 449f55 15129->15131 15132 449f40 15129->15132 15133 44b69b __Getctype 6 API calls 15131->15133 15134 44b69b __Getctype 6 API calls 15132->15134 15135 449f61 15133->15135 15136 449f4c 15134->15136 15137 449f74 15135->15137 15138 449f65 15135->15138 15141 44b01a __freea 14 API calls 15136->15141 15140 449c70 __Getctype 14 API calls 15137->15140 15139 44b69b __Getctype 6 API calls 15138->15139 15139->15136 15142 449f7f 15140->15142 15141->15125 15143 44b01a __freea 14 API calls 15142->15143 15143->15126 15145 4505d5 std::_Locinfo::_Locinfo_dtor 50 API calls 15144->15145 15146 4504aa 15145->15146 15168 450207 15146->15168 15151 4504dc 15153 44b01a __freea 14 API calls 15151->15153 15152 4504ea 15182 4506d0 15152->15182 15155 4504c3 15153->15155 15155->15109 15157 450522 15158 4416ff __floor_pentium4 14 API calls 15157->15158 15159 450527 15158->15159 15161 44b01a __freea 14 API calls 15159->15161 15160 450569 15163 4505b2 15160->15163 15193 4500f9 15160->15193 15161->15155 15162 45053d std::_Locinfo::_Locinfo_dtor 15162->15160 15165 44b01a __freea 14 API calls 15162->15165 15164 44b01a __freea 14 API calls 15163->15164 15164->15155 15165->15160 15167->15118 15201 4395ae 15168->15201 15171 450228 GetOEMCP 15173 450251 15171->15173 15172 45023a 15172->15173 15174 45023f GetACP 15172->15174 15173->15155 15175 44b094 15173->15175 15174->15173 15176 44b0d2 15175->15176 15180 44b0a2 __Getctype 15175->15180 15178 4416ff __floor_pentium4 14 API calls 15176->15178 15177 44b0bd RtlAllocateHeap 15179 44b0d0 15177->15179 15177->15180 15178->15179 15179->15151 15179->15152 15180->15176 15180->15177 15181 445a89 std::_Facet_Register 2 API calls 15180->15181 15181->15180 15183 450207 std::_Locinfo::_Locinfo_dtor 48 API calls 15182->15183 15184 4506f0 15183->15184 15185 4507f5 std::_Locinfo::_Locinfo_dtor 15184->15185 15186 45072d IsValidCodePage 15184->15186 15191 450748 std::_Locinfo::_Locinfo_dtor std::locale::_Setgloballocale 15184->15191 15187 433d77 _ValidateLocalCookies 5 API calls 15185->15187 15186->15185 15189 45073f 15186->15189 15188 450517 15187->15188 15188->15157 15188->15162 15190 450768 GetCPInfo 15189->15190 15189->15191 15190->15185 15190->15191 15209 4502db 15191->15209 15194 450105 std::_Locinfo::_Locinfo_dtor 15193->15194 15220 44424b RtlEnterCriticalSection 15194->15220 15196 45010f 15221 450146 15196->15221 15202 4395cc 15201->15202 15208 4395c5 15201->15208 15203 449e42 __Getctype 40 API calls 15202->15203 15202->15208 15204 4395ed 15203->15204 15205 44a12d __Getctype 40 API calls 15204->15205 15206 439603 15205->15206 15207 44a18b std::_Locinfo::_Locinfo_dtor 50 API calls 15206->15207 15207->15208 15208->15171 15208->15172 15210 450303 GetCPInfo 15209->15210 15211 4503cc 15209->15211 15210->15211 15217 45031b 15210->15217 15213 433d77 _ValidateLocalCookies 5 API calls 15211->15213 15212 44f44d std::_Locinfo::_Locinfo_dtor 49 API calls 15214 450383 15212->15214 15215 45047e 15213->15215 15216 44a8a6 std::_Locinfo::_Locinfo_dtor 49 API calls 15214->15216 15215->15185 15218 4503a4 15216->15218 15217->15212 15219 44a8a6 std::_Locinfo::_Locinfo_dtor 49 API calls 15218->15219 15219->15211 15220->15196 15222 43ceeb std::_Locinfo::_Locinfo_dtor 40 API calls 15221->15222 15223 450168 15222->15223 15224 43ceeb std::_Locinfo::_Locinfo_dtor 40 API calls 15223->15224 15226 450187 15224->15226 15225 45011c 15228 45013a 15225->15228 15226->15225 15227 44b01a __freea 14 API calls 15226->15227 15227->15225 15229 444293 std::_Lockit::~_Lockit RtlLeaveCriticalSection 15228->15229 15230 450128 15229->15230 15230->15163 15232 4395ae std::_Locinfo::_Locinfo_dtor 50 API calls 15231->15232 15233 449a56 15232->15233 15237 449a66 15233->15237 15238 44f44d 15233->15238 15235 433d77 _ValidateLocalCookies 5 API calls 15236 449b02 15235->15236 15236->15078 15237->15235 15239 4395ae std::_Locinfo::_Locinfo_dtor 49 API calls 15238->15239 15240 44f46d 15239->15240 15253 44b17a 15240->15253 15242 44f529 15245 433d77 _ValidateLocalCookies 5 API calls 15242->15245 15243 44f521 15256 433275 15243->15256 15244 44f49a 15244->15242 15244->15243 15247 44b094 std::_Locinfo::_Locinfo_dtor 15 API calls 15244->15247 15249 44f4bf std::_Locinfo::_Locinfo_dtor std::locale::_Setgloballocale 15244->15249 15248 44f54c 15245->15248 15247->15249 15248->15237 15249->15243 15250 44b17a std::_Locinfo::_Locinfo_dtor MultiByteToWideChar 15249->15250 15251 44f508 15250->15251 15251->15243 15252 44f50f GetStringTypeW 15251->15252 15252->15243 15260 44b0e2 15253->15260 15257 43327f 15256->15257 15259 433290 15256->15259 15258 441c96 __freea 14 API calls 15257->15258 15257->15259 15258->15259 15259->15242 15261 44b0f3 MultiByteToWideChar 15260->15261 15261->15244 15263 41ab55 15262->15263 15265 41aba3 15263->15265 15271 41e8a0 15263->15271 15266 41ab83 15266->14155 15268 403459 15267->15268 15275 440dd7 15268->15275 15272 41e8f8 std::_Locinfo::_Locinfo_ctor 15271->15272 15273 41e8ce 15271->15273 15272->15266 15274 4032d0 std::_Throw_Cpp_error 42 API calls 15273->15274 15274->15272 15276 440deb ___std_exception_copy 15275->15276 15281 43e565 15276->15281 15279 43899c ___std_exception_copy 40 API calls 15280 403467 WriteProcessMemory WriteProcessMemory CreateRemoteThread WaitForSingleObject 15279->15280 15280->14161 15280->14162 15282 43e591 15281->15282 15283 43e5b4 15281->15283 15284 438be3 ___std_exception_copy 40 API calls 15282->15284 15283->15282 15286 43e5bc 15283->15286 15285 43e5a9 15284->15285 15287 433d77 _ValidateLocalCookies 5 API calls 15285->15287 15292 43faa7 15286->15292 15288 43e6d7 15287->15288 15288->15279 15310 440b0d 15292->15310 15295 43facc 15297 438be3 ___std_exception_copy 40 API calls 15295->15297 15296 43e63d 15307 43f28d 15296->15307 15297->15296 15300 43e1d0 std::_Locinfo::_Locinfo_dtor 50 API calls 15302 43faf4 std::_Locinfo::_Locinfo_dtor 15300->15302 15302->15296 15302->15300 15303 43fbd0 15302->15303 15314 43f49b 15302->15314 15317 43fed4 15302->15317 15351 44036f 15302->15351 15304 438be3 ___std_exception_copy 40 API calls 15303->15304 15305 43fbea 15304->15305 15306 438be3 ___std_exception_copy 40 API calls 15305->15306 15306->15296 15308 44b01a __freea 14 API calls 15307->15308 15309 43f29d 15308->15309 15309->15285 15311 43fac1 15310->15311 15312 440b18 15310->15312 15311->15295 15311->15296 15311->15302 15313 438be3 ___std_exception_copy 40 API calls 15312->15313 15313->15311 15380 43e842 15314->15380 15316 43f4d6 15316->15302 15318 43fef2 15317->15318 15319 43fedb 15317->15319 15320 438be3 ___std_exception_copy 40 API calls 15318->15320 15332 43ff31 15318->15332 15321 4403f4 15319->15321 15322 440394 15319->15322 15319->15332 15325 43ff26 15320->15325 15323 44042d 15321->15323 15324 4403f9 15321->15324 15326 44041a 15322->15326 15327 44039a 15322->15327 15328 440432 15323->15328 15329 44044a 15323->15329 15330 440426 15324->15330 15331 4403fb 15324->15331 15325->15302 15415 43ebfc 15326->15415 15339 4403eb 15327->15339 15340 44039f 15327->15340 15328->15326 15334 4403c5 15328->15334 15328->15339 15426 440a4d 15329->15426 15422 440a30 15330->15422 15333 4403ae 15331->15333 15342 44040a 15331->15342 15332->15302 15350 440453 15333->15350 15390 440785 15333->15390 15334->15350 15429 44c5ba 15334->15429 15339->15350 15404 43ed89 15339->15404 15340->15333 15340->15334 15343 4403d8 15340->15343 15342->15326 15344 44040e 15342->15344 15343->15350 15400 440916 15343->15400 15344->15350 15411 4409ab 15344->15411 15346 433d77 _ValidateLocalCookies 5 API calls 15348 4406cc 15346->15348 15348->15302 15350->15346 15352 4403f4 15351->15352 15353 440394 15351->15353 15354 44042d 15352->15354 15355 4403f9 15352->15355 15356 44041a 15353->15356 15357 44039a 15353->15357 15358 440432 15354->15358 15359 44044a 15354->15359 15360 440426 15355->15360 15361 4403fb 15355->15361 15365 43ebfc 41 API calls 15356->15365 15367 4403eb 15357->15367 15368 44039f 15357->15368 15358->15356 15358->15367 15378 4403c5 15358->15378 15364 440a4d 41 API calls 15359->15364 15362 440a30 41 API calls 15360->15362 15363 4403ae 15361->15363 15370 44040a 15361->15370 15362->15378 15366 440785 52 API calls 15363->15366 15379 440453 15363->15379 15364->15378 15365->15378 15366->15378 15369 43ed89 41 API calls 15367->15369 15367->15379 15368->15363 15371 4403d8 15368->15371 15368->15378 15369->15378 15370->15356 15372 44040e 15370->15372 15373 440916 51 API calls 15371->15373 15371->15379 15375 4409ab 40 API calls 15372->15375 15372->15379 15373->15378 15374 433d77 _ValidateLocalCookies 5 API calls 15376 4406cc 15374->15376 15375->15378 15376->15302 15377 44c5ba 51 API calls 15377->15378 15378->15377 15378->15379 15379->15374 15381 43ce79 std::_Locinfo::_Locinfo_dtor 40 API calls 15380->15381 15382 43e854 15381->15382 15383 43e869 15382->15383 15386 43e89c 15382->15386 15389 43e884 std::_Locinfo::_Locinfo_dtor 15382->15389 15384 438be3 ___std_exception_copy 40 API calls 15383->15384 15384->15389 15385 43e933 15387 43ce22 40 API calls 15385->15387 15386->15385 15388 43ce22 40 API calls 15386->15388 15387->15389 15388->15385 15389->15316 15391 44079f 15390->15391 15439 43e790 15391->15439 15393 4407de 15450 44c439 15393->15450 15396 440895 15398 43e1d0 std::_Locinfo::_Locinfo_dtor 50 API calls 15396->15398 15399 4408c8 15396->15399 15397 43e1d0 std::_Locinfo::_Locinfo_dtor 50 API calls 15397->15396 15398->15399 15399->15334 15399->15399 15402 440931 15400->15402 15401 440967 15401->15334 15402->15401 15403 44c5ba 51 API calls 15402->15403 15403->15401 15405 43ed9e 15404->15405 15406 43edc0 15405->15406 15408 43ede7 15405->15408 15407 438be3 ___std_exception_copy 40 API calls 15406->15407 15409 43eddd 15407->15409 15408->15409 15410 43e790 15 API calls 15408->15410 15409->15334 15410->15409 15414 4409c1 15411->15414 15412 438be3 ___std_exception_copy 40 API calls 15413 4409e2 15412->15413 15413->15334 15414->15412 15414->15413 15416 43ec11 15415->15416 15417 43ec33 15416->15417 15419 43ec5a 15416->15419 15418 438be3 ___std_exception_copy 40 API calls 15417->15418 15421 43ec50 15418->15421 15420 43e790 15 API calls 15419->15420 15419->15421 15420->15421 15421->15334 15423 440a3c 15422->15423 15514 43ea6f 15423->15514 15425 440a4c 15425->15334 15427 43ed89 41 API calls 15426->15427 15428 440a62 15427->15428 15428->15334 15431 44c5cf 15429->15431 15430 44c610 15432 44c5d3 std::_Locinfo::_Locinfo_dtor std::locale::_Setgloballocale 15430->15432 15435 44c5fc std::locale::_Setgloballocale 15430->15435 15521 44ec55 15430->15521 15431->15430 15431->15432 15434 43e1d0 std::_Locinfo::_Locinfo_dtor 50 API calls 15431->15434 15431->15435 15432->15334 15433 438be3 ___std_exception_copy 40 API calls 15433->15432 15434->15430 15435->15432 15435->15433 15437 44c6cb 15437->15432 15438 44c6e1 GetLastError 15437->15438 15438->15432 15438->15435 15440 43e7b7 15439->15440 15447 43e7a5 15439->15447 15441 44b094 std::_Locinfo::_Locinfo_dtor 15 API calls 15440->15441 15440->15447 15442 43e7db 15441->15442 15443 43e7e3 15442->15443 15444 43e7ee 15442->15444 15445 44b01a __freea 14 API calls 15443->15445 15469 43f2a7 15444->15469 15445->15447 15447->15393 15449 44b01a __freea 14 API calls 15449->15447 15451 44c46e 15450->15451 15453 44c44a 15450->15453 15451->15453 15454 44c4a1 15451->15454 15452 438be3 ___std_exception_copy 40 API calls 15463 440871 15452->15463 15453->15452 15455 44c509 15454->15455 15457 44c4da 15454->15457 15456 44c537 15455->15456 15458 44c532 15455->15458 15480 44bb66 15456->15480 15472 44c2dd 15457->15472 15461 44c55f 15458->15461 15462 44c599 15458->15462 15464 44c564 15461->15464 15465 44c57f 15461->15465 15507 44be93 15462->15507 15463->15396 15463->15397 15490 44c20e 15464->15490 15500 44c08a 15465->15500 15470 44b01a __freea 14 API calls 15469->15470 15471 43e7f9 15470->15471 15471->15449 15473 44c2f3 15472->15473 15474 44c2fe 15472->15474 15473->15463 15475 4499a5 ___std_exception_copy 40 API calls 15474->15475 15476 44c359 15475->15476 15477 44c363 15476->15477 15478 438c8d __Getctype 11 API calls 15476->15478 15477->15463 15479 44c371 15478->15479 15481 44bb79 15480->15481 15482 44bb88 15481->15482 15483 44bbaa 15481->15483 15484 438be3 ___std_exception_copy 40 API calls 15482->15484 15485 44bbbf 15483->15485 15487 44bc12 15483->15487 15489 44bba0 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z std::locale::_Setgloballocale __allrem _strrchr 15484->15489 15486 44be93 52 API calls 15485->15486 15486->15489 15488 43e1d0 std::_Locinfo::_Locinfo_dtor 50 API calls 15487->15488 15487->15489 15488->15489 15489->15463 15491 4547bf 42 API calls 15490->15491 15492 44c23e 15491->15492 15493 4546c5 40 API calls 15492->15493 15494 44c27c 15493->15494 15495 44c2bc 15494->15495 15496 44c295 15494->15496 15498 44c283 15494->15498 15497 44bf37 50 API calls 15495->15497 15499 44c120 50 API calls 15496->15499 15497->15498 15498->15463 15499->15498 15501 4547bf 42 API calls 15500->15501 15502 44c0b9 15501->15502 15503 4546c5 40 API calls 15502->15503 15504 44c0fa 15503->15504 15505 44c101 15504->15505 15506 44c120 50 API calls 15504->15506 15505->15463 15506->15505 15508 4547bf 42 API calls 15507->15508 15509 44bebd 15508->15509 15510 4546c5 40 API calls 15509->15510 15511 44bf0b 15510->15511 15512 44bf12 15511->15512 15513 44bf37 50 API calls 15511->15513 15512->15463 15513->15512 15515 43ea84 15514->15515 15516 43eacd 15515->15516 15517 43eaa6 15515->15517 15519 43e790 15 API calls 15516->15519 15520 43eac3 15516->15520 15518 438be3 ___std_exception_copy 40 API calls 15517->15518 15518->15520 15519->15520 15520->15425 15523 44ec68 std::_Locinfo::_Locinfo_dtor 15521->15523 15522 44eca6 WideCharToMultiByte 15522->15437 15523->15522 15525 441440 15524->15525 15526 441418 15524->15526 15525->14171 15526->15525 15527 441425 15526->15527 15528 441447 15526->15528 15529 438be3 ___std_exception_copy 40 API calls 15527->15529 15532 441363 15528->15532 15529->15525 15533 44136f std::_Locinfo::_Locinfo_dtor 15532->15533 15540 441250 RtlEnterCriticalSection 15533->15540 15535 44137d 15541 4413be 15535->15541 15540->15535 15551 44c8aa 15541->15551 15548 4413b2 15693 441264 RtlLeaveCriticalSection 15548->15693 15550 44139b 15550->14171 15571 44c86c 15551->15571 15553 4413d6 15558 441481 15553->15558 15554 44c8bb 15554->15553 15555 44b094 std::_Locinfo::_Locinfo_dtor 15 API calls 15554->15555 15556 44c914 15555->15556 15557 44b01a __freea 14 API calls 15556->15557 15557->15553 15561 441493 15558->15561 15562 4413f4 15558->15562 15559 4414a1 15560 438be3 ___std_exception_copy 40 API calls 15559->15560 15560->15562 15561->15559 15561->15562 15565 4414d7 std::_Locinfo::_Locinfo_ctor 15561->15565 15567 44c955 15562->15567 15564 44a1e9 40 API calls 15564->15565 15565->15562 15565->15564 15587 439a91 15565->15587 15593 449678 15565->15593 15568 44c960 15567->15568 15569 44138a 15567->15569 15568->15569 15570 439a91 73 API calls 15568->15570 15569->15548 15570->15569 15573 44c878 15571->15573 15572 44c8a2 15572->15554 15573->15572 15574 44a1e9 40 API calls 15573->15574 15575 44c893 15574->15575 15578 453be3 15575->15578 15577 44c899 15577->15554 15579 453bf0 15578->15579 15580 453bfd 15578->15580 15581 4416ff __floor_pentium4 14 API calls 15579->15581 15583 453c09 15580->15583 15584 4416ff __floor_pentium4 14 API calls 15580->15584 15582 453bf5 15581->15582 15582->15577 15583->15577 15585 453c2a 15584->15585 15586 438c60 ___std_exception_copy 40 API calls 15585->15586 15586->15582 15588 439ad1 15587->15588 15589 439aaa 15587->15589 15588->15565 15589->15588 15590 44a1e9 40 API calls 15589->15590 15591 439ac6 15590->15591 15592 449678 73 API calls 15591->15592 15592->15588 15594 449684 std::_Locinfo::_Locinfo_dtor 15593->15594 15595 4496c5 15594->15595 15597 44970b 15594->15597 15603 44968c 15594->15603 15596 438be3 ___std_exception_copy 40 API calls 15595->15596 15596->15603 15604 44e6c4 RtlEnterCriticalSection 15597->15604 15599 449711 15600 44972f 15599->15600 15605 449789 15599->15605 15633 449781 15600->15633 15603->15565 15604->15599 15606 4497b1 15605->15606 15632 4497d4 15605->15632 15607 4497b5 15606->15607 15609 449810 15606->15609 15608 438be3 ___std_exception_copy 40 API calls 15607->15608 15608->15632 15610 44982e 15609->15610 15643 44263d 15609->15643 15636 4492ce 15610->15636 15614 449846 15618 449875 15614->15618 15623 44984e 15614->15623 15615 44988d 15616 4498f6 WriteFile 15615->15616 15617 4498a1 15615->15617 15619 449918 GetLastError 15616->15619 15616->15632 15621 4498e2 15617->15621 15622 4498a9 15617->15622 15651 448e9f GetConsoleOutputCP 15618->15651 15619->15632 15679 44934b 15621->15679 15624 4498ce 15622->15624 15625 4498ae 15622->15625 15623->15632 15646 449266 15623->15646 15671 44950f 15624->15671 15628 4498b7 15625->15628 15625->15632 15664 449426 15628->15664 15630 449888 15630->15632 15632->15600 15692 44e779 RtlLeaveCriticalSection 15633->15692 15635 449787 15635->15603 15637 453be3 40 API calls 15636->15637 15639 4492e0 15637->15639 15638 449344 15638->15614 15638->15615 15639->15638 15640 44930e 15639->15640 15641 43e1d0 std::_Locinfo::_Locinfo_dtor 50 API calls 15639->15641 15640->15638 15642 449328 GetConsoleMode 15640->15642 15641->15640 15642->15638 15686 44251c 15643->15686 15645 442656 15645->15610 15647 4492bd 15646->15647 15650 449288 15646->15650 15647->15632 15648 453db0 CreateFileW CloseHandle WriteConsoleW GetLastError WriteConsoleW 15648->15650 15649 4492bf GetLastError 15649->15647 15650->15647 15650->15648 15650->15649 15652 448f11 15651->15652 15660 448f18 std::_Locinfo::_Locinfo_ctor 15651->15660 15653 43e1d0 std::_Locinfo::_Locinfo_dtor 50 API calls 15652->15653 15653->15660 15654 433d77 _ValidateLocalCookies 5 API calls 15655 44925f 15654->15655 15655->15630 15656 44c724 50 API calls 15656->15660 15657 4491ce 15657->15654 15657->15657 15658 44ec55 std::_Locinfo::_Locinfo_dtor WideCharToMultiByte 15658->15660 15659 449147 WriteFile 15659->15660 15661 44923d GetLastError 15659->15661 15660->15656 15660->15657 15660->15658 15660->15659 15662 453ca8 5 API calls std::_Locinfo::_Locinfo_dtor 15660->15662 15663 449185 WriteFile 15660->15663 15661->15657 15662->15660 15663->15660 15663->15661 15667 449435 15664->15667 15665 4494f4 15666 433d77 _ValidateLocalCookies 5 API calls 15665->15666 15670 44950d 15666->15670 15667->15665 15668 4494aa WriteFile 15667->15668 15668->15667 15669 4494f6 GetLastError 15668->15669 15669->15665 15670->15632 15673 44951e 15671->15673 15672 433d77 _ValidateLocalCookies 5 API calls 15674 44963f 15672->15674 15675 44ec55 std::_Locinfo::_Locinfo_dtor WideCharToMultiByte 15673->15675 15676 449628 GetLastError 15673->15676 15677 4495dd WriteFile 15673->15677 15678 449626 15673->15678 15674->15630 15675->15673 15676->15678 15677->15673 15677->15676 15678->15672 15684 44935a 15679->15684 15680 44940b 15681 433d77 _ValidateLocalCookies 5 API calls 15680->15681 15682 449424 15681->15682 15682->15630 15683 4493ca WriteFile 15683->15684 15685 44940d GetLastError 15683->15685 15684->15680 15684->15683 15685->15680 15687 44e940 40 API calls 15686->15687 15688 44252e 15687->15688 15689 44254a SetFilePointerEx 15688->15689 15691 442536 15688->15691 15690 442562 GetLastError 15689->15690 15689->15691 15690->15691 15691->15645 15692->15635 15693->15550 15695 43cf8f std::_Locinfo::_Locinfo_dtor 15694->15695 15696 43cf99 15695->15696 15697 43cfbc 15695->15697 15698 438be3 ___std_exception_copy 40 API calls 15696->15698 15704 43cfb4 15697->15704 15705 441250 RtlEnterCriticalSection 15697->15705 15698->15704 15700 43cfda 15706 43d01a 15700->15706 15702 43cfe7 15720 43d012 15702->15720 15704->14177 15705->15700 15707 43d027 15706->15707 15708 43d04a 15706->15708 15709 438be3 ___std_exception_copy 40 API calls 15707->15709 15710 439a91 73 API calls 15708->15710 15719 43d042 15708->15719 15709->15719 15711 43d062 15710->15711 15723 44b054 15711->15723 15714 44a1e9 40 API calls 15715 43d076 15714->15715 15727 448d2c 15715->15727 15718 44b01a __freea 14 API calls 15718->15719 15719->15702 15785 441264 RtlLeaveCriticalSection 15720->15785 15722 43d018 15722->15704 15724 43d06a 15723->15724 15725 44b06b 15723->15725 15724->15714 15725->15724 15726 44b01a __freea 14 API calls 15725->15726 15726->15724 15728 448d55 15727->15728 15729 43d07d 15727->15729 15730 448da4 15728->15730 15732 448d7c 15728->15732 15729->15718 15729->15719 15731 438be3 ___std_exception_copy 40 API calls 15730->15731 15731->15729 15734 448c9b 15732->15734 15735 448ca7 std::_Locinfo::_Locinfo_dtor 15734->15735 15742 44e6c4 RtlEnterCriticalSection 15735->15742 15737 448cb5 15738 448ce6 15737->15738 15743 448dff 15737->15743 15756 448d20 15738->15756 15742->15737 15759 44e940 15743->15759 15745 448e15 15772 44e8af 15745->15772 15747 448e0f 15747->15745 15748 448e47 15747->15748 15750 44e940 40 API calls 15747->15750 15748->15745 15749 44e940 40 API calls 15748->15749 15751 448e53 FindCloseChangeNotification 15749->15751 15752 448e3e 15750->15752 15751->15745 15753 448e5f GetLastError 15751->15753 15754 44e940 40 API calls 15752->15754 15753->15745 15754->15748 15755 448e6d 15755->15738 15784 44e779 RtlLeaveCriticalSection 15756->15784 15758 448d09 15758->15729 15760 44e94d 15759->15760 15762 44e962 15759->15762 15781 4416ec 15760->15781 15763 4416ec 14 API calls 15762->15763 15765 44e987 15762->15765 15766 44e992 15763->15766 15765->15747 15768 4416ff __floor_pentium4 14 API calls 15766->15768 15767 4416ff __floor_pentium4 14 API calls 15769 44e95a 15767->15769 15770 44e99a 15768->15770 15769->15747 15771 438c60 ___std_exception_copy 40 API calls 15770->15771 15771->15769 15773 44e925 15772->15773 15774 44e8be 15772->15774 15775 4416ff __floor_pentium4 14 API calls 15773->15775 15774->15773 15780 44e8e8 15774->15780 15776 44e92a 15775->15776 15777 4416ec 14 API calls 15776->15777 15778 44e915 15777->15778 15778->15755 15779 44e90f SetStdHandle 15779->15778 15780->15778 15780->15779 15782 449f93 std::locale::_Setgloballocale 14 API calls 15781->15782 15783 4416f1 15782->15783 15783->15767 15784->15758 15785->15722 15787 418034 15786->15787 15788 417f1d 15786->15788 15794 402cf0 std::_Throw_Cpp_error 42 API calls 15787->15794 15800 417f29 15787->15800 15789 417fcb 15788->15789 15790 417f83 15788->15790 15791 417f24 15788->15791 15792 417f2b 15788->15792 15793 417f7c 15788->15793 15789->14191 15796 433672 std::_Facet_Register 42 API calls 15790->15796 15878 41c3a0 15791->15878 15798 433672 std::_Facet_Register 42 API calls 15792->15798 15883 41cf80 15793->15883 15799 41804f 15794->15799 15796->15800 15798->15800 15888 407f90 15799->15888 15800->14191 15802 418062 15803 4351fb std::_Throw_Cpp_error RaiseException 15802->15803 15804 418073 15803->15804 15807 42215f 15805->15807 15956 44133b 15807->15956 15810 41b4f0 15811 41db10 15810->15811 15812 41db56 15811->15812 15813 41de3d 15811->15813 16008 41ebb0 15812->16008 15815 41fd70 42 API calls 15813->15815 15817 41de87 15815->15817 15816 41dba4 15819 41fd70 42 API calls 15816->15819 15818 41eda0 55 API calls 15817->15818 15872 41df5e std::ios_base::_Ios_base_dtor 15817->15872 15820 41dee2 15818->15820 15821 41dbc1 15819->15821 15824 4075c0 42 API calls 15820->15824 15874 41dcc3 std::ios_base::_Ios_base_dtor 15821->15874 16014 41eda0 15821->16014 15822 417ef0 42 API calls 15827 41dfc7 15822->15827 15823 41de38 std::ios_base::_Ios_base_dtor 15823->14195 15828 41df06 15824->15828 15825 41dd82 15835 417ef0 42 API calls 15825->15835 15844 41dd9f 15825->15844 15826 41dcec 15831 417ef0 42 API calls 15826->15831 15827->15823 15832 438c70 std::_Throw_Cpp_error 40 API calls 15827->15832 15833 41f440 55 API calls 15828->15833 15830 41dc1c 16067 4075c0 15830->16067 15850 41dd01 15831->15850 15836 41e06f 15832->15836 15837 41df1f 15833->15837 15835->15844 16128 4190b0 15836->16128 15840 41e093 15837->15840 15841 402df0 std::_Throw_Cpp_error 42 API calls 15837->15841 15843 4190b0 41 API calls 15840->15843 15847 41df40 15841->15847 15849 41e0a1 15843->15849 15851 4135b0 40 API calls 15844->15851 15846 4351fb std::_Throw_Cpp_error RaiseException 15852 41e08e 15846->15852 15853 407a20 14 API calls 15847->15853 15848 41dc56 15848->15836 15854 41dc6b 15848->15854 15855 4351fb std::_Throw_Cpp_error RaiseException 15849->15855 16123 4135b0 15850->16123 15868 41dd6c 15851->15868 15856 438c70 std::_Throw_Cpp_error 40 API calls 15852->15856 15857 41df4f 15853->15857 15858 402df0 std::_Throw_Cpp_error 42 API calls 15854->15858 15859 41e0b2 15855->15859 15856->15840 15860 402df0 std::_Throw_Cpp_error 42 API calls 15857->15860 15861 41dc77 15858->15861 15862 438c70 std::_Throw_Cpp_error 40 API calls 15859->15862 15860->15872 15867 41e0b7 15862->15867 15864 4135b0 40 API calls 15865 41de26 15864->15865 15869 4135b0 40 API calls 15865->15869 15868->15864 15869->15823 15872->15822 15872->15827 15872->15859 15874->15825 15874->15826 15876 402df0 std::_Throw_Cpp_error 42 API calls 15875->15876 15877 41d4cb 15876->15877 15877->14197 15879 433672 std::_Facet_Register 42 API calls 15878->15879 15880 41c3c3 15879->15880 15881 433672 std::_Facet_Register 42 API calls 15880->15881 15882 41c3ec 15881->15882 15882->15800 15884 433672 std::_Facet_Register 42 API calls 15883->15884 15885 41cfb7 15884->15885 15886 403040 std::_Throw_Cpp_error 42 API calls 15885->15886 15887 41cfee 15886->15887 15887->15800 15903 407350 15888->15903 15890 408029 15928 41ad80 15890->15928 15893 402df0 std::_Throw_Cpp_error 42 API calls 15894 40804c 15893->15894 15895 408076 std::ios_base::_Ios_base_dtor 15894->15895 15898 4080df 15894->15898 15932 4072b0 15895->15932 15900 438c70 std::_Throw_Cpp_error 40 API calls 15898->15900 15899 402df0 std::_Throw_Cpp_error 42 API calls 15901 4080cb 15899->15901 15902 4080e4 15900->15902 15901->15802 15902->15802 15935 404d70 15903->15935 15912 418f00 std::_Throw_Cpp_error 42 API calls 15913 4073e6 15912->15913 15914 402df0 std::_Throw_Cpp_error 42 API calls 15913->15914 15915 40744c 15914->15915 15916 407476 std::ios_base::_Ios_base_dtor 15915->15916 15918 4074bf 15915->15918 15917 402df0 std::_Throw_Cpp_error 42 API calls 15916->15917 15919 40749e 15917->15919 15921 438c70 std::_Throw_Cpp_error 40 API calls 15918->15921 15920 402df0 std::_Throw_Cpp_error 42 API calls 15919->15920 15923 4074aa 15920->15923 15922 4074c4 15921->15922 15924 434b78 ___std_exception_destroy 14 API calls 15922->15924 15923->15890 15925 407511 15924->15925 15926 434b78 ___std_exception_destroy 14 API calls 15925->15926 15927 407527 std::ios_base::_Ios_base_dtor 15926->15927 15927->15890 15929 41adb4 15928->15929 15930 418f00 std::_Throw_Cpp_error 42 API calls 15929->15930 15931 40803d 15930->15931 15931->15893 15933 434b15 ___std_exception_copy 41 API calls 15932->15933 15934 40731a 15933->15934 15934->15899 15937 404da6 15935->15937 15936 404dd8 15939 41ac50 15936->15939 15937->15936 15938 403040 std::_Throw_Cpp_error 42 API calls 15937->15938 15938->15936 15941 41ac81 15939->15941 15940 41acd3 15941->15940 15942 41e8a0 42 API calls 15941->15942 15943 4073af 15942->15943 15944 41abb0 15943->15944 15945 41abe1 15944->15945 15945->15945 15946 418f00 std::_Throw_Cpp_error 42 API calls 15945->15946 15947 4073c2 15946->15947 15948 41ae20 15947->15948 15951 41e710 15948->15951 15950 4073d1 15950->15912 15952 41e753 15951->15952 15953 41e758 std::_Locinfo::_Locinfo_ctor 15952->15953 15954 4032d0 std::_Throw_Cpp_error 42 API calls 15952->15954 15953->15950 15955 41e843 std::_Locinfo::_Locinfo_ctor 15954->15955 15955->15950 15957 449e42 __Getctype 40 API calls 15956->15957 15958 441346 15957->15958 15959 44a12d __Getctype 40 API calls 15958->15959 15960 42225f 15959->15960 15961 41fd70 15960->15961 15964 41fd84 15961->15964 15968 41fde4 15961->15968 15963 41ff6c 15963->15810 15969 41fdc2 15964->15969 15975 429e20 15964->15975 15967 41fecc 15967->15963 15974 429e20 42 API calls 15967->15974 16001 4208f0 15967->16001 15972 41fe74 15968->15972 15997 4201e0 15968->15997 15969->15968 15970 41fe58 15969->15970 15971 429e20 42 API calls 15969->15971 15970->15972 15993 421430 15970->15993 15971->15970 15972->15810 15974->15967 15976 429e62 15975->15976 15977 429f76 15975->15977 15978 429e7c 15976->15978 15980 429eca 15976->15980 15981 429eba 15976->15981 15979 403330 42 API calls 15977->15979 15983 433672 std::_Facet_Register 42 API calls 15978->15983 15982 429f7b 15979->15982 15986 433672 std::_Facet_Register 42 API calls 15980->15986 15990 429e9a std::_Locinfo::_Locinfo_ctor 15980->15990 15981->15978 15981->15982 15984 402b50 Concurrency::cancel_current_task 42 API calls 15982->15984 15985 429e8f 15983->15985 15987 429f80 15984->15987 15985->15987 15985->15990 15986->15990 15988 438c70 std::_Throw_Cpp_error 40 API calls 15987->15988 15989 429f85 15988->15989 15991 4277d0 40 API calls 15990->15991 15992 429f47 15991->15992 15992->15969 15994 421443 15993->15994 15995 421471 15994->15995 15996 429e20 42 API calls 15994->15996 15995->15968 15996->15995 15998 4201f0 15997->15998 15999 429e20 42 API calls 15998->15999 16000 420260 15998->16000 15999->15998 16000->15967 16002 421430 42 API calls 16001->16002 16005 4208fc 16002->16005 16003 42090a 16003->15967 16004 429e20 42 API calls 16007 420995 16004->16007 16005->16003 16006 429e20 42 API calls 16005->16006 16005->16007 16006->16005 16007->16003 16007->16004 16009 41ec6d 16008->16009 16010 417ef0 42 API calls 16009->16010 16011 41ec8d 16010->16011 16131 4216c0 16011->16131 16013 41ecdf 16013->15816 16015 41ee46 16014->16015 16016 41ef4d 16014->16016 16017 41f425 16015->16017 16020 41e8a0 42 API calls 16015->16020 16018 418f00 std::_Throw_Cpp_error 42 API calls 16016->16018 16024 438c70 std::_Throw_Cpp_error 40 API calls 16017->16024 16019 41ef5b 16018->16019 16021 41ef6a 16019->16021 16030 41f191 16019->16030 16022 41ee79 16020->16022 16023 41f440 55 API calls 16021->16023 16026 418f00 std::_Throw_Cpp_error 42 API calls 16022->16026 16027 41ef79 16023->16027 16025 41f42f 16024->16025 16028 438c70 std::_Throw_Cpp_error 40 API calls 16025->16028 16029 41ee93 16026->16029 16036 403040 std::_Throw_Cpp_error 42 API calls 16027->16036 16031 41f434 16028->16031 16032 418f00 std::_Throw_Cpp_error 42 API calls 16029->16032 16030->16030 16033 403040 std::_Throw_Cpp_error 42 API calls 16030->16033 16034 438c70 std::_Throw_Cpp_error 40 API calls 16031->16034 16035 41eee3 16032->16035 16037 41f1c9 16033->16037 16066 41f375 std::ios_base::_Ios_base_dtor 16034->16066 16035->16017 16038 41ef1f std::ios_base::_Ios_base_dtor 16035->16038 16039 41efba 16036->16039 16040 41fbf0 42 API calls 16037->16040 16041 402df0 std::_Throw_Cpp_error 42 API calls 16038->16041 16043 418f00 std::_Throw_Cpp_error 42 API calls 16039->16043 16044 41f1e0 16040->16044 16041->16016 16042 438c70 std::_Throw_Cpp_error 40 API calls 16045 41f43e 16042->16045 16046 41efcd 16043->16046 16048 418f00 std::_Throw_Cpp_error 42 API calls 16044->16048 16047 41e710 42 API calls 16046->16047 16049 41f019 16047->16049 16053 41f22f std::ios_base::_Ios_base_dtor 16048->16053 16050 418f00 std::_Throw_Cpp_error 42 API calls 16049->16050 16051 41f032 16050->16051 16052 418f00 std::_Throw_Cpp_error 42 API calls 16051->16052 16056 41f081 std::ios_base::_Ios_base_dtor 16052->16056 16053->16031 16057 41f18c std::ios_base::_Ios_base_dtor 16053->16057 16054 41f3f2 std::ios_base::_Ios_base_dtor 16054->15830 16055 402df0 std::_Throw_Cpp_error 42 API calls 16060 41f0e3 std::ios_base::_Ios_base_dtor 16055->16060 16056->16025 16056->16055 16057->16054 16059 403040 std::_Throw_Cpp_error 42 API calls 16057->16059 16058 41f161 std::ios_base::_Ios_base_dtor 16061 402df0 std::_Throw_Cpp_error 42 API calls 16058->16061 16062 41f30c 16059->16062 16060->16025 16060->16058 16061->16057 16063 41fbf0 42 API calls 16062->16063 16064 41f323 16063->16064 16065 418f00 std::_Throw_Cpp_error 42 API calls 16064->16065 16065->16066 16066->16042 16066->16054 16214 404e30 16067->16214 16070 404e30 42 API calls 16071 40762b 16070->16071 16072 41ace0 42 API calls 16071->16072 16073 407640 16072->16073 16074 41abb0 42 API calls 16073->16074 16075 407656 16074->16075 16076 41e710 42 API calls 16075->16076 16079 40766d std::ios_base::_Ios_base_dtor 16076->16079 16077 40770a std::ios_base::_Ios_base_dtor 16080 402df0 std::_Throw_Cpp_error 42 API calls 16077->16080 16078 407a09 16081 438c70 std::_Throw_Cpp_error 40 API calls 16078->16081 16079->16077 16079->16078 16082 40773b 16080->16082 16083 407a0e 16081->16083 16084 402df0 std::_Throw_Cpp_error 42 API calls 16082->16084 16085 438c70 std::_Throw_Cpp_error 40 API calls 16083->16085 16086 40774a 16084->16086 16087 407a13 16085->16087 16088 407350 42 API calls 16086->16088 16089 4077a4 16088->16089 16090 418f00 std::_Throw_Cpp_error 42 API calls 16089->16090 16091 4077b9 16090->16091 16092 41e710 42 API calls 16091->16092 16093 40780c 16092->16093 16094 418f00 std::_Throw_Cpp_error 42 API calls 16093->16094 16095 407828 16094->16095 16096 41ad80 42 API calls 16095->16096 16098 407879 std::ios_base::_Ios_base_dtor 16096->16098 16097 402df0 std::_Throw_Cpp_error 42 API calls 16100 4078e8 std::ios_base::_Ios_base_dtor 16097->16100 16098->16083 16098->16097 16099 402df0 std::_Throw_Cpp_error 42 API calls 16101 407947 16099->16101 16100->16083 16100->16099 16101->16083 16102 407975 std::ios_base::_Ios_base_dtor 16101->16102 16103 402df0 std::_Throw_Cpp_error 42 API calls 16102->16103 16104 4079a6 16103->16104 16105 4072b0 41 API calls 16104->16105 16106 4079ca 16105->16106 16107 402df0 std::_Throw_Cpp_error 42 API calls 16106->16107 16108 4079f3 16107->16108 16109 41f440 16108->16109 16110 41f630 16109->16110 16116 41f4c9 std::ios_base::_Ios_base_dtor std::_Locinfo::_Locinfo_ctor 16109->16116 16110->15848 16112 41f647 16115 438c70 std::_Throw_Cpp_error 40 API calls 16112->16115 16113 4032d0 std::_Throw_Cpp_error 42 API calls 16113->16116 16114 418f00 std::_Throw_Cpp_error 42 API calls 16114->16116 16117 41f651 16115->16117 16116->16110 16116->16112 16116->16113 16116->16114 16218 4034a0 16116->16218 16117->15848 16124 4135d1 16123->16124 16125 4135f1 std::ios_base::_Ios_base_dtor 16123->16125 16124->16125 16126 438c70 std::_Throw_Cpp_error 40 API calls 16124->16126 16125->15868 16127 413625 16126->16127 16127->15868 16225 416590 16128->16225 16134 4217d0 16131->16134 16133 4216da std::locale::_Setgloballocale 16133->16013 16135 421809 16134->16135 16141 421838 16134->16141 16136 421923 16135->16136 16139 42181b 16135->16139 16151 421990 16136->16151 16139->16141 16142 429f90 16139->16142 16141->16133 16143 429fc2 16142->16143 16144 42a0a3 16142->16144 16163 42d190 16143->16163 16145 403330 42 API calls 16144->16145 16149 42a000 std::_Locinfo::_Locinfo_ctor 16145->16149 16147 438c70 std::_Throw_Cpp_error 40 API calls 16148 42a0ad 16147->16148 16149->16147 16150 42a05f std::ios_base::_Ios_base_dtor 16149->16150 16150->16141 16152 431cea 42 API calls 16151->16152 16154 42199a 16152->16154 16153 421928 16154->16153 16155 402cf0 std::_Throw_Cpp_error 42 API calls 16154->16155 16156 421a03 16155->16156 16157 41ace0 42 API calls 16156->16157 16158 421a18 16157->16158 16171 407cf0 16158->16171 16160 421a2d 16161 4351fb std::_Throw_Cpp_error RaiseException 16160->16161 16162 421a3e 16161->16162 16164 42d1d9 16163->16164 16165 42d199 16163->16165 16164->16164 16165->16164 16166 42d1b0 16165->16166 16169 433672 std::_Facet_Register 42 API calls 16165->16169 16167 42d1b9 16166->16167 16168 433672 std::_Facet_Register 42 API calls 16166->16168 16167->16149 16170 42d1d2 16168->16170 16169->16166 16170->16149 16172 407350 42 API calls 16171->16172 16173 407d80 16172->16173 16174 41ad80 42 API calls 16173->16174 16175 407d94 16174->16175 16176 402df0 std::_Throw_Cpp_error 42 API calls 16175->16176 16177 407da3 16176->16177 16178 407dcd std::ios_base::_Ios_base_dtor 16177->16178 16180 407e33 16177->16180 16179 4072b0 41 API calls 16178->16179 16181 407dfd 16179->16181 16183 438c70 std::_Throw_Cpp_error 40 API calls 16180->16183 16182 402df0 std::_Throw_Cpp_error 42 API calls 16181->16182 16184 407e1e 16182->16184 16185 407e38 16183->16185 16184->16160 16186 407350 42 API calls 16185->16186 16187 407ece 16186->16187 16188 41ad80 42 API calls 16187->16188 16189 407ee2 16188->16189 16190 402df0 std::_Throw_Cpp_error 42 API calls 16189->16190 16191 407ef1 16190->16191 16192 407f1b std::ios_base::_Ios_base_dtor 16191->16192 16194 407f81 16191->16194 16193 4072b0 41 API calls 16192->16193 16195 407f4b 16193->16195 16196 438c70 std::_Throw_Cpp_error 40 API calls 16194->16196 16197 402df0 std::_Throw_Cpp_error 42 API calls 16195->16197 16198 407f86 16196->16198 16199 407f6c 16197->16199 16200 407350 42 API calls 16198->16200 16199->16160 16201 408029 16200->16201 16202 41ad80 42 API calls 16201->16202 16203 40803d 16202->16203 16204 402df0 std::_Throw_Cpp_error 42 API calls 16203->16204 16205 40804c 16204->16205 16206 408076 std::ios_base::_Ios_base_dtor 16205->16206 16209 4080df 16205->16209 16207 4072b0 41 API calls 16206->16207 16208 4080aa 16207->16208 16210 402df0 std::_Throw_Cpp_error 42 API calls 16208->16210 16211 438c70 std::_Throw_Cpp_error 40 API calls 16209->16211 16212 4080cb 16210->16212 16213 4080e4 16211->16213 16212->16160 16213->16160 16215 404e66 16214->16215 16216 404ea8 16215->16216 16217 403040 std::_Throw_Cpp_error 42 API calls 16215->16217 16216->16070 16217->16216 16221 403380 16218->16221 16222 403399 16221->16222 16223 440dd7 53 API calls 16222->16223 16226 434b15 ___std_exception_copy 41 API calls 16225->16226 16227 4165ce 16226->16227 16228 434b15 ___std_exception_copy 41 API calls 16227->16228 16229 416601 16228->16229 16229->15846 16231 458e17 16230->16231 16235 458c08 16230->16235 16231->14200 16233 458d38 std::locale::_Setgloballocale 16233->16231 16234 403130 42 API calls 16233->16234 16234->16233 16235->16233 16237 4387b0 16235->16237 16246 403130 16235->16246 16238 4387e3 16237->16238 16243 4387c7 16237->16243 16239 449e42 __Getctype 40 API calls 16238->16239 16240 4387e8 16239->16240 16241 44a12d __Getctype 40 API calls 16240->16241 16242 4387f8 16241->16242 16242->16243 16244 449a39 50 API calls 16242->16244 16243->16235 16245 43882a 16244->16245 16245->16235 16247 4032b3 16246->16247 16248 40316f 16246->16248 16249 403330 42 API calls 16247->16249 16250 403189 16248->16250 16252 4031d7 16248->16252 16253 4031c7 16248->16253 16251 4032b8 16249->16251 16255 433672 std::_Facet_Register 42 API calls 16250->16255 16254 402b50 Concurrency::cancel_current_task 42 API calls 16251->16254 16256 433672 std::_Facet_Register 42 API calls 16252->16256 16259 40319c std::_Locinfo::_Locinfo_ctor 16252->16259 16253->16250 16253->16251 16254->16259 16255->16259 16256->16259 16257 438c70 std::_Throw_Cpp_error 40 API calls 16258 4032c2 16257->16258 16259->16257 16260 40326b std::ios_base::_Ios_base_dtor 16259->16260 16260->16235 16262 433659 GetSystemTimeAsFileTime 16261->16262 16263 43364d GetSystemTimePreciseAsFileTime 16261->16263 16264 433077 16262->16264 16263->16264 16264->13674 16869 4247b0 16870 4248ed 16869->16870 16871 4247ed 16869->16871 16872 403330 42 API calls 16870->16872 16876 424a30 42 API calls 16871->16876 16873 4248f2 16872->16873 16874 424a23 16873->16874 16875 42493d 16873->16875 16877 403330 42 API calls 16874->16877 16879 424a30 42 API calls 16875->16879 16881 424827 16876->16881 16878 424a28 16877->16878 16880 424977 16879->16880 16888 413d50 16880->16888 16883 41e1e0 40 API calls 16881->16883 16884 4248b4 16883->16884 16885 42499f 16886 41e1e0 40 API calls 16885->16886 16887 4249ea 16886->16887 16889 413df7 std::_Locinfo::_Locinfo_ctor 16888->16889 16890 413d8f 16888->16890 16889->16885 16890->16889 16891 413d96 16890->16891 16892 413e69 16890->16892 16893 413f7d 16890->16893 16894 413f1e 16890->16894 16897 433672 std::_Facet_Register 42 API calls 16891->16897 16896 433672 std::_Facet_Register 42 API calls 16892->16896 16898 433672 std::_Facet_Register 42 API calls 16893->16898 16960 417e80 16894->16960 16899 413e73 16896->16899 16900 413da0 16897->16900 16901 413f8a 16898->16901 16899->16889 16921 42bf30 16899->16921 16902 433672 std::_Facet_Register 42 API calls 16900->16902 16901->16889 16905 413fd3 16901->16905 16906 41408e 16901->16906 16904 413dd2 16902->16904 16948 42f460 16904->16948 16909 414004 16905->16909 16910 413fdb 16905->16910 16908 403330 42 API calls 16906->16908 16912 414093 16908->16912 16911 433672 std::_Facet_Register 42 API calls 16909->16911 16910->16912 16913 413fe6 16910->16913 16911->16889 16914 402b50 Concurrency::cancel_current_task 42 API calls 16912->16914 16915 433672 std::_Facet_Register 42 API calls 16913->16915 16916 413fec 16914->16916 16915->16916 16916->16889 16918 438c70 std::_Throw_Cpp_error 40 API calls 16916->16918 16917 413d50 104 API calls 16919 413eb1 16917->16919 16920 41409d 16918->16920 16919->16889 16919->16917 16922 42bf42 16921->16922 16923 42bfab 16921->16923 16925 42bf7c 16922->16925 16926 42bf4d 16922->16926 16924 403330 42 API calls 16923->16924 16928 42bfb0 16924->16928 16927 42bf99 16925->16927 16930 433672 std::_Facet_Register 42 API calls 16925->16930 16926->16928 16929 42bf54 16926->16929 16927->16919 16931 402b50 Concurrency::cancel_current_task 42 API calls 16928->16931 16932 433672 std::_Facet_Register 42 API calls 16929->16932 16934 42bf86 16930->16934 16933 42bf5a 16931->16933 16932->16933 16935 42bf63 16933->16935 16936 438c70 std::_Throw_Cpp_error 40 API calls 16933->16936 16934->16919 16935->16919 16937 42bfba 16936->16937 16938 42c077 16937->16938 16939 42c00c 16937->16939 16942 42c013 std::_Locinfo::_Locinfo_ctor 16937->16942 16941 403330 42 API calls 16938->16941 16965 41fab0 16939->16965 16943 42c07c 16941->16943 16942->16919 16944 433672 std::_Facet_Register 42 API calls 16943->16944 16945 42c0ae 16944->16945 16946 403040 std::_Throw_Cpp_error 42 API calls 16945->16946 16947 42c0f2 16946->16947 16947->16919 16949 42f498 16948->16949 16959 42f53f 16948->16959 16950 433672 std::_Facet_Register 42 API calls 16949->16950 16951 42f4ba 16950->16951 16952 4163b0 std::_Throw_Cpp_error 42 API calls 16951->16952 16953 42f4d0 16952->16953 16954 413d50 104 API calls 16953->16954 16955 42f4e0 16954->16955 16956 42f460 104 API calls 16955->16956 16957 42f531 16956->16957 16958 42f460 104 API calls 16957->16958 16958->16959 16959->16889 16961 433672 std::_Facet_Register 42 API calls 16960->16961 16962 417ea6 16961->16962 16963 4163b0 std::_Throw_Cpp_error 42 API calls 16962->16963 16964 417ec5 16963->16964 16964->16889 16966 41fac2 16965->16966 16967 41fb2b 16965->16967 16969 41facd 16966->16969 16970 41fafc 16966->16970 16968 402b50 Concurrency::cancel_current_task 42 API calls 16967->16968 16972 41fada 16968->16972 16969->16967 16973 41fad4 16969->16973 16971 41fb19 16970->16971 16975 433672 std::_Facet_Register 42 API calls 16970->16975 16971->16942 16976 438c70 std::_Throw_Cpp_error 40 API calls 16972->16976 16978 41fae3 16972->16978 16974 433672 std::_Facet_Register 42 API calls 16973->16974 16974->16972 16977 41fb06 16975->16977 16979 41fb35 16976->16979 16977->16942 16978->16942 16981 41fb5b std::locale::_Setgloballocale 16979->16981 16983 429c70 16979->16983 16981->16942 16982 41fb7f 16982->16942 16984 429dc4 16983->16984 16988 429ca2 16983->16988 16985 403330 42 API calls 16984->16985 17000 429d04 std::_Locinfo::_Locinfo_ctor 16985->17000 16986 429dbf 16987 402b50 Concurrency::cancel_current_task 42 API calls 16986->16987 16987->16984 16988->16986 16990 429cf3 16988->16990 16991 429d1d 16988->16991 16989 438c70 std::_Throw_Cpp_error 40 API calls 16992 429dce 16989->16992 16990->16986 16993 429cfe 16990->16993 16997 433672 std::_Facet_Register 42 API calls 16991->16997 16991->17000 17002 419950 16992->17002 16996 433672 std::_Facet_Register 42 API calls 16993->16996 16995 429dd9 16998 4351fb std::_Throw_Cpp_error RaiseException 16995->16998 16996->17000 16997->17000 16999 429de2 16998->16999 17000->16989 17001 429d8f std::ios_base::_Ios_base_dtor 17000->17001 17001->16982 17003 419968 17002->17003 17004 419978 std::ios_base::_Ios_base_dtor 17002->17004 17003->17004 17005 438c70 std::_Throw_Cpp_error 40 API calls 17003->17005 17004->16995 17006 41998d 17005->17006 17007 419a4f 17006->17007 17014 432b74 17006->17014 17007->16995 17013 419a04 17013->16995 17015 432af7 17014->17015 17017 4199cc 17015->17017 17043 439815 17015->17043 17017->17007 17022 4183b0 17017->17022 17021 43d0a8 78 API calls 17021->17017 17023 418463 17022->17023 17024 41843c 17022->17024 17026 41c430 17023->17026 17095 44120a 17024->17095 17027 432470 std::_Lockit::_Lockit 7 API calls 17026->17027 17028 41c45f 17027->17028 17029 432470 std::_Lockit::_Lockit 7 API calls 17028->17029 17033 41c4a9 std::_Throw_Cpp_error 17028->17033 17031 41c481 17029->17031 17030 41c4f8 17032 4324c8 std::_Lockit::~_Lockit 2 API calls 17030->17032 17035 4324c8 std::_Lockit::~_Lockit 2 API calls 17031->17035 17034 41c5c9 17032->17034 17033->17030 17036 433672 std::_Facet_Register 42 API calls 17033->17036 17034->17013 17035->17033 17037 41c506 17036->17037 17038 404040 std::_Throw_Cpp_error 75 API calls 17037->17038 17039 41c536 17038->17039 17040 404100 std::_Throw_Cpp_error 73 API calls 17039->17040 17041 41c592 17040->17041 17042 4326f7 std::_Facet_Register 42 API calls 17041->17042 17042->17030 17045 43975e std::_Locinfo::_Locinfo_dtor 17043->17045 17044 439771 17046 4416ff __floor_pentium4 14 API calls 17044->17046 17045->17044 17048 439791 17045->17048 17047 439776 17046->17047 17049 438c60 ___std_exception_copy 40 API calls 17047->17049 17050 4397a3 17048->17050 17051 439796 17048->17051 17059 432b43 17049->17059 17053 44a8ef 17 API calls 17050->17053 17052 4416ff __floor_pentium4 14 API calls 17051->17052 17052->17059 17054 4397ac 17053->17054 17055 4397b3 17054->17055 17056 4397c0 17054->17056 17057 4416ff __floor_pentium4 14 API calls 17055->17057 17058 4397fe RtlLeaveCriticalSection 17056->17058 17057->17059 17058->17059 17059->17017 17060 43d5f6 17059->17060 17061 43d609 ___std_exception_copy 17060->17061 17066 43d34d 17061->17066 17064 43899c ___std_exception_copy 40 API calls 17065 432b5e 17064->17065 17065->17017 17065->17021 17068 43d359 std::_Locinfo::_Locinfo_dtor 17066->17068 17067 43d35f 17069 438be3 ___std_exception_copy 40 API calls 17067->17069 17068->17067 17070 43d3a2 17068->17070 17076 43d37a 17069->17076 17077 441250 RtlEnterCriticalSection 17070->17077 17072 43d3ae 17078 43d4d0 17072->17078 17074 43d3c4 17087 43d3ed 17074->17087 17076->17064 17077->17072 17079 43d4e3 17078->17079 17080 43d4f6 17078->17080 17079->17074 17090 43d3f7 17080->17090 17082 43d5a7 17082->17074 17083 439a91 73 API calls 17085 43d547 17083->17085 17084 43d519 17084->17082 17084->17083 17086 44263d 42 API calls 17085->17086 17086->17082 17094 441264 RtlLeaveCriticalSection 17087->17094 17089 43d3f5 17089->17076 17091 43d408 17090->17091 17093 43d460 17090->17093 17092 4425fd 42 API calls 17091->17092 17091->17093 17092->17093 17093->17084 17094->17089 17096 441216 17095->17096 17098 44122b 17095->17098 17097 4416ff __floor_pentium4 14 API calls 17096->17097 17099 44121b 17097->17099 17098->17023 17100 438c60 ___std_exception_copy 40 API calls 17099->17100 17101 441226 17100->17101 17101->17023

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 75 409280-4092dd call 4163b0 78 409413-409521 call 402df0 call 4ea420 75->78 79 4092e3-4092e9 75->79 95 409523-409535 78->95 96 409537-40953f call 418dc0 78->96 80 4092f0-409313 79->80 82 409324-409331 80->82 83 409315-40931f 80->83 86 409342-40934f 82->86 87 409333-40933d 82->87 85 409403-409406 83->85 89 409409-40940d 85->89 90 409360-40936d 86->90 91 409351-40935b 86->91 87->85 89->78 89->80 93 40937e-40938b 90->93 94 40936f-409379 90->94 91->85 99 409399-4093a6 93->99 100 40938d-409397 93->100 94->85 97 409544-409597 call 4ea420 * 2 95->97 96->97 112 409599-4095c8 call 4ea420 call 435270 97->112 113 4095cb-4095e1 call 4ea420 97->113 101 4093b4-4093c1 99->101 102 4093a8-4093b2 99->102 100->85 104 4093c3-4093cd 101->104 105 4093cf-4093dc 101->105 102->85 104->85 107 4093ea-4093f4 105->107 108 4093de-4093e8 105->108 107->89 111 4093f6-4093ff 107->111 108->85 111->85 112->113 119 4096e2 113->119 120 4095e7-4095ed 113->120 122 4096e6-4096f0 119->122 121 4095f0-4096ce GetModuleHandleA GetProcAddress WSASend 120->121 124 4096d4-4096dc 121->124 125 40975f-409763 121->125 126 4096f2-4096fe 122->126 127 40971e-40973d 122->127 124->119 124->121 125->122 128 409700-40970e 126->128 129 409714-40971b call 4338f3 126->129 130 40976f-409796 127->130 131 40973f-40974b 127->131 128->129 132 409797-4097fe call 438c70 call 402df0 * 2 128->132 129->127 134 409765-40976c call 4338f3 131->134 135 40974d-40975b 131->135 134->130 135->132 138 40975d 135->138 138->134
                        APIs
                        • GetModuleHandleA.KERNEL32(Ws2_32.dll,?,?,?,?,0054D15C,00000000,74D723A0,-00589880), ref: 004096A6
                        • GetProcAddress.KERNEL32(00000000,?), ref: 004096B4
                        • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,0054D15C,00000000,74D723A0,-00589880), ref: 004096C9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProcSend
                        • String ID: Ws2_32.dll
                        • API String ID: 2819740048-3093949381
                        • Opcode ID: d946741ea927b9b060335f299eec8efad25939578b4ebaaa967d5c79e73c84d4
                        • Instruction ID: 188670ed5cfc709ed037a390f66f33add7af100e18449b0941b00ad524943a05
                        • Opcode Fuzzy Hash: d946741ea927b9b060335f299eec8efad25939578b4ebaaa967d5c79e73c84d4
                        • Instruction Fuzzy Hash: 7C02CE70D04298DEDF25CFA4C8907ADBBB0EF59304F24429EE4456B2C6D7781D86CB96

                        Control-flow Graph

                        APIs
                        • setsockopt.WS2_32(00000370,0000FFFF,00001006,?,00000008), ref: 004C7BA6
                        • recv.WS2_32(?,00000004,00000002), ref: 004C7BC1
                        • WSAGetLastError.WS2_32 ref: 004C7BC5
                        • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 004C7C43
                        • recv.WS2_32(00000000,0000000C,00000008), ref: 004C7C64
                        • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?), ref: 004C7D00
                        • recv.WS2_32(00000000,?,00000008), ref: 004C7D1B
                          • Part of subcall function 004C8590: WSAStartup.WS2_32 ref: 004C85BA
                          • Part of subcall function 004C8590: getaddrinfo.WS2_32(?,?,?,00589328), ref: 004C863C
                          • Part of subcall function 004C8590: socket.WS2_32(?,?,?), ref: 004C865D
                          • Part of subcall function 004C8590: connect.WS2_32(00000000,00559BFC,?), ref: 004C8671
                          • Part of subcall function 004C8590: closesocket.WS2_32(00000000), ref: 004C867D
                          • Part of subcall function 004C8590: FreeAddrInfoW.WS2_32(?), ref: 004C868A
                          • Part of subcall function 004C8590: WSACleanup.WS2_32 ref: 004C8690
                        • recv.WS2_32(?,00000004,00000008), ref: 004C7E23
                        • __Xtime_get_ticks.LIBCPMT ref: 004C7E2A
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004C7E38
                        • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 004C7EB1
                        • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 004C7EB9
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: recv$Sleepsetsockopt$AddrCleanupErrorFreeInfoLastStartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectgetaddrinfosocket
                        • String ID:
                        • API String ID: 3089209366-0
                        • Opcode ID: deda763b8fb6066c72b20903b58187ae793f723e7b47fea433c0891846b4f81f
                        • Instruction ID: b3d54dcccad81d83ab75f13ba9899d4b50e1d8608cabcccfb3508871926cac68
                        • Opcode Fuzzy Hash: deda763b8fb6066c72b20903b58187ae793f723e7b47fea433c0891846b4f81f
                        • Instruction Fuzzy Hash: 9EB1AC71D043089BEB10DBA8CC49BAEBBB1BB54314F24025EE815BB2D2D7785D88DF95

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 56 4c8590-4c85c2 WSAStartup 57 4c85c8-4c85f2 call 4ea420 * 2 56->57 58 4c8696-4c869f 56->58 63 4c85fe-4c8644 getaddrinfo 57->63 64 4c85f4-4c85f8 57->64 65 4c8646-4c864c 63->65 66 4c8690 WSACleanup 63->66 64->58 64->63 67 4c864e 65->67 68 4c86a4-4c86ae FreeAddrInfoW 65->68 66->58 70 4c8654-4c8668 socket 67->70 68->66 69 4c86b0-4c86b8 68->69 70->66 71 4c866a-4c867a connect 70->71 72 4c867c-4c8684 closesocket 71->72 73 4c86a0 71->73 72->70 74 4c8686-4c868a FreeAddrInfoW 72->74 73->68 74->66
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: AddrFreeInfo$CleanupStartupclosesocketconnectgetaddrinfosocket
                        • String ID:
                        • API String ID: 448659506-0
                        • Opcode ID: 52d29ec15fbf37ccd53ab56e21f2e3f1d11727fcf2b6a4206c2cbc59116a4c78
                        • Instruction ID: ffa07009e3086412046aa5b15573dbd5c691e56a3beb11943292ef2f0f62f1de
                        • Opcode Fuzzy Hash: 52d29ec15fbf37ccd53ab56e21f2e3f1d11727fcf2b6a4206c2cbc59116a4c78
                        • Instruction Fuzzy Hash: 9531C1726043009BD7208F25DC48B2BB7E5FB94729F114B1EF9A4922E0D7759C089AA7

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 146 449789-4497ab 147 4497b1-4497b3 146->147 148 44999e 146->148 150 4497b5-4497d4 call 438be3 147->150 151 4497df-449802 147->151 149 4499a0-4499a4 148->149 159 4497d7-4497da 150->159 153 449804-449806 151->153 154 449808-44980e 151->154 153->154 155 449810-449821 153->155 154->150 154->155 157 449834-449844 call 4492ce 155->157 158 449823-449831 call 44263d 155->158 164 449846-44984c 157->164 165 44988d-44989f 157->165 158->157 159->149 168 449875-44988b call 448e9f 164->168 169 44984e-449851 164->169 166 4498f6-449916 WriteFile 165->166 167 4498a1-4498a7 165->167 170 449921 166->170 171 449918-44991e GetLastError 166->171 173 4498e2-4498f4 call 44934b 167->173 174 4498a9-4498ac 167->174 184 44986e-449870 168->184 175 449853-449856 169->175 176 44985c-44986b call 449266 169->176 178 449924-44992f 170->178 171->170 196 4498c9-4498cc 173->196 179 4498ce-4498e0 call 44950f 174->179 180 4498ae-4498b1 174->180 175->176 181 449936-449939 175->181 176->184 185 449931-449934 178->185 186 449999-44999c 178->186 179->196 187 44993c-44993e 180->187 188 4498b7-4498c4 call 449426 180->188 181->187 184->178 185->181 186->149 192 449940-449945 187->192 193 44996c-449978 187->193 188->196 197 449947-449959 192->197 198 44995e-449967 call 4416c8 192->198 199 449982-449994 193->199 200 44997a-449980 193->200 196->184 197->159 198->159 199->159 200->148 200->199
                        APIs
                          • Part of subcall function 00448E9F: GetConsoleOutputCP.KERNEL32(DDE7F8A2,00000000,00000000,?), ref: 00448F02
                        • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0044990E
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00449918
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: ConsoleErrorFileLastOutputWrite
                        • String ID:
                        • API String ID: 2915228174-0
                        • Opcode ID: 2beaef352ff8862ad6b8b16251cd0bd229135013537871e9a6efb1225fc67aec
                        • Instruction ID: 4c198159cf300fc4e9085a349e24ad4d45033eb13303bb4f9288eddf9455663d
                        • Opcode Fuzzy Hash: 2beaef352ff8862ad6b8b16251cd0bd229135013537871e9a6efb1225fc67aec
                        • Instruction Fuzzy Hash: 9961C5B1C14119BFEF11DFA8C844AAFBBB9AF49304F14014AE800A7316D739DD05EB65

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 203 448dff-448e13 call 44e940 206 448e15-448e17 203->206 207 448e19-448e21 203->207 208 448e67-448e87 call 44e8af 206->208 209 448e23-448e2a 207->209 210 448e2c-448e2f 207->210 219 448e99 208->219 220 448e89-448e97 call 4416c8 208->220 209->210 212 448e37-448e4b call 44e940 * 2 209->212 213 448e31-448e35 210->213 214 448e4d-448e5d call 44e940 FindCloseChangeNotification 210->214 212->206 212->214 213->212 213->214 214->206 222 448e5f-448e65 GetLastError 214->222 224 448e9b-448e9e 219->224 220->224 222->208
                        APIs
                        • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,00448CE6,00000000,?,0057A178,0000000C,00448DA2,?,?,?), ref: 00448E55
                        • GetLastError.KERNEL32(?,00448CE6,00000000,?,0057A178,0000000C,00448DA2,?,?,?), ref: 00448E5F
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: ChangeCloseErrorFindLastNotification
                        • String ID:
                        • API String ID: 1687624791-0
                        • Opcode ID: 1fe827fdfe079599b9b1dab25e2b646f0beb01ea40d46a72429d261cc15a62e7
                        • Instruction ID: bfed174018f4c3fae0b74bea86efe9ace0911028d3bee9629bfc5162a0057b67
                        • Opcode Fuzzy Hash: 1fe827fdfe079599b9b1dab25e2b646f0beb01ea40d46a72429d261cc15a62e7
                        • Instruction Fuzzy Hash: 6E1125336042102AF6252236A84677F67499B82738F39061FF918CB2D2DF689C81825D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 228 44251c-442534 call 44e940 231 442536-44253d 228->231 232 44254a-442560 SetFilePointerEx 228->232 233 442544-442548 231->233 234 442575-44257f 232->234 235 442562-442573 GetLastError call 4416c8 232->235 236 44259b-44259e 233->236 234->233 238 442581-442596 234->238 235->233 238->236
                        APIs
                        • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,00442626,?,?,?,?,?), ref: 00442558
                        • GetLastError.KERNEL32(?,?,?,?,00442626,?,?,?,?,?,00000000,?,00000000), ref: 00442565
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: ErrorFileLastPointer
                        • String ID:
                        • API String ID: 2976181284-0
                        • Opcode ID: 0df1753fdbe4f7a704092f8361e7cfb0c7cc0fcadc70f8748e4d2d33b1623b65
                        • Instruction ID: bcffdd1dd92d970d4fbe8e398a8ab980657c5c2bf717c74f1f656664416c076e
                        • Opcode Fuzzy Hash: 0df1753fdbe4f7a704092f8361e7cfb0c7cc0fcadc70f8748e4d2d33b1623b65
                        • Instruction Fuzzy Hash: 9B012632610615BFDF158F69DC1699E3B29EB84334F240209F8019B2E1E6B5ED429BA4

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 240 4032d0-4032e0 241 4032e2-4032e7 240->241 242 403306-403308 240->242 245 4032e9-4032ea call 433672 241->245 246 40331f call 402b50 241->246 243 403318-40331e 242->243 244 40330a-403317 call 433672 242->244 252 4032ef-4032f6 245->252 251 403324-403329 call 438c70 246->251 252->251 254 4032f8-403305 252->254
                        APIs
                        • Concurrency::cancel_current_task.LIBCPMT ref: 0040331F
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: Concurrency::cancel_current_task
                        • String ID:
                        • API String ID: 118556049-0
                        • Opcode ID: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                        • Instruction ID: ac639495c118a2832fc09027b5ebf4fad0cef292c7be368858978faeea3118d5
                        • Opcode Fuzzy Hash: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                        • Instruction Fuzzy Hash: 63F024321001009BCB246F61D4565EAB7ECDF28366B50083FFC8DD7292EB3EDA408788

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 256 44a65a-44a665 257 44a667-44a671 256->257 258 44a673-44a679 256->258 257->258 259 44a6a7-44a6b2 call 4416ff 257->259 260 44a692-44a6a3 RtlAllocateHeap 258->260 261 44a67b-44a67c 258->261 266 44a6b4-44a6b6 259->266 262 44a6a5 260->262 263 44a67e-44a685 call 448280 260->263 261->260 262->266 263->259 269 44a687-44a690 call 445a89 263->269 269->259 269->260
                        APIs
                        • RtlAllocateHeap.NTDLL(00000008,?,00000001), ref: 0044A69B
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: 89032516e5b3e6299283371760f336f91a06b383302663fb1c071aa923d3998c
                        • Instruction ID: 9689b7dccde3e7d2c1426315cc49502dff6dd5535dcc2f3da2dc3831567fdc71
                        • Opcode Fuzzy Hash: 89032516e5b3e6299283371760f336f91a06b383302663fb1c071aa923d3998c
                        • Instruction Fuzzy Hash: 4CF0E0311905246BFB216A66DC05B5B375CAF41760F1E8117EC84EB190CA3CDC3146EE

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 272 44b094-44b0a0 273 44b0d2-44b0dd call 4416ff 272->273 274 44b0a2-44b0a4 272->274 282 44b0df-44b0e1 273->282 275 44b0a6-44b0a7 274->275 276 44b0bd-44b0ce RtlAllocateHeap 274->276 275->276 278 44b0d0 276->278 279 44b0a9-44b0b0 call 448280 276->279 278->282 279->273 284 44b0b2-44b0bb call 445a89 279->284 284->273 284->276
                        APIs
                        • RtlAllocateHeap.NTDLL(00000000,00000001,?), ref: 0044B0C6
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: c639ae0624eff34eb8e57d07392fb4ffc7a0b3e65f726cef66c68c9318aea675
                        • Instruction ID: 07eaf642519ac51a5bd3283dd2addbb445c80e248ae9cef49388ffb333b33e8c
                        • Opcode Fuzzy Hash: c639ae0624eff34eb8e57d07392fb4ffc7a0b3e65f726cef66c68c9318aea675
                        • Instruction Fuzzy Hash: 99E022322006206BFF313AA69C14B5B764CEF413A3F190227EC25A62D1DB3CCC0092EE
                        APIs
                        • VirtualAllocEx.KERNEL32(00000000,00000000,?,00003000,00000040), ref: 004CF2F1
                        • WriteProcessMemory.KERNEL32(00000000,00000000,?,?,00000000), ref: 004CF30D
                        • WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 004CF342
                        • VirtualAllocEx.KERNEL32(?,00000000,00001000,00003000,00000040), ref: 004CF36B
                        • WriteProcessMemory.KERNEL32(?,00000000,?,00000218,00000000), ref: 004CF50F
                        • WriteProcessMemory.KERNEL32(?,00000218,004CF5E0,-00000010,00000000), ref: 004CF531
                        • CreateRemoteThread.KERNEL32(?,00000000,00000000,00000218,00000000,00000000,00000000), ref: 004CF544
                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004CF54D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: MemoryProcessWrite$AllocVirtual$CreateObjectRemoteSingleThreadWait
                        • String ID: %s|%s$131
                        • API String ID: 2137838514-1629954864
                        • Opcode ID: b88fb1ed2ebfd2a655c4879da0ce9de7ec8f2c0603ef1b71525654192dd42d6d
                        • Instruction ID: 2ab717f03d3c912496b66fb944616d360f792c6fe5d042a247d22025e7d5b78f
                        • Opcode Fuzzy Hash: b88fb1ed2ebfd2a655c4879da0ce9de7ec8f2c0603ef1b71525654192dd42d6d
                        • Instruction Fuzzy Hash: 36B16BB1D002089FDB14CFA4CC95BAEBBB5FF18300F10426DE905BB291D774A984DBA5
                        APIs
                          • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                          • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                        • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 004535D7
                        • IsValidCodePage.KERNEL32(?), ref: 00453615
                        • IsValidLocale.KERNEL32(?,00000001), ref: 00453628
                        • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00453670
                        • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 0045368B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                        • String ID: *V
                        • API String ID: 415426439-2897881622
                        • Opcode ID: bb3ee8500ca9cacc625c50b97d6e48ff5c53ad3e39c4a6c01d9da358df15b7ae
                        • Instruction ID: 4a54d826d8e8e5dc964d84ffa3ac1e49b68ae0fe58eca9cd8e7cd24ca5604c7d
                        • Opcode Fuzzy Hash: bb3ee8500ca9cacc625c50b97d6e48ff5c53ad3e39c4a6c01d9da358df15b7ae
                        • Instruction Fuzzy Hash: 4E517471A00209AFDB20DFA5CC41ABF77B8AF05743F14446AED01E7252EB74DA48DB65
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: __floor_pentium4
                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                        • API String ID: 4168288129-2761157908
                        • Opcode ID: 43a42e638d961d261596a491a02aa4b2327403fcfc943c4a8adc8c2915f1bcde
                        • Instruction ID: 95be6499ce7b8f5c3e7b75284ec9f8f0661dd908efafa341dd21629552806af8
                        • Opcode Fuzzy Hash: 43a42e638d961d261596a491a02aa4b2327403fcfc943c4a8adc8c2915f1bcde
                        • Instruction Fuzzy Hash: 3AD23D71E086288FDB65CE28CD507EAB7B5EB84306F1441EBD80DE7241D778AE898F45
                        APIs
                          • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                          • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                        • GetACP.KERNEL32(?,?,?,?,?,?,00447300,?,?,?,?,?,-00000050,?,?,?), ref: 00452C19
                        • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00447300,?,?,?,?,?,-00000050,?,?), ref: 00452C50
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00452DB3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: ErrorLast$CodeInfoLocalePageValid
                        • String ID: *V$utf8
                        • API String ID: 607553120-210452255
                        • Opcode ID: 95727e6ef7b94787d777f99e21165c393144e5509e4be2ad3f52f8295ffa9360
                        • Instruction ID: 742b11dcb7ff0b0bfa38c284345f0d68b4d7ce619a9ba0daefdf44cafbbca61f
                        • Opcode Fuzzy Hash: 95727e6ef7b94787d777f99e21165c393144e5509e4be2ad3f52f8295ffa9360
                        • Instruction Fuzzy Hash: F071FA32600602A6D725AF75CD45B6B73A8EF16705F10042FFD05D7283EBF8E94C9699
                        APIs
                        • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002,00000000,?,?,?,00453605,?,?), ref: 0045338C
                        • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002,00000000,?,?,?,00453605,?,?), ref: 004533B5
                        • GetACP.KERNEL32(?,?,00453605,?,?), ref: 004533CA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: InfoLocale
                        • String ID: ACP$OCP
                        • API String ID: 2299586839-711371036
                        • Opcode ID: b900ca414d4c4be95a8c6f041d08249478f894891a183a2f82a4edaf5765dc51
                        • Instruction ID: 0023b8279c9b3e3643c8ce07df61025d6c2b7e12d2ffc4f7461f6cfcb2a1a3ae
                        • Opcode Fuzzy Hash: b900ca414d4c4be95a8c6f041d08249478f894891a183a2f82a4edaf5765dc51
                        • Instruction Fuzzy Hash: 8021C432600100A7DB308F54C900A9BB3A6AF50FD3B568466EC06D7312EF36EF49D358
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                        • Instruction ID: 01dad5c531b3804b6668612822d9feb5b6f7af541a2af8c3bc89036eeee974e8
                        • Opcode Fuzzy Hash: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                        • Instruction Fuzzy Hash: DA023A71E002199BDF14CFA9D9C06AEFBB1FF48314F24926AE919B7380D735A9418B94
                        APIs
                        • GetSystemTimePreciseAsFileTime.KERNEL32(?,00433077,?,?,?,?,004C7E2F), ref: 00433655
                        • GetSystemTimeAsFileTime.KERNEL32(?,DDE7F8A2,00000000,?,00551382,000000FF,?,00433077,?,?,?,?,004C7E2F), ref: 00433659
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: Time$FileSystem$Precise
                        • String ID: `-@
                        • API String ID: 743729956-3781167437
                        • Opcode ID: a70e229828252f114f3dcb939b169fb3f53d7191ad82fa45b454faadf805d98c
                        • Instruction ID: 3e04e591088ee8cc2650925c1d28f2227fba881fd4e87dc1a7d03300bd93dc66
                        • Opcode Fuzzy Hash: a70e229828252f114f3dcb939b169fb3f53d7191ad82fa45b454faadf805d98c
                        • Instruction Fuzzy Hash: 73F0A032904A54EFCB118F44DC11B59BBA8F708B21F004626EC12A3790DB34A9049F94
                        APIs
                          • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                          • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452FCB
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00453015
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004530DB
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: InfoLocale$ErrorLast
                        • String ID:
                        • API String ID: 661929714-0
                        • Opcode ID: f5cfd2435bfc6126f1a27ca0e302e8257e218aad689c2380b82d9cb027d6b9a4
                        • Instruction ID: 48740d242bba4bd8a9c349c0ec2c6d2d1cd0f344531baebb5e7d544be35332ed
                        • Opcode Fuzzy Hash: f5cfd2435bfc6126f1a27ca0e302e8257e218aad689c2380b82d9cb027d6b9a4
                        • Instruction Fuzzy Hash: 4661C2315006079FEB249F25CC82BABB7A8EF04787F10417AED05C6686EB7CDA49CB54
                        APIs
                        • IsDebuggerPresent.KERNEL32 ref: 00438B5C
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00438B66
                        • UnhandledExceptionFilter.KERNEL32(?), ref: 00438B73
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                        • String ID:
                        • API String ID: 3906539128-0
                        • Opcode ID: 190c57a89f893cc3a60c21e64f5d89c3dc83bf777de16abb744d2c180980a4ce
                        • Instruction ID: 8ec399b23226fa191ec5ef1820ea8a0bb8d05e2da4fe9e987d2f7c16b8c22cf0
                        • Opcode Fuzzy Hash: 190c57a89f893cc3a60c21e64f5d89c3dc83bf777de16abb744d2c180980a4ce
                        • Instruction Fuzzy Hash: 8331D4759013189BCB21DF65D8897CDBBB8BF08310F5051EAF81CA7251EB749B858F48
                        APIs
                        • FindClose.KERNEL32(000000FF,?,0041D027,?,?,?,00424721), ref: 00431FA8
                        • FindFirstFileExW.KERNEL32(000000FF,00000001,?,00000000,00000000,00000000,?,?,?,0041D027,?,?,?,00424721), ref: 00431FD7
                        • GetLastError.KERNEL32(?,0041D027,?,?,?,00424721), ref: 00431FE9
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: Find$CloseErrorFileFirstLast
                        • String ID:
                        • API String ID: 4020440971-0
                        • Opcode ID: b16ae3ed5c4ea8c825a7741cabbb9deee3b3ed014939fe7a26025e30d09a83a3
                        • Instruction ID: 374c7283d1fee54890fd1da0f93e4c1b7d6ed331c4205a5270736a92a01d96fc
                        • Opcode Fuzzy Hash: b16ae3ed5c4ea8c825a7741cabbb9deee3b3ed014939fe7a26025e30d09a83a3
                        • Instruction Fuzzy Hash: D9F08232000208BFDB206FB5DC08DBA7BADEB18371F108626FD68C16B0D731D9A596B5
                        APIs
                        • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,?,?,?,?,00447E76,?,20001004,?,00000002,?,?,00447468), ref: 0044B768
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: InfoLocale
                        • String ID: `-@
                        • API String ID: 2299586839-3781167437
                        • Opcode ID: 49b4b54da173fcca6da5c5c7afb6aecc463d0371a21e889a3031e465fe0a4c2b
                        • Instruction ID: 6cde8863e94abc83afdff9d02dc43b85bf30edba8fd47250f688fa8aae92868b
                        • Opcode Fuzzy Hash: 49b4b54da173fcca6da5c5c7afb6aecc463d0371a21e889a3031e465fe0a4c2b
                        • Instruction Fuzzy Hash: 65E04F36500218BBEF223F61EC05EAE7F26EF447A2F008416FD0565271CB75C921BAE9
                        APIs
                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0044DA81,?,?,?,?,?,?,00000000), ref: 0044DCB3
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: ExceptionRaise
                        • String ID:
                        • API String ID: 3997070919-0
                        • Opcode ID: c4b844f4748ab43110d9ddc2113bf4f3516c88aed4eb779ad480f52b638fb61b
                        • Instruction ID: a9cfdaf791ee03315f30e706cc2315f363a0b4456a4e08294abae47f684f0219
                        • Opcode Fuzzy Hash: c4b844f4748ab43110d9ddc2113bf4f3516c88aed4eb779ad480f52b638fb61b
                        • Instruction Fuzzy Hash: ECB15171910608DFE715CF28C48AB557BE0FF45364F25865AE899CF3A1C339E992CB44
                        APIs
                          • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                          • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045321E
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: ErrorLast$InfoLocale
                        • String ID:
                        • API String ID: 3736152602-0
                        • Opcode ID: ce8f16c0568beb61190bd24bea5fc54c05911f28a5d336557b2a67b9f4554f6f
                        • Instruction ID: c68ba993faf54d01c6f16d81f3f5077507b086e8cfab0080940638b83f1b5490
                        • Opcode Fuzzy Hash: ce8f16c0568beb61190bd24bea5fc54c05911f28a5d336557b2a67b9f4554f6f
                        • Instruction Fuzzy Hash: 8D219872514606ABDB189E25DC42A7BB3A8EF04756F1000BFFD01D6242EB7CDE489758
                        APIs
                          • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                          • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                        • EnumSystemLocalesW.KERNEL32(00452F77,00000001,00000000,?,?,?,004535AB,?), ref: 00452EC3
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: ErrorLast$EnumLocalesSystem
                        • String ID:
                        • API String ID: 2417226690-0
                        • Opcode ID: ed3a15461aa07a0672f4d58e186f542e4a9ded439744096cd7c499f36c17fdd7
                        • Instruction ID: 0b970845e1a8773270f0425e193d970e9e25a52c90aa89fa5165c8154eb0a54b
                        • Opcode Fuzzy Hash: ed3a15461aa07a0672f4d58e186f542e4a9ded439744096cd7c499f36c17fdd7
                        • Instruction Fuzzy Hash: 8B11593B2007014FDB189F39D99267BB7A1FF84319B14442EED8687B41D3B5B806DB44
                        APIs
                          • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                          • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                        • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00453193,00000000,00000000,?), ref: 00453425
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: ErrorLast$InfoLocale
                        • String ID:
                        • API String ID: 3736152602-0
                        • Opcode ID: 9fb8eb4d6cfb5dc9ab71851ad247751131481363ade4371d576ad0b9e7960359
                        • Instruction ID: 7310505bafe8fff12ee8f5912ce4e44c5146d6de948bcf0b33cac505e4352342
                        • Opcode Fuzzy Hash: 9fb8eb4d6cfb5dc9ab71851ad247751131481363ade4371d576ad0b9e7960359
                        • Instruction Fuzzy Hash: 72014E336002127BDB195E25CC45BBB7764DB41797F14442AEC06A3281DA78FE45D994
                        APIs
                          • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                          • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00452DB3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: ErrorLast$InfoLocale
                        • String ID: *V$utf8
                        • API String ID: 3736152602-210452255
                        • Opcode ID: 59e00f747d9bc6cf307ab543fe27e9585fa5185e009a5a777542dc83f29e6ce8
                        • Instruction ID: aeef1e48df53c0e1e1989da3d76282249285fc4edbaa792ed956cb55b8cc0ce8
                        • Opcode Fuzzy Hash: 59e00f747d9bc6cf307ab543fe27e9585fa5185e009a5a777542dc83f29e6ce8
                        • Instruction Fuzzy Hash: E3F0C832610205ABD714AF35DC4AEBB73A8DB59316F10017FF902D7282EA7CAD099768
                        APIs
                          • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                          • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                        • EnumSystemLocalesW.KERNEL32(004531CA,00000001,?,?,?,?,00453573,?,?,?,?), ref: 00452F36
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: ErrorLast$EnumLocalesSystem
                        • String ID:
                        • API String ID: 2417226690-0
                        • Opcode ID: a7aabdafeecc33135d5ef59119c1dd02303f614df75aa08249f401847eac2aa8
                        • Instruction ID: 46f5077cb0f7882f4a3a694ed1b059b17750918d15d6876221f24d4c3ab0ea03
                        • Opcode Fuzzy Hash: a7aabdafeecc33135d5ef59119c1dd02303f614df75aa08249f401847eac2aa8
                        • Instruction Fuzzy Hash: 38F022372003045FDB249F35AC81A7B7BA1FB82769B15842FFE068B692C2B59C02A654
                        APIs
                          • Part of subcall function 0044424B: RtlEnterCriticalSection.NTDLL(-00588967), ref: 0044425A
                        • EnumSystemLocalesW.KERNEL32(0044B1A4,00000001,0057A298,0000000C,0044B5D9,?,?,?,?), ref: 0044B1E9
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: CriticalEnterEnumLocalesSectionSystem
                        • String ID:
                        • API String ID: 1272433827-0
                        • Opcode ID: c95449866fe5fa4667aabee73304f47e4942a34859e8fff04667a9b00fb14092
                        • Instruction ID: e80e171ad64c81d089edaf6c836f83e2cf4dda05f2f2c126e8d7e53f9a4c0b50
                        • Opcode Fuzzy Hash: c95449866fe5fa4667aabee73304f47e4942a34859e8fff04667a9b00fb14092
                        • Instruction Fuzzy Hash: F3F04F76A00200DFE700DF99E806B9C7BF0FB59B25F10819BF810E7290DBB999049F45
                        APIs
                          • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                          • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                        • EnumSystemLocalesW.KERNEL32(00452D5F,00000001,?,?,?,004535CD,?,?,?,?), ref: 00452E3D
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: ErrorLast$EnumLocalesSystem
                        • String ID:
                        • API String ID: 2417226690-0
                        • Opcode ID: 5ffb0c9d813d6eba6d8fd2e10c847f2c312efa30acac4b18343fb8da06ef6d7e
                        • Instruction ID: fee7300587f55c0c421301d99721cdf1a1ff6f595eefe83fa7d5e966eb6188b0
                        • Opcode Fuzzy Hash: 5ffb0c9d813d6eba6d8fd2e10c847f2c312efa30acac4b18343fb8da06ef6d7e
                        • Instruction Fuzzy Hash: 8FF0553A30020557CB04AF35D80666BBFA0EFC2711B06405BEE09CB392C2B99846DB94
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4b4a0174d0d62f2b1227807bd6e07e9c018e82f5f56551d9681256b3b92353b2
                        • Instruction ID: 68aa0d5ee95f80c7a91d8174e86b503e14c67071ff11744bcabbed3cfa87bcc2
                        • Opcode Fuzzy Hash: 4b4a0174d0d62f2b1227807bd6e07e9c018e82f5f56551d9681256b3b92353b2
                        • Instruction Fuzzy Hash: F96270B0D002599FDB14CF59C5846BEBBB1BF84308F2481AEDA14AB346C779DA46CF94
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 80b9970b4e61b3a89387c81d03852b8640c12f30169ca405eadcc1892538b820
                        • Instruction ID: 0e8ddfc969875e3dd00111f91a6503ca4c3a70c52638cfea05a5ef0fdf848abd
                        • Opcode Fuzzy Hash: 80b9970b4e61b3a89387c81d03852b8640c12f30169ca405eadcc1892538b820
                        • Instruction Fuzzy Hash: 1EE10276F1022A9FDB05CFA8D4816ADFBF1AF88320B5942AAD814B7340D774A945CB94
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a41b321b0bedac8989d8c8297ce8e3211a7e70ffbcb0090baa5e3f65be106bda
                        • Instruction ID: 86fdf0966577921a64d033a0687854855d7760d31b02c963075edfb0c817f6d8
                        • Opcode Fuzzy Hash: a41b321b0bedac8989d8c8297ce8e3211a7e70ffbcb0090baa5e3f65be106bda
                        • Instruction Fuzzy Hash: 45C1DA709006069FEB24CF68C484A6BBBB1EF45304F14461FDB969B791C338ED66CB5A
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: ErrorLast
                        • String ID:
                        • API String ID: 1452528299-0
                        • Opcode ID: 337bf9b0213a408d992dbd779b211f999c4c3a8d278f465cc99103b402b18e84
                        • Instruction ID: 7c06e8313ae742015ce167e0291709e23a9c2e608a4b019449313ff3a09dc83f
                        • Opcode Fuzzy Hash: 337bf9b0213a408d992dbd779b211f999c4c3a8d278f465cc99103b402b18e84
                        • Instruction Fuzzy Hash: 21B129315007019BDB38EB65CD82AB7B3A8EF45309F14452FED43C6642EBB9E989C718
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 31304fda07eb44754811e6465f7945cd712cae6a90f07cbe7a52602e90953672
                        • Instruction ID: f297913e25a3591813c030fa515b242fba5e7fe6b87ce0d9dc90972f2508a2cf
                        • Opcode Fuzzy Hash: 31304fda07eb44754811e6465f7945cd712cae6a90f07cbe7a52602e90953672
                        • Instruction Fuzzy Hash: 0281FDB4A002469FDB118F69D8817BEFBF4AB2A315F04016EDC55A7383CB38990DD7A4
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5d9e1b96ebeb8905ce8cf41e2ed65b6f129fd888b54bee42289f6865976a0455
                        • Instruction ID: 9260139a4ef8e20400bb9b6c572cac56afe306f3fbbdb3538d7680a8b6287584
                        • Opcode Fuzzy Hash: 5d9e1b96ebeb8905ce8cf41e2ed65b6f129fd888b54bee42289f6865976a0455
                        • Instruction Fuzzy Hash: 506195356345684FE708CF1EECD04363B52A39E30538542AAEA81C7395C576FA2EE7E0
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 46680d0314554fd398ed7fd020ff60bee8df1d437ae882661bd78aeb1168d151
                        • Instruction ID: 0bb0d4fe57c201db2c152aeff89cf209e4ab217caaafa113e802d716cdce1c0b
                        • Opcode Fuzzy Hash: 46680d0314554fd398ed7fd020ff60bee8df1d437ae882661bd78aeb1168d151
                        • Instruction Fuzzy Hash: 5B517D72D00219AFDF04CF99C940AEFBBB6FF88314F198459E955AB301D7389A50CB95
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                        • Instruction ID: 4ba24db855cab2182e42f47a77fd888252c09f86d43135b4b8e5651c7dd79236
                        • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                        • Instruction Fuzzy Hash: B21131F724D08143EA74863DC8B46BBA795EBCD320F2D63BBE0C14BB58D52AD5459908
                        APIs
                        • RtlDecodePointer.NTDLL(?), ref: 004579FC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: DecodePointer
                        • String ID: `-@$acos$asin$exp$log$log10$pow$sqrt
                        • API String ID: 3527080286-3628989360
                        • Opcode ID: 4c17630f5161de399ffce6b570c60365a2c89c55b52a7f760b39540bf94f5387
                        • Instruction ID: bbf143f63b3841ec77cfacb8c6df481a799db6acf17f433172942b25d65e7ef2
                        • Opcode Fuzzy Hash: 4c17630f5161de399ffce6b570c60365a2c89c55b52a7f760b39540bf94f5387
                        • Instruction Fuzzy Hash: 1651B370808A0ACBCF109F58F84C1BEBFB1FB05309F154166D851A7266C7799A2DCB4D
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 0041A09D
                        • std::_Lockit::_Lockit.LIBCPMT ref: 0041A0BF
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0041A0E7
                        • __Getctype.LIBCPMT ref: 0041A1C5
                        • std::_Facet_Register.LIBCPMT ref: 0041A1F9
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0041A223
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                        • String ID: PD@$PG@$E@
                        • API String ID: 1102183713-4120405683
                        • Opcode ID: 495f4126c8959cda1dad90c343e93fba20469dde2e2043d742b69906c970156d
                        • Instruction ID: b372b58ab1bb25eec4b44a09b7f8f3aef2cc67a410616163416d5e42c3dffe19
                        • Opcode Fuzzy Hash: 495f4126c8959cda1dad90c343e93fba20469dde2e2043d742b69906c970156d
                        • Instruction Fuzzy Hash: 6E51BAB0D01245DFCB11CF98C9457AEBBF0FB14714F14825ED855AB391DB78AA88CB92
                        APIs
                        • _ValidateLocalCookies.LIBCMT ref: 00437307
                        • ___except_validate_context_record.LIBVCRUNTIME ref: 0043730F
                        • _ValidateLocalCookies.LIBCMT ref: 00437398
                        • __IsNonwritableInCurrentImage.LIBCMT ref: 004373C3
                        • _ValidateLocalCookies.LIBCMT ref: 00437418
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                        • String ID: `-@$csm
                        • API String ID: 1170836740-3738301566
                        • Opcode ID: a837c65dc98bc53f7a591b5dada66322cfdf011b0ab20b220170fbbfaeea83fd
                        • Instruction ID: bde692452db8eba3752ab90a3e7788ac0719a0bf92b2230e47b89eff8dfd02fd
                        • Opcode Fuzzy Hash: a837c65dc98bc53f7a591b5dada66322cfdf011b0ab20b220170fbbfaeea83fd
                        • Instruction Fuzzy Hash: B041F8709042099FCF20DF59C885A9FBBA4BF08328F14905BFC54AB392D739E905DB95
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 0041C45A
                        • std::_Lockit::_Lockit.LIBCPMT ref: 0041C47C
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0041C4A4
                        • std::_Facet_Register.LIBCPMT ref: 0041C59A
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0041C5C4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                        • String ID: E@$PD@
                        • API String ID: 459529453-4103272508
                        • Opcode ID: fb94b052f71f665722219136562a8730e5ed9d67761b2a33bc821d4977d05291
                        • Instruction ID: e4bc83ced0ac359faa997fd18d4eeb760fe14de2594101695cc0fd15b6690fbc
                        • Opcode Fuzzy Hash: fb94b052f71f665722219136562a8730e5ed9d67761b2a33bc821d4977d05291
                        • Instruction Fuzzy Hash: C351EFB0900255EFDB11CF58C991BAEBBF0FB10314F24415EE846AB381D7B9AA45CB95
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: _strrchr
                        • String ID:
                        • API String ID: 3213747228-0
                        • Opcode ID: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                        • Instruction ID: d7b9d7273cbfac5d15a556f8c8651b9033d93685d5a38535419dded3191b9e75
                        • Opcode Fuzzy Hash: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                        • Instruction Fuzzy Hash: D5B14672D006559FEB158F24CC81BEBBBA5EF59310F2441ABE904AB382D778D901C7E9
                        APIs
                        • FreeLibrary.KERNEL32(00000000,?,0044B48D,?,?,00000000,00000001,?,?,0044B6B7,00000022,FlsSetValue,00561B88,00561B90,00000001), ref: 0044B43F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: FreeLibrary
                        • String ID: api-ms-$ext-ms-
                        • API String ID: 3664257935-537541572
                        • Opcode ID: 033630484f002e070c94113c7b6ef7f262f68e90d70309fdd043a749aa00ed93
                        • Instruction ID: e3d7dbf8d3e43151f67a2d3675c4fcd7809fc0c9af6198dcb17880ded4e1cd5b
                        • Opcode Fuzzy Hash: 033630484f002e070c94113c7b6ef7f262f68e90d70309fdd043a749aa00ed93
                        • Instruction Fuzzy Hash: A2212B36A01220A7E7319F619C45A6B7768EB51761F140112FC06A7392D734ED05D6D9
                        APIs
                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,DDE7F8A2,?,?,00000000,00551365,000000FF,?,0044360F,?,?,004435E3,00000016), ref: 00443668
                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044367A
                        • FreeLibrary.KERNEL32(00000000,?,00000000,00551365,000000FF,?,0044360F,?,?,004435E3,00000016), ref: 0044369C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: AddressFreeHandleLibraryModuleProc
                        • String ID: CorExitProcess$`-@$mscoree.dll
                        • API String ID: 4061214504-3731901874
                        • Opcode ID: 66c557226bdf84cfe892202a4e2d9d598a1facfa92736b92f61228ad13b2a6bb
                        • Instruction ID: 11f561727bfec435161e86ab51d2faaed74d5e09c0b89d0474703e999051cdf2
                        • Opcode Fuzzy Hash: 66c557226bdf84cfe892202a4e2d9d598a1facfa92736b92f61228ad13b2a6bb
                        • Instruction Fuzzy Hash: 5601A232A44715AFDB219F44DC19BAFBBB8FB14B52F014526E812E27E0DB749A04CA94
                        APIs
                        • __EH_prolog3.LIBCMT ref: 00432730
                        • std::_Lockit::_Lockit.LIBCPMT ref: 0043273B
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 004327A9
                          • Part of subcall function 0043288C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 004328A4
                        • std::locale::_Setgloballocale.LIBCPMT ref: 00432756
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                        • String ID: `-@
                        • API String ID: 677527491-3781167437
                        • Opcode ID: 8a5613631ec3d916f95b396eb7cc43f12c5d676d84142dd5ef1a29976cc47206
                        • Instruction ID: 335728d06f8999c9367bb6f0cb93ad347570f0e44e9dcbef2930aaa8ccdcd417
                        • Opcode Fuzzy Hash: 8a5613631ec3d916f95b396eb7cc43f12c5d676d84142dd5ef1a29976cc47206
                        • Instruction Fuzzy Hash: 9D01FC35A006109BC70AFB20CC5157D7BB0FF98790F44250EE81163391CFB8AE06DB89
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 00432BDC
                        • RtlAcquireSRWLockExclusive.NTDLL(00000008), ref: 00432BFB
                        • RtlAcquireSRWLockExclusive.NTDLL(00000008), ref: 00432C29
                        • RtlTryAcquireSRWLockExclusive.NTDLL(00000008), ref: 00432C84
                        • RtlTryAcquireSRWLockExclusive.NTDLL(00000008), ref: 00432C9B
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: AcquireExclusiveLock$CurrentThread
                        • String ID:
                        • API String ID: 66001078-0
                        • Opcode ID: 8f089e7040faa662b45679f060ee1b8a0f0adfff173fd46cb89089840a213128
                        • Instruction ID: ee0d2db44a198d3d02c1eb3b1b0ff5a364ec90963e300245c4d31640e9e12550
                        • Opcode Fuzzy Hash: 8f089e7040faa662b45679f060ee1b8a0f0adfff173fd46cb89089840a213128
                        • Instruction Fuzzy Hash: B2415931900A0ADFCB20DF65CA8096EB3B4FF0C311F20692BD446D7650D7B8E986DB69
                        APIs
                        • ___std_exception_destroy.LIBVCRUNTIME ref: 0040750C
                        • ___std_exception_destroy.LIBVCRUNTIME ref: 00407522
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: ___std_exception_destroy
                        • String ID: )@$[json.exception.
                        • API String ID: 4194217158-3378332251
                        • Opcode ID: 74f1ced649a80f54c74698f2e3f1ef80366f2fbaef409b1663f26043a5eac72a
                        • Instruction ID: d1fd1ad00dbeab1566b73d8112c34bc80c76f551163e59ed82d928a5322bc1a2
                        • Opcode Fuzzy Hash: 74f1ced649a80f54c74698f2e3f1ef80366f2fbaef409b1663f26043a5eac72a
                        • Instruction Fuzzy Hash: 8C51CFB1C046489BD710DFA8C905B9EBBB4FF15318F14426EE850A73C2E7B86A44C7A5
                        APIs
                        • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0040499F
                          • Part of subcall function 004351FB: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,74D723A0,?,00431D09,?,005799D8,74D723A0,?,74D723A0,-00589880), ref: 0043525B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: ExceptionIos_base_dtorRaisestd::ios_base::_
                        • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                        • API String ID: 1903096808-1866435925
                        • Opcode ID: 5e8fcf04681b5496c91e096f1d273a5343178b8940b0c322b64de4dd1df32f3c
                        • Instruction ID: 99c94d1e80f512c720ba00148ae48faeb0acee82eabb402b7e5943aa58dcc262
                        • Opcode Fuzzy Hash: 5e8fcf04681b5496c91e096f1d273a5343178b8940b0c322b64de4dd1df32f3c
                        • Instruction Fuzzy Hash: AC119CF2844644ABCB10DF688C03BAB37C8E744715F04463EFE58972C1EB399800C79A
                        APIs
                        • GetConsoleOutputCP.KERNEL32(DDE7F8A2,00000000,00000000,?), ref: 00448F02
                          • Part of subcall function 0044EC55: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0044A862,?,00000000,-00000008), ref: 0044ECB6
                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00449154
                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0044919A
                        • GetLastError.KERNEL32 ref: 0044923D
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                        • String ID:
                        • API String ID: 2112829910-0
                        • Opcode ID: d46c0870a8277536d77cd1fa32924c999241811f2f15ebdbc3735bbe4b8907ba
                        • Instruction ID: b6f9ea87837ca93654473fd2bae4ec290e60b55bc3ade45d2d9d29a5185f0d60
                        • Opcode Fuzzy Hash: d46c0870a8277536d77cd1fa32924c999241811f2f15ebdbc3735bbe4b8907ba
                        • Instruction Fuzzy Hash: 70D1BC75D00249AFDF14CFA8C880AAEBBB5FF09304F28456AE856EB351D734AD45CB54
                        APIs
                        • WriteConsoleW.KERNEL32(?,?,?,00000000,?,?,00453DCE,?,00000001,?,?,?,00449291,?,00000000,00000000), ref: 00456D49
                        • GetLastError.KERNEL32(?,00453DCE,?,00000001,?,?,?,00449291,?,00000000,00000000,?,?,?,0044986B,?), ref: 00456D55
                          • Part of subcall function 00456D1B: CloseHandle.KERNEL32(FFFFFFFE,00456D65,?,00453DCE,?,00000001,?,?,?,00449291,?,00000000,00000000,?,?), ref: 00456D2B
                        • ___initconout.LIBCMT ref: 00456D65
                          • Part of subcall function 00456CDD: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00456D0C,00453DBB,?,?,00449291,?,00000000,00000000,?), ref: 00456CF0
                        • WriteConsoleW.KERNEL32(?,?,?,00000000,?,00453DCE,?,00000001,?,?,?,00449291,?,00000000,00000000,?), ref: 00456D7A
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                        • String ID:
                        • API String ID: 2744216297-0
                        • Opcode ID: 6d252f6c85546040703605b5d122fbb434f3c9b6b34be8e7cd3f73b3df330617
                        • Instruction ID: b582005f90f2c4d159ccd48a3422ceca8e6e351b7b3b67145bbef734a6de3f3c
                        • Opcode Fuzzy Hash: 6d252f6c85546040703605b5d122fbb434f3c9b6b34be8e7cd3f73b3df330617
                        • Instruction Fuzzy Hash: F4F01C37500518BBCF221FD1DC18A8A3F76EB583A2B814415FE0D96231D6328928EB94
                        APIs
                        • ___std_exception_copy.LIBVCRUNTIME ref: 00403819
                        • ___std_exception_destroy.LIBVCRUNTIME ref: 004038F0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: ___std_exception_copy___std_exception_destroy
                        • String ID: )@
                        • API String ID: 2970364248-4120265097
                        • Opcode ID: ed1ac0f14267c2b8626e9d784d9228836504f476972db074cc70cf608e0aac1a
                        • Instruction ID: 269ef50febfdc4b1c22cf7239a576f40f0b19685bcb009e1facc48eb6157c32a
                        • Opcode Fuzzy Hash: ed1ac0f14267c2b8626e9d784d9228836504f476972db074cc70cf608e0aac1a
                        • Instruction Fuzzy Hash: DD6169B1C00248DBDB10DF98C945B9EFFB5FF19324F14825EE814AB282D7B95A44CBA5
                        APIs
                        • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0040499F
                          • Part of subcall function 004351FB: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,74D723A0,?,00431D09,?,005799D8,74D723A0,?,74D723A0,-00589880), ref: 0043525B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: ExceptionIos_base_dtorRaisestd::ios_base::_
                        • String ID: ios_base::badbit set$ios_base::failbit set
                        • API String ID: 1903096808-1240500531
                        • Opcode ID: 8193a8ffeaccef37eb783ff7fe0bdc902a64c2974526b8af49cedd0c2b6b92ef
                        • Instruction ID: 59789774a96eacd1a5b8f49c51d8e497543063f0a2ed12b155596828dbf76f3a
                        • Opcode Fuzzy Hash: 8193a8ffeaccef37eb783ff7fe0bdc902a64c2974526b8af49cedd0c2b6b92ef
                        • Instruction Fuzzy Hash: E84124B2C00244ABCB04DF68C845BAEBBB8FB49710F14826EF554A73C1D7795A00CBA5
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 00404061
                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 004040C4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                        • String ID: bad locale name
                        • API String ID: 3988782225-1405518554
                        • Opcode ID: 0039d2d2ea2786ef81fe116e8b864d57793cf36a19fa060d6cb0c255b1586cee
                        • Instruction ID: 65c2995a4cce64452fc0e082f9126f7f9302ed92d60cad1113ce5137d9e79936
                        • Opcode Fuzzy Hash: 0039d2d2ea2786ef81fe116e8b864d57793cf36a19fa060d6cb0c255b1586cee
                        • Instruction Fuzzy Hash: DB112670805B84EED321CF69C50474BBFF0AF25714F10868DD09597781D3B9A604CB95
                        APIs
                        • ___std_exception_copy.LIBVCRUNTIME ref: 004165C9
                        • ___std_exception_copy.LIBVCRUNTIME ref: 004165FC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: ___std_exception_copy
                        • String ID: )@
                        • API String ID: 2659868963-4120265097
                        • Opcode ID: ec459901e9a8c12f2536e06f4ce64afd8286d8aca2aa337d2d7da09c98386d96
                        • Instruction ID: 79ebb971947c26e29da123751e765caa72f3f100f47198c89106861aa63fe252
                        • Opcode Fuzzy Hash: ec459901e9a8c12f2536e06f4ce64afd8286d8aca2aa337d2d7da09c98386d96
                        • Instruction Fuzzy Hash: F0112EB6910649EBCB11CF99C980B86FBF8FF09724F10876AE82497641E774A5448BA0
                        APIs
                        • ___std_exception_destroy.LIBVCRUNTIME ref: 00407A5C
                        • ___std_exception_destroy.LIBVCRUNTIME ref: 00407A72
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: ___std_exception_destroy
                        • String ID: )@
                        • API String ID: 4194217158-4120265097
                        • Opcode ID: 9ee8fa866bcea9d2c14fc14309fcadf8facde4318e0e6bb098ed358a1a235593
                        • Instruction ID: 96290d15a7b89a27e7413382239de33ac52fdad5c525fa7f0e86a9c1871ea130
                        • Opcode Fuzzy Hash: 9ee8fa866bcea9d2c14fc14309fcadf8facde4318e0e6bb098ed358a1a235593
                        • Instruction Fuzzy Hash: 68F012B1805744DFC711DF98C90178DFFF8FB05728F50466AE855A3780E7B5660487A5
                        APIs
                        • InitializeCriticalSectionAndSpinCount.KERNEL32(00000016,00000001,004389D2,00000001,00000016,00438BE1,?,?,?,?,?,00000000), ref: 0044B834
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.3251223374.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.3251198319.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251443342.000000000055D000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251486483.0000000000585000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251516517.000000000058A000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251547415.0000000000596000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000598000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000731000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000733000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000735000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000737000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000739000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073D000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000073F000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000741000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000747000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000074B000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000757000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000759000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000075E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000762000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000768000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076C000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000076E000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000770000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000772000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000774000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000776000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000778000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.000000000077A000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.0000000000786000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3251591537.00000000007B0000.00000040.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.3253399308.0000000000980000.00000020.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_AlCsIOd0pd.jbxd
                        Similarity
                        • API ID: CountCriticalInitializeSectionSpin
                        • String ID: InitializeCriticalSectionEx$`-@
                        • API String ID: 2593887523-3269949891
                        • Opcode ID: 1f2253b5c78e33ee57fe7f30907939316c5faef6f9275bf3e632fad4f43c2f0e
                        • Instruction ID: 5bcc12c1b0658f8dc7434a33690804c70bb56e7eadbb0958c8ec10a8e9d05d13
                        • Opcode Fuzzy Hash: 1f2253b5c78e33ee57fe7f30907939316c5faef6f9275bf3e632fad4f43c2f0e
                        • Instruction Fuzzy Hash: BDE09236581318BBCB212F92DC06DAE7F25EB24BA2F048022FD1956161C7768821BBD9

                        Execution Graph

                        Execution Coverage:4.6%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:2000
                        Total number of Limit Nodes:34
                        execution_graph 13655 4c7b00 13656 4c7ecc 13655->13656 13674 4c7b3e std::ios_base::_Ios_base_dtor __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 13655->13674 13657 4c7b87 setsockopt recv WSAGetLastError 13657->13656 13657->13674 13659 4c7eb7 Sleep 13659->13656 13659->13674 13660 4c7e15 recv 13662 4c7eaf Sleep 13660->13662 13662->13659 13664 4c7c2d recv 13665 4c7c4e recv 13664->13665 13664->13674 13665->13674 13667 4c7ee1 13793 438c70 13667->13793 13670 4c7cd6 setsockopt recv 13670->13674 13671 418dc0 42 API calls 13671->13670 13674->13657 13674->13659 13674->13660 13674->13662 13674->13667 13674->13670 13674->13671 13675 4c8590 WSAStartup 13674->13675 13688 418dc0 13674->13688 13697 4163b0 13674->13697 13702 4c7ef0 13674->13702 13774 433069 13674->13774 13777 409280 13674->13777 13676 4c8696 13675->13676 13677 4c85c8 13675->13677 13676->13674 13677->13676 13678 4c85fe getaddrinfo 13677->13678 13679 4c8646 13678->13679 13680 4c8690 WSACleanup 13678->13680 13681 4c86a4 FreeAddrInfoW 13679->13681 13683 4c8654 socket 13679->13683 13680->13676 13681->13680 13682 4c86b0 13681->13682 13682->13674 13683->13680 13684 4c866a connect 13683->13684 13685 4c867c closesocket 13684->13685 13686 4c86a0 13684->13686 13685->13683 13687 4c8686 FreeAddrInfoW 13685->13687 13686->13681 13687->13680 13690 418e11 13688->13690 13691 418de2 std::locale::_Setgloballocale 13688->13691 13689 418ef8 13690->13689 13798 4032d0 13690->13798 13691->13664 13693 418e66 std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 13694 418ecb std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 13693->13694 13812 402fe0 13693->13812 13694->13664 13696 418eb8 13696->13664 13699 4163d8 13697->13699 13698 4163e7 13698->13674 13699->13698 13700 4032d0 std::_Throw_Cpp_error 42 API calls 13699->13700 13701 41642a std::_Locinfo::_Locinfo_ctor 13700->13701 13701->13674 13703 4c7f6c 13702->13703 13704 4c7f3e 13702->13704 13706 4c7f8e 13703->13706 13707 4c7f74 13703->13707 13705 402cf0 std::_Throw_Cpp_error 42 API calls 13704->13705 13708 4c7f50 13705->13708 13710 4c7f96 13706->13710 13711 4c7fb0 13706->13711 14137 416290 13707->14137 13715 409280 45 API calls 13708->13715 13712 416290 42 API calls 13710->13712 13713 4c7fb8 13711->13713 13714 4c7fd5 13711->13714 13738 4c7f64 13712->13738 13718 416290 42 API calls 13713->13718 13713->13738 13716 4c7fdd 13714->13716 13717 4c7ffb 13714->13717 13715->13738 14141 4412b7 13716->14141 13722 4c801b 13717->13722 13723 4c82c0 13717->13723 13717->13738 13718->13738 13720 402df0 std::_Throw_Cpp_error 42 API calls 13721 4c84f1 13720->13721 13721->13674 14089 405400 13722->14089 13724 4c82c8 13723->13724 13725 4c831b 13723->13725 14189 41b430 13724->14189 13728 4c8376 13725->13728 13729 4c8323 13725->13729 13730 4c837e 13728->13730 13731 4c83d1 13728->13731 13732 41b430 55 API calls 13729->13732 13733 41b430 55 API calls 13730->13733 13735 4c842c 13731->13735 13736 4c83d9 13731->13736 13732->13738 13733->13738 13734 4c82a5 14186 432baa 13734->14186 13741 4c8484 13735->13741 13742 4c8434 13735->13742 13740 41b430 55 API calls 13736->13740 13738->13720 13740->13738 13741->13738 14198 458b00 13741->14198 13743 41b430 55 API calls 13742->13743 13743->13738 13745 4c849a 14203 4162c0 13745->14203 13749 402df0 std::_Throw_Cpp_error 42 API calls 13749->13738 13750 402df0 42 API calls std::_Throw_Cpp_error 13752 4c8040 13750->13752 13751 4c810b 14106 402d30 13751->14106 13752->13734 13752->13750 13752->13751 14099 402cf0 13752->14099 14103 41ace0 13752->14103 13756 4c8140 14123 402df0 13756->14123 13758 4c814f 13759 4c81b2 GetCurrentProcess 13758->13759 13762 4c81e5 13758->13762 13760 4163b0 std::_Throw_Cpp_error 42 API calls 13759->13760 13761 4c81ce 13760->13761 14147 4cf280 VirtualAllocEx WriteProcessMemory 13761->14147 14134 439820 13762->14134 13765 4c81dd 13767 4c8279 13765->13767 14180 415230 13767->14180 13772 402df0 std::_Throw_Cpp_error 42 API calls 13772->13734 16261 43361d 13774->16261 13778 4163b0 std::_Throw_Cpp_error 42 API calls 13777->13778 13780 4092d4 13778->13780 13779 402df0 std::_Throw_Cpp_error 42 API calls 13781 409482 13779->13781 13780->13779 13782 418dc0 42 API calls 13781->13782 13784 409523 std::_Locinfo::_Locinfo_ctor 13781->13784 13782->13784 13783 4095f0 GetModuleHandleA GetProcAddress WSASend 13783->13784 13785 4096e2 std::ios_base::_Ios_base_dtor 13783->13785 13784->13783 13784->13785 13786 40975d std::ios_base::_Ios_base_dtor 13785->13786 13787 438c70 std::_Throw_Cpp_error 40 API calls 13785->13787 13786->13674 13788 40979c 13787->13788 13789 402df0 std::_Throw_Cpp_error 42 API calls 13788->13789 13790 4097d7 13789->13790 13791 402df0 std::_Throw_Cpp_error 42 API calls 13790->13791 13792 4097f0 13791->13792 13792->13674 13794 438bac ___std_exception_copy 40 API calls 13793->13794 13795 438c7f 13794->13795 13796 438c8d __Getctype 11 API calls 13795->13796 13797 438c8c 13796->13797 13799 4032e2 13798->13799 13800 403306 13798->13800 13802 4032e9 13799->13802 13803 40331f 13799->13803 13801 403318 13800->13801 13804 433672 std::_Facet_Register 42 API calls 13800->13804 13801->13693 13817 433672 13802->13817 13828 402b50 13803->13828 13807 403310 13804->13807 13807->13693 13808 4032ef 13809 438c70 std::_Throw_Cpp_error 40 API calls 13808->13809 13810 4032f8 13808->13810 13811 403329 13809->13811 13810->13693 13813 403007 13812->13813 13814 403017 std::ios_base::_Ios_base_dtor 13812->13814 13813->13814 13815 438c70 std::_Throw_Cpp_error 40 API calls 13813->13815 13814->13696 13816 403036 13815->13816 13819 433677 13817->13819 13820 433691 13819->13820 13823 402b50 Concurrency::cancel_current_task 13819->13823 13834 4423ec 13819->13834 13852 445a89 13819->13852 13820->13808 13822 43369d 13822->13822 13823->13822 13841 4351fb 13823->13841 13825 402b6c 13844 434b15 13825->13844 13829 402b5e Concurrency::cancel_current_task 13828->13829 13830 4351fb std::_Throw_Cpp_error RaiseException 13829->13830 13831 402b6c 13830->13831 13832 434b15 ___std_exception_copy 41 API calls 13831->13832 13833 402bac 13832->13833 13833->13808 13840 44b094 __Getctype 13834->13840 13835 44b0d2 13855 4416ff 13835->13855 13836 44b0bd RtlAllocateHeap 13838 44b0d0 13836->13838 13836->13840 13838->13819 13839 445a89 std::_Facet_Register 2 API calls 13839->13840 13840->13835 13840->13836 13840->13839 13842 435242 RaiseException 13841->13842 13843 435215 13841->13843 13842->13825 13843->13842 13845 434b22 13844->13845 13850 402bac 13844->13850 13846 4423ec ___std_exception_copy 15 API calls 13845->13846 13845->13850 13847 434b3f 13846->13847 13851 434b4f 13847->13851 13979 4499a5 13847->13979 13850->13808 13988 441c96 13851->13988 14078 445ab5 13852->14078 13858 449f93 GetLastError 13855->13858 13857 441704 13857->13838 13859 449faf 13858->13859 13860 449fa9 13858->13860 13864 449fb3 SetLastError 13859->13864 13886 44b69b 13859->13886 13881 44b65c 13860->13881 13864->13857 13868 449fe8 13870 44b69b __Getctype 6 API calls 13868->13870 13869 449ff9 13871 44b69b __Getctype 6 API calls 13869->13871 13872 449ff6 13870->13872 13873 44a005 13871->13873 13898 44b01a 13872->13898 13874 44a020 13873->13874 13875 44a009 13873->13875 13904 449c70 13874->13904 13878 44b69b __Getctype 6 API calls 13875->13878 13878->13872 13880 44b01a __freea 12 API calls 13880->13864 13909 44b449 13881->13909 13883 44b678 13884 44b693 TlsGetValue 13883->13884 13885 44b681 13883->13885 13885->13859 13887 44b449 std::locale::_Setgloballocale 5 API calls 13886->13887 13888 44b6b7 13887->13888 13889 44b6d5 TlsSetValue 13888->13889 13890 449fcb 13888->13890 13890->13864 13891 44a65a 13890->13891 13897 44a667 __Getctype 13891->13897 13892 44a6a7 13894 4416ff __floor_pentium4 13 API calls 13892->13894 13893 44a692 RtlAllocateHeap 13895 449fe0 13893->13895 13893->13897 13894->13895 13895->13868 13895->13869 13896 445a89 std::_Facet_Register 2 API calls 13896->13897 13897->13892 13897->13893 13897->13896 13899 44b025 HeapFree 13898->13899 13900 44b04f 13898->13900 13899->13900 13901 44b03a GetLastError 13899->13901 13900->13864 13902 44b047 __freea 13901->13902 13903 4416ff __floor_pentium4 12 API calls 13902->13903 13903->13900 13923 449b04 13904->13923 13910 44b479 13909->13910 13914 44b475 std::locale::_Setgloballocale 13909->13914 13910->13914 13915 44b37e 13910->13915 13913 44b493 GetProcAddress 13913->13914 13914->13883 13916 44b38f std::locale::_Setgloballocale 13915->13916 13917 44b425 13916->13917 13918 44b3ad LoadLibraryExW 13916->13918 13922 44b3fb LoadLibraryExW 13916->13922 13917->13913 13917->13914 13919 44b42c 13918->13919 13920 44b3c8 GetLastError 13918->13920 13919->13917 13921 44b43e FreeLibrary 13919->13921 13920->13916 13921->13917 13922->13916 13922->13919 13924 449b10 std::locale::_Setgloballocale 13923->13924 13937 44424b RtlEnterCriticalSection 13924->13937 13926 449b1a 13938 449b4a 13926->13938 13929 449c16 13930 449c22 std::locale::_Setgloballocale 13929->13930 13942 44424b RtlEnterCriticalSection 13930->13942 13932 449c2c 13943 449df7 13932->13943 13934 449c44 13947 449c64 13934->13947 13937->13926 13941 444293 RtlLeaveCriticalSection 13938->13941 13940 449b38 13940->13929 13941->13940 13942->13932 13944 449e06 __Getctype 13943->13944 13946 449e2d __Getctype 13943->13946 13944->13946 13950 452146 13944->13950 13946->13934 13978 444293 RtlLeaveCriticalSection 13947->13978 13949 449c52 13949->13880 13952 4521c6 13950->13952 13953 45215c 13950->13953 13951 4522b7 __Getctype 14 API calls 13971 452222 13951->13971 13954 44b01a __freea 14 API calls 13952->13954 13977 452214 13952->13977 13953->13952 13958 44b01a __freea 14 API calls 13953->13958 13959 45218f 13953->13959 13955 4521e8 13954->13955 13956 44b01a __freea 14 API calls 13955->13956 13960 4521fb 13956->13960 13957 44b01a __freea 14 API calls 13961 4521bb 13957->13961 13963 452184 13958->13963 13964 44b01a __freea 14 API calls 13959->13964 13976 4521b1 13959->13976 13965 44b01a __freea 14 API calls 13960->13965 13966 44b01a __freea 14 API calls 13961->13966 13962 452282 13967 44b01a __freea 14 API calls 13962->13967 13968 45144a __Getctype 14 API calls 13963->13968 13969 4521a6 13964->13969 13970 452209 13965->13970 13966->13952 13973 452288 13967->13973 13968->13959 13974 4518a9 __Getctype 14 API calls 13969->13974 13975 44b01a __freea 14 API calls 13970->13975 13971->13962 13972 44b01a 14 API calls __freea 13971->13972 13972->13971 13973->13946 13974->13976 13975->13977 13976->13957 13977->13951 13978->13949 13980 4499b3 13979->13980 13982 4499c1 13979->13982 13980->13982 13986 4499d9 13980->13986 13981 4416ff __floor_pentium4 14 API calls 13983 4499c9 13981->13983 13982->13981 13991 438c60 13983->13991 13985 4499d3 13985->13851 13986->13985 13987 4416ff __floor_pentium4 14 API calls 13986->13987 13987->13983 13989 44b01a __freea 14 API calls 13988->13989 13990 441cae 13989->13990 13990->13850 13994 438bac 13991->13994 13995 438bbe ___std_exception_copy 13994->13995 14000 438be3 13995->14000 13997 438bd6 14011 43899c 13997->14011 14001 438bf3 14000->14001 14002 438bfa 14000->14002 14017 438a01 GetLastError 14001->14017 14007 438c08 14002->14007 14021 4389d8 14002->14021 14005 438c2f 14005->14007 14024 438c8d IsProcessorFeaturePresent 14005->14024 14007->13997 14008 438c5f 14009 438bac ___std_exception_copy 40 API calls 14008->14009 14010 438c6c 14009->14010 14010->13997 14012 4389a8 14011->14012 14013 4389bf 14012->14013 14056 438a47 14012->14056 14015 4389d2 14013->14015 14016 438a47 ___std_exception_copy 40 API calls 14013->14016 14015->13985 14016->14015 14018 438a1a 14017->14018 14028 44a044 14018->14028 14022 4389e3 GetLastError SetLastError 14021->14022 14023 4389fc 14021->14023 14022->14005 14023->14005 14025 438c99 14024->14025 14050 438a64 14025->14050 14029 44a057 14028->14029 14033 44a05d 14028->14033 14031 44b65c __Getctype 6 API calls 14029->14031 14030 44b69b __Getctype 6 API calls 14032 44a077 14030->14032 14031->14033 14034 438a32 SetLastError 14032->14034 14035 44a65a __Getctype 14 API calls 14032->14035 14033->14030 14033->14034 14034->14002 14036 44a087 14035->14036 14037 44a0a4 14036->14037 14038 44a08f 14036->14038 14040 44b69b __Getctype 6 API calls 14037->14040 14039 44b69b __Getctype 6 API calls 14038->14039 14042 44a09b 14039->14042 14041 44a0b0 14040->14041 14043 44a0b4 14041->14043 14044 44a0c3 14041->14044 14047 44b01a __freea 14 API calls 14042->14047 14045 44b69b __Getctype 6 API calls 14043->14045 14046 449c70 __Getctype 14 API calls 14044->14046 14045->14042 14048 44a0ce 14046->14048 14047->14034 14049 44b01a __freea 14 API calls 14048->14049 14049->14034 14051 438a80 std::locale::_Setgloballocale 14050->14051 14052 438aac IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 14051->14052 14053 438b7d std::locale::_Setgloballocale 14052->14053 14054 433d77 _ValidateLocalCookies 5 API calls 14053->14054 14055 438b9b GetCurrentProcess TerminateProcess 14054->14055 14055->14008 14057 438a51 14056->14057 14058 438a5a 14056->14058 14059 438a01 ___std_exception_copy 16 API calls 14057->14059 14058->14013 14060 438a56 14059->14060 14060->14058 14063 4441c6 14060->14063 14064 44f620 std::locale::_Setgloballocale RtlEnterCriticalSection RtlLeaveCriticalSection 14063->14064 14065 4441cb 14064->14065 14066 4441d6 14065->14066 14069 44f665 std::locale::_Setgloballocale 39 API calls 14065->14069 14067 4441e0 IsProcessorFeaturePresent 14066->14067 14068 4441ff 14066->14068 14070 4441ec 14067->14070 14071 4436e2 std::locale::_Setgloballocale 20 API calls 14068->14071 14069->14066 14072 438a64 std::locale::_Setgloballocale 8 API calls 14070->14072 14074 444209 14071->14074 14072->14068 14073 44b7f4 std::locale::_Setgloballocale 6 API calls 14073->14074 14074->14073 14075 44423e 14074->14075 14076 438a63 14074->14076 14077 444262 __Getctype RtlDeleteCriticalSection 14075->14077 14077->14076 14079 445ac1 std::locale::_Setgloballocale 14078->14079 14084 44424b RtlEnterCriticalSection 14079->14084 14081 445acc std::locale::_Setgloballocale 14085 445b03 14081->14085 14084->14081 14088 444293 RtlLeaveCriticalSection 14085->14088 14087 445a94 14087->13819 14088->14087 14207 432b99 14089->14207 14092 405410 14093 405419 14092->14093 14095 432534 std::_Throw_Cpp_error 78 API calls 14092->14095 14093->13752 14096 405430 14095->14096 14218 43953c 14096->14218 14100 402d13 14099->14100 14100->14100 14101 403040 std::_Throw_Cpp_error 42 API calls 14100->14101 14102 402d25 14101->14102 14102->13752 14104 41ad10 14103->14104 14104->14104 14784 41fbf0 14104->14784 14107 403040 std::_Throw_Cpp_error 42 API calls 14106->14107 14108 402d55 14107->14108 14109 4d62c0 14108->14109 14110 4d6358 14109->14110 14122 4d6361 std::locale::_Setgloballocale 14109->14122 14793 41e4b0 14110->14793 14113 4d654f 14116 4d6553 14113->14116 14897 416130 14113->14897 14117 4d6580 std::ios_base::_Ios_base_dtor 14116->14117 14118 438c70 std::_Throw_Cpp_error 40 API calls 14116->14118 14117->13756 14119 4d65ce 14118->14119 14120 433069 __Xtime_get_ticks 2 API calls 14119->14120 14121 4d65d6 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 14120->14121 14121->13756 14122->14113 14122->14116 14816 4f4760 14122->14816 14827 424160 14122->14827 14124 402e13 14123->14124 14125 402e2e std::ios_base::_Ios_base_dtor 14123->14125 14124->14125 14126 438c70 std::_Throw_Cpp_error 40 API calls 14124->14126 14125->13758 14127 402e5f 14126->14127 14128 402e88 14127->14128 14129 4032d0 std::_Throw_Cpp_error 42 API calls 14127->14129 14128->13758 14131 402eee std::_Locinfo::_Locinfo_ctor 14129->14131 14130 402f3c std::_Locinfo::_Locinfo_ctor 14130->13758 14131->14130 14132 402fe0 std::_Throw_Cpp_error 40 API calls 14131->14132 14133 402f2b 14132->14133 14133->13758 14995 43975e 14134->14995 14138 4162b1 14137->14138 14139 41629d 14137->14139 14138->13738 14140 416130 42 API calls 14139->14140 14140->14138 14142 4412ca ___std_exception_copy 14141->14142 15046 43d6a5 14142->15046 14144 4412e4 14145 43899c ___std_exception_copy 40 API calls 14144->14145 14146 4412f1 14145->14146 14146->13738 14148 4cf31d 14147->14148 14149 4cf35a VirtualAllocEx 14147->14149 14150 4cf323 WriteProcessMemory 14148->14150 14151 4cf3cf std::locale::_Setgloballocale 14149->14151 14150->14150 14152 4cf357 14150->14152 15262 41ab20 14151->15262 14152->14149 14155 418f00 std::_Throw_Cpp_error 42 API calls 14156 4cf47f 14155->14156 14157 402df0 std::_Throw_Cpp_error 42 API calls 14156->14157 14158 4cf4c9 14157->14158 15267 403440 14158->15267 14161 4cf56d 14162 4cf58b std::ios_base::_Ios_base_dtor 14161->14162 14164 4cf5c9 14161->14164 14163 402df0 std::_Throw_Cpp_error 42 API calls 14162->14163 14165 4cf5b6 14163->14165 14166 438c70 std::_Throw_Cpp_error 40 API calls 14164->14166 14165->13765 14167 4cf5ce 14166->14167 14167->13765 14168 441628 14169 44163b ___std_exception_copy 14168->14169 15524 44140a 14169->15524 14171 441650 14172 43899c ___std_exception_copy 40 API calls 14171->14172 14173 44165d 14172->14173 14174 43d0a8 14173->14174 14175 43d0bb ___std_exception_copy 14174->14175 15694 43cf83 14175->15694 14177 43d0c7 14178 43899c ___std_exception_copy 40 API calls 14177->14178 14179 43d0d3 14178->14179 14179->13767 14181 415286 14180->14181 14182 41524c 14180->14182 14183 402df0 std::_Throw_Cpp_error 42 API calls 14181->14183 14182->14181 14185 402df0 std::_Throw_Cpp_error 42 API calls 14182->14185 14184 415294 14183->14184 14184->13772 14185->14182 14187 432bb6 RtlReleaseSRWLockExclusive 14186->14187 14188 432bc4 14186->14188 14187->14188 14188->13738 15786 417ef0 14189->15786 14191 41b48d 15805 422100 14191->15805 14195 41b503 15875 41d490 14195->15875 14197 41b512 14197->13738 16230 458bb0 14198->16230 14200 458b31 std::_Locinfo::_Locinfo_ctor 14201 403040 std::_Throw_Cpp_error 42 API calls 14200->14201 14202 458b7c 14201->14202 14202->13745 14204 4162ce 14203->14204 14206 4162d3 14203->14206 14205 402df0 std::_Throw_Cpp_error 42 API calls 14204->14205 14205->14206 14206->13749 14224 432bc8 GetCurrentThreadId 14207->14224 14210 432534 14211 43254a std::_Throw_Cpp_error 14210->14211 14250 4324e7 14211->14250 14219 43954f ___std_exception_copy 14218->14219 14758 4393db 14219->14758 14221 43955e 14222 43899c ___std_exception_copy 40 API calls 14221->14222 14223 405450 14222->14223 14223->13752 14225 432bf2 14224->14225 14226 432c11 14224->14226 14227 432bf7 RtlAcquireSRWLockExclusive 14225->14227 14235 432c07 14225->14235 14228 432c31 14226->14228 14229 432c1a 14226->14229 14227->14235 14231 432c90 14228->14231 14237 432c49 14228->14237 14230 432c25 RtlAcquireSRWLockExclusive 14229->14230 14229->14235 14230->14235 14232 432c97 RtlTryAcquireSRWLockExclusive 14231->14232 14231->14235 14232->14235 14234 405409 14234->14092 14234->14210 14242 433d77 14235->14242 14237->14235 14238 432c80 RtlTryAcquireSRWLockExclusive 14237->14238 14239 43302b 14237->14239 14238->14235 14238->14237 14240 433069 __Xtime_get_ticks 2 API calls 14239->14240 14241 433036 __aulldiv __aullrem 14240->14241 14241->14237 14243 433d80 IsProcessorFeaturePresent 14242->14243 14244 433d7f 14242->14244 14246 43455a 14243->14246 14244->14234 14249 43451d SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 14246->14249 14248 43463d 14248->14234 14249->14248 14251 4324f3 __EH_prolog3_GS 14250->14251 14252 402cf0 std::_Throw_Cpp_error 42 API calls 14251->14252 14253 432507 14252->14253 14273 4036e0 14253->14273 14255 43251c 14256 402df0 std::_Throw_Cpp_error 42 API calls 14255->14256 14257 432524 14256->14257 14289 433f6d 14257->14289 14274 4163b0 std::_Throw_Cpp_error 42 API calls 14273->14274 14275 403731 14274->14275 14277 40375a 14275->14277 14292 418f00 14275->14292 14278 418f00 std::_Throw_Cpp_error 42 API calls 14277->14278 14279 40378a 14278->14279 14280 402df0 std::_Throw_Cpp_error 42 API calls 14279->14280 14281 4037a4 14280->14281 14282 434b15 ___std_exception_copy 41 API calls 14281->14282 14284 40381e 14282->14284 14283 40385f std::ios_base::_Ios_base_dtor 14283->14255 14284->14283 14285 438c70 std::_Throw_Cpp_error 40 API calls 14284->14285 14286 4038b0 14285->14286 14301 434b78 14286->14301 14288 4038f5 std::ios_base::_Ios_base_dtor 14288->14255 14290 433d77 _ValidateLocalCookies 5 API calls 14289->14290 14291 433f77 14290->14291 14291->14291 14293 418f22 std::_Locinfo::_Locinfo_ctor 14292->14293 14294 418f4f 14292->14294 14293->14277 14295 4032d0 std::_Throw_Cpp_error 42 API calls 14294->14295 14296 41902f std::ios_base::_Ios_base_dtor 14294->14296 14297 418fa4 std::_Locinfo::_Locinfo_ctor 14295->14297 14296->14277 14298 419002 std::_Locinfo::_Locinfo_ctor 14297->14298 14299 402fe0 std::_Throw_Cpp_error 40 API calls 14297->14299 14298->14277 14300 418fef 14299->14300 14300->14277 14302 434b85 14301->14302 14303 434b8c 14301->14303 14304 441c96 __freea 14 API calls 14302->14304 14303->14288 14304->14303 14759 4393e7 std::locale::_Setgloballocale 14758->14759 14760 4393f0 14759->14760 14761 439414 14759->14761 14763 438be3 ___std_exception_copy 40 API calls 14760->14763 14772 441250 RtlEnterCriticalSection 14761->14772 14771 439409 14763->14771 14764 43941d 14765 439432 14764->14765 14773 44a1e9 14764->14773 14767 4394cf 14765->14767 14768 43949e 14765->14768 14780 439507 14767->14780 14769 438be3 ___std_exception_copy 40 API calls 14768->14769 14769->14771 14771->14221 14772->14764 14774 44a1f5 14773->14774 14775 44a20a 14773->14775 14776 4416ff __floor_pentium4 14 API calls 14774->14776 14775->14765 14777 44a1fa 14776->14777 14778 438c60 ___std_exception_copy 40 API calls 14777->14778 14779 44a205 14778->14779 14779->14765 14783 441264 RtlLeaveCriticalSection 14780->14783 14782 43950d 14782->14771 14783->14782 14785 41fc12 std::_Locinfo::_Locinfo_ctor 14784->14785 14787 41fc8d 14784->14787 14786 41fd5e 14787->14786 14788 4032d0 std::_Throw_Cpp_error 42 API calls 14787->14788 14789 41fce1 std::_Locinfo::_Locinfo_ctor 14788->14789 14790 41fd3a std::_Locinfo::_Locinfo_ctor 14789->14790 14791 402fe0 std::_Throw_Cpp_error 40 API calls 14789->14791 14792 41fd27 14791->14792 14794 41e4c2 14793->14794 14795 41e528 14793->14795 14797 41e4f9 14794->14797 14798 41e4ca 14794->14798 14908 403330 14795->14908 14801 41e516 14797->14801 14804 433672 std::_Facet_Register 42 API calls 14797->14804 14799 41e52d 14798->14799 14800 41e4d1 14798->14800 14802 402b50 Concurrency::cancel_current_task 42 API calls 14799->14802 14803 433672 std::_Facet_Register 42 API calls 14800->14803 14801->14122 14806 41e4d7 14802->14806 14803->14806 14805 41e503 14804->14805 14805->14122 14807 438c70 std::_Throw_Cpp_error 40 API calls 14806->14807 14808 41e4e0 14806->14808 14809 41e537 14807->14809 14808->14122 14911 416ad0 14809->14911 14811 404900 std::_Throw_Cpp_error 42 API calls 14814 41e5fb 14811->14814 14812 41e574 14812->14811 14813 41e613 14813->14122 14814->14813 14915 419b60 14814->14915 14817 4f4767 14816->14817 14818 4f476c 14816->14818 14817->14122 14819 4423ec ___std_exception_copy 15 API calls 14818->14819 14825 4f47af 14818->14825 14819->14825 14820 4f47c2 14820->14122 14821 4f4877 14821->14122 14822 441c96 __freea 14 API calls 14823 4f4867 14822->14823 14823->14122 14824 4f4821 14824->14821 14824->14822 14825->14820 14825->14824 14826 441c96 __freea 14 API calls 14825->14826 14826->14824 14828 424195 14827->14828 14829 424288 14827->14829 14831 4241b1 14828->14831 14832 424202 14828->14832 14833 4241f2 14828->14833 14830 403330 42 API calls 14829->14830 14834 42428d 14830->14834 14836 433672 std::_Facet_Register 42 API calls 14831->14836 14838 433672 std::_Facet_Register 42 API calls 14832->14838 14844 4241cf std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 14832->14844 14833->14831 14833->14834 14835 402b50 Concurrency::cancel_current_task 42 API calls 14834->14835 14837 424292 14835->14837 14839 4241c4 14836->14839 14840 438c70 std::_Throw_Cpp_error 40 API calls 14837->14840 14838->14844 14839->14837 14839->14844 14841 424297 14840->14841 14842 4242fa 14841->14842 14843 4243e9 14841->14843 14961 426ff0 14842->14961 14845 403330 42 API calls 14843->14845 14956 4277d0 14844->14956 14846 4243ee 14845->14846 14848 42445a 14846->14848 14849 424549 14846->14849 14853 426ff0 42 API calls 14848->14853 14852 403330 42 API calls 14849->14852 14851 42425e 14851->14122 14860 42454e 14852->14860 14855 424496 14853->14855 14854 42470b 14857 403330 42 API calls 14854->14857 14859 4163b0 std::_Throw_Cpp_error 42 API calls 14855->14859 14856 424706 14861 402b50 Concurrency::cancel_current_task 42 API calls 14856->14861 14862 4246af 14857->14862 14858 424336 14969 427830 14858->14969 14874 4244c4 14859->14874 14860->14854 14860->14856 14863 424615 14860->14863 14864 4245ee 14860->14864 14861->14854 14865 438c70 std::_Throw_Cpp_error 40 API calls 14862->14865 14888 4246d1 std::ios_base::_Ios_base_dtor 14862->14888 14871 433672 std::_Facet_Register 42 API calls 14863->14871 14876 4245ff 14863->14876 14864->14856 14866 4245f9 14864->14866 14867 424715 14865->14867 14868 433672 std::_Facet_Register 42 API calls 14866->14868 14986 41d010 14867->14986 14868->14876 14871->14876 14872 4243b0 14872->14122 14877 427830 42 API calls 14874->14877 14876->14862 14876->14888 14976 431f9c 14876->14976 14879 424510 14877->14879 14878 42472f 14880 4351fb std::_Throw_Cpp_error RaiseException 14878->14880 14879->14122 14881 424738 14880->14881 14882 424798 14881->14882 14883 42475b 14881->14883 14884 42477f 14881->14884 14885 402b50 Concurrency::cancel_current_task 42 API calls 14882->14885 14883->14882 14886 424762 14883->14886 14887 424791 14884->14887 14891 433672 std::_Facet_Register 42 API calls 14884->14891 14889 424768 14885->14889 14890 433672 std::_Facet_Register 42 API calls 14886->14890 14887->14122 14888->14122 14893 438c70 std::_Throw_Cpp_error 40 API calls 14889->14893 14896 424771 14889->14896 14890->14889 14894 424789 14891->14894 14895 4247a2 14893->14895 14894->14122 14896->14122 14898 416143 std::_Locinfo::_Locinfo_ctor 14897->14898 14899 416174 14897->14899 14898->14116 14900 416200 14899->14900 14901 416180 14899->14901 14903 418f00 std::_Throw_Cpp_error 42 API calls 14900->14903 14902 4032d0 std::_Throw_Cpp_error 42 API calls 14901->14902 14906 4161bf std::_Locinfo::_Locinfo_ctor 14902->14906 14904 416232 14903->14904 14904->14116 14905 4161ed 14905->14116 14906->14905 14907 402fe0 std::_Throw_Cpp_error 40 API calls 14906->14907 14907->14905 14919 431cea 14908->14919 14912 416b02 14911->14912 14913 416b1d 14912->14913 14945 4150e0 14912->14945 14913->14812 14916 419bbb 14915->14916 14917 419b96 14915->14917 14916->14813 14917->14916 14953 4188a0 14917->14953 14932 431a9f 14919->14932 14922 4351fb std::_Throw_Cpp_error RaiseException 14923 431d09 14922->14923 14935 431af4 14923->14935 14926 4351fb std::_Throw_Cpp_error RaiseException 14927 431d29 14926->14927 14938 431b37 14927->14938 14930 4351fb std::_Throw_Cpp_error RaiseException 14931 431d49 14930->14931 14942 4034e0 14932->14942 14936 4034e0 std::invalid_argument::invalid_argument 41 API calls 14935->14936 14937 431b06 14936->14937 14937->14926 14939 431b4b std::regex_error::regex_error 14938->14939 14940 4034e0 std::invalid_argument::invalid_argument 41 API calls 14939->14940 14941 431b54 14940->14941 14941->14930 14943 434b15 ___std_exception_copy 41 API calls 14942->14943 14944 403522 14943->14944 14944->14922 14946 4151b5 14945->14946 14947 415117 14945->14947 14946->14913 14948 416ad0 42 API calls 14947->14948 14949 415120 14948->14949 14950 41519d 14949->14950 14951 404900 std::_Throw_Cpp_error 42 API calls 14949->14951 14950->14946 14952 419b60 42 API calls 14950->14952 14951->14950 14952->14946 14954 404900 std::_Throw_Cpp_error 42 API calls 14953->14954 14955 4188bf 14954->14955 14955->14916 14957 4277dc 14956->14957 14958 4277f9 std::ios_base::_Ios_base_dtor 14956->14958 14957->14958 14959 438c70 std::_Throw_Cpp_error 40 API calls 14957->14959 14958->14851 14960 427824 14959->14960 14962 42703c 14961->14962 14963 426ff9 14961->14963 14962->14962 14963->14962 14964 427013 14963->14964 14966 433672 std::_Facet_Register 42 API calls 14963->14966 14965 42701c 14964->14965 14967 433672 std::_Facet_Register 42 API calls 14964->14967 14965->14858 14966->14964 14968 427035 14967->14968 14968->14858 14972 427882 std::ios_base::_Ios_base_dtor 14969->14972 14973 42783d 14969->14973 14970 427853 14970->14972 14974 438c70 std::_Throw_Cpp_error 40 API calls 14970->14974 14971 402df0 std::_Throw_Cpp_error 42 API calls 14971->14973 14972->14872 14973->14970 14973->14971 14975 4278b6 14974->14975 14977 431fb2 14976->14977 14978 431fa5 FindClose 14976->14978 14977->14876 14978->14977 14979 431fb6 14978->14979 14980 4441c6 __Getctype 40 API calls 14979->14980 14981 431fbb 14980->14981 14982 431f9c 40 API calls 14981->14982 14983 431fca FindFirstFileExW 14982->14983 14984 431fe5 14983->14984 14985 431fe9 GetLastError 14983->14985 14984->14876 14985->14984 14987 41d01a 14986->14987 14988 41d02e 14986->14988 14987->14988 14989 431f9c 43 API calls 14987->14989 14990 419910 14988->14990 14989->14987 14991 419928 14990->14991 14992 419938 std::ios_base::_Ios_base_dtor 14990->14992 14991->14992 14993 438c70 std::_Throw_Cpp_error 40 API calls 14991->14993 14992->14878 14994 41994d 14993->14994 14997 43976a std::locale::_Setgloballocale 14995->14997 14996 439771 14998 4416ff __floor_pentium4 14 API calls 14996->14998 14997->14996 15000 439791 14997->15000 14999 439776 14998->14999 15001 438c60 ___std_exception_copy 40 API calls 14999->15001 15002 4397a3 15000->15002 15003 439796 15000->15003 15004 439781 15001->15004 15012 44a8ef 15002->15012 15005 4416ff __floor_pentium4 14 API calls 15003->15005 15004->13767 15004->14168 15005->15004 15008 4397b3 15010 4416ff __floor_pentium4 14 API calls 15008->15010 15009 4397c0 15020 4397fe 15009->15020 15010->15004 15013 44a8fb std::locale::_Setgloballocale 15012->15013 15024 44424b RtlEnterCriticalSection 15013->15024 15015 44a909 15025 44a993 15015->15025 15021 439802 15020->15021 15045 441264 RtlLeaveCriticalSection 15021->15045 15023 439813 15023->15004 15024->15015 15032 44a9b6 15025->15032 15026 44aa0e 15027 44a65a __Getctype 14 API calls 15026->15027 15028 44aa17 15027->15028 15030 44b01a __freea 14 API calls 15028->15030 15031 44aa20 15030->15031 15033 44b7f4 std::locale::_Setgloballocale 6 API calls 15031->15033 15037 44a916 15031->15037 15032->15026 15032->15032 15032->15037 15041 441250 RtlEnterCriticalSection 15032->15041 15042 441264 RtlLeaveCriticalSection 15032->15042 15034 44aa3f 15033->15034 15043 441250 RtlEnterCriticalSection 15034->15043 15038 44a94f 15037->15038 15044 444293 RtlLeaveCriticalSection 15038->15044 15040 4397ac 15040->15008 15040->15009 15041->15032 15042->15032 15043->15037 15044->15040 15045->15023 15060 43ce79 15046->15060 15048 43d6ff 15054 43d723 15048->15054 15067 43e1d0 15048->15067 15049 43d6b7 15049->15048 15050 43d6cc 15049->15050 15059 43d6e7 std::_Locinfo::_Locinfo_ctor 15049->15059 15052 438be3 ___std_exception_copy 40 API calls 15050->15052 15052->15059 15056 43d747 15054->15056 15074 43ce94 15054->15074 15055 43d7cf 15057 43ce22 40 API calls 15055->15057 15056->15055 15081 43ce22 15056->15081 15057->15059 15059->14144 15061 43ce91 15060->15061 15062 43ce7e 15060->15062 15061->15049 15063 4416ff __floor_pentium4 14 API calls 15062->15063 15064 43ce83 15063->15064 15065 438c60 ___std_exception_copy 40 API calls 15064->15065 15066 43ce8e 15065->15066 15066->15049 15068 438a47 ___std_exception_copy 40 API calls 15067->15068 15069 43e1e0 15068->15069 15087 44a15a 15069->15087 15075 43cea0 15074->15075 15076 43ceb6 15074->15076 15077 44454e __Getctype 40 API calls 15075->15077 15078 43cec6 15076->15078 15231 449a39 15076->15231 15079 43ceab std::_Locinfo::_Locinfo_ctor 15077->15079 15078->15054 15079->15054 15082 43ce33 15081->15082 15083 43ce47 15081->15083 15082->15083 15084 4416ff __floor_pentium4 14 API calls 15082->15084 15083->15055 15085 43ce3c 15084->15085 15086 438c60 ___std_exception_copy 40 API calls 15085->15086 15086->15083 15088 44a171 15087->15088 15089 43e1fd 15087->15089 15088->15089 15090 452392 __Getctype 40 API calls 15088->15090 15091 44a1b8 15089->15091 15090->15089 15092 43e20a 15091->15092 15093 44a1cf 15091->15093 15092->15054 15093->15092 15095 4506bd 15093->15095 15096 449e42 __Getctype 40 API calls 15095->15096 15097 4506c2 15096->15097 15100 4505d5 15097->15100 15099 4506cd 15099->15092 15101 4505e1 std::locale::_Setgloballocale 15100->15101 15108 4505fb 15101->15108 15115 44424b RtlEnterCriticalSection 15101->15115 15103 45060b 15111 44b01a __freea 14 API calls 15103->15111 15113 450637 15103->15113 15104 450602 15104->15099 15105 4441c6 __Getctype 40 API calls 15107 450674 15105->15107 15109 4506b0 15107->15109 15119 449efd 15107->15119 15108->15104 15108->15105 15109->15099 15111->15113 15116 450654 15113->15116 15115->15103 15167 444293 RtlLeaveCriticalSection 15116->15167 15118 45065b 15118->15108 15120 449f0e 15119->15120 15121 449f08 15119->15121 15122 44b69b __Getctype 6 API calls 15120->15122 15125 449f14 15120->15125 15123 44b65c __Getctype 6 API calls 15121->15123 15124 449f28 15122->15124 15123->15120 15124->15125 15127 44a65a __Getctype 14 API calls 15124->15127 15126 449f19 15125->15126 15128 4441c6 __Getctype 40 API calls 15125->15128 15144 450480 15126->15144 15129 449f38 15127->15129 15130 449f92 15128->15130 15131 449f55 15129->15131 15132 449f40 15129->15132 15133 44b69b __Getctype 6 API calls 15131->15133 15134 44b69b __Getctype 6 API calls 15132->15134 15135 449f61 15133->15135 15136 449f4c 15134->15136 15137 449f74 15135->15137 15138 449f65 15135->15138 15141 44b01a __freea 14 API calls 15136->15141 15140 449c70 __Getctype 14 API calls 15137->15140 15139 44b69b __Getctype 6 API calls 15138->15139 15139->15136 15142 449f7f 15140->15142 15141->15125 15143 44b01a __freea 14 API calls 15142->15143 15143->15126 15145 4505d5 std::_Locinfo::_Locinfo_ctor 50 API calls 15144->15145 15146 4504aa 15145->15146 15168 450207 15146->15168 15151 4504dc 15153 44b01a __freea 14 API calls 15151->15153 15152 4504ea 15182 4506d0 15152->15182 15155 4504c3 15153->15155 15155->15109 15157 450522 15158 4416ff __floor_pentium4 14 API calls 15157->15158 15159 450527 15158->15159 15161 44b01a __freea 14 API calls 15159->15161 15160 450569 15163 4505b2 15160->15163 15193 4500f9 15160->15193 15161->15155 15162 45053d std::_Locinfo::_Locinfo_ctor 15162->15160 15165 44b01a __freea 14 API calls 15162->15165 15164 44b01a __freea 14 API calls 15163->15164 15164->15155 15165->15160 15167->15118 15201 4395ae 15168->15201 15171 450228 GetOEMCP 15173 450251 15171->15173 15172 45023a 15172->15173 15174 45023f GetACP 15172->15174 15173->15155 15175 44b094 15173->15175 15174->15173 15176 44b0d2 15175->15176 15180 44b0a2 __Getctype 15175->15180 15178 4416ff __floor_pentium4 14 API calls 15176->15178 15177 44b0bd RtlAllocateHeap 15179 44b0d0 15177->15179 15177->15180 15178->15179 15179->15151 15179->15152 15180->15176 15180->15177 15181 445a89 std::_Facet_Register 2 API calls 15180->15181 15181->15180 15183 450207 std::_Locinfo::_Locinfo_ctor 48 API calls 15182->15183 15184 4506f0 15183->15184 15185 4507f5 std::_Locinfo::_Locinfo_ctor 15184->15185 15186 45072d IsValidCodePage 15184->15186 15191 450748 std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 15184->15191 15187 433d77 _ValidateLocalCookies 5 API calls 15185->15187 15186->15185 15189 45073f 15186->15189 15188 450517 15187->15188 15188->15157 15188->15162 15190 450768 GetCPInfo 15189->15190 15189->15191 15190->15185 15190->15191 15209 4502db 15191->15209 15194 450105 std::locale::_Setgloballocale 15193->15194 15220 44424b RtlEnterCriticalSection 15194->15220 15196 45010f 15221 450146 15196->15221 15202 4395cc 15201->15202 15208 4395c5 15201->15208 15203 449e42 __Getctype 40 API calls 15202->15203 15202->15208 15204 4395ed 15203->15204 15205 44a12d __Getctype 40 API calls 15204->15205 15206 439603 15205->15206 15207 44a18b std::_Locinfo::_Locinfo_ctor 50 API calls 15206->15207 15207->15208 15208->15171 15208->15172 15210 450303 GetCPInfo 15209->15210 15211 4503cc 15209->15211 15210->15211 15217 45031b 15210->15217 15213 433d77 _ValidateLocalCookies 5 API calls 15211->15213 15212 44f44d std::_Locinfo::_Locinfo_ctor 49 API calls 15214 450383 15212->15214 15215 45047e 15213->15215 15216 44a8a6 std::_Locinfo::_Locinfo_ctor 49 API calls 15214->15216 15215->15185 15218 4503a4 15216->15218 15217->15212 15219 44a8a6 std::_Locinfo::_Locinfo_ctor 49 API calls 15218->15219 15219->15211 15220->15196 15222 43ceeb std::_Locinfo::_Locinfo_ctor 40 API calls 15221->15222 15223 450168 15222->15223 15224 43ceeb std::_Locinfo::_Locinfo_ctor 40 API calls 15223->15224 15226 450187 15224->15226 15225 45011c 15228 45013a 15225->15228 15226->15225 15227 44b01a __freea 14 API calls 15226->15227 15227->15225 15229 444293 std::_Lockit::~_Lockit RtlLeaveCriticalSection 15228->15229 15230 450128 15229->15230 15230->15163 15232 4395ae std::_Locinfo::_Locinfo_ctor 50 API calls 15231->15232 15233 449a56 15232->15233 15237 449a66 15233->15237 15238 44f44d 15233->15238 15235 433d77 _ValidateLocalCookies 5 API calls 15236 449b02 15235->15236 15236->15078 15237->15235 15239 4395ae std::_Locinfo::_Locinfo_ctor 49 API calls 15238->15239 15240 44f46d 15239->15240 15253 44b17a 15240->15253 15242 44f529 15245 433d77 _ValidateLocalCookies 5 API calls 15242->15245 15243 44f521 15256 433275 15243->15256 15244 44f49a 15244->15242 15244->15243 15247 44b094 std::_Locinfo::_Locinfo_ctor 15 API calls 15244->15247 15249 44f4bf std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 15244->15249 15248 44f54c 15245->15248 15247->15249 15248->15237 15249->15243 15250 44b17a std::_Locinfo::_Locinfo_ctor MultiByteToWideChar 15249->15250 15251 44f508 15250->15251 15251->15243 15252 44f50f GetStringTypeW 15251->15252 15252->15243 15260 44b0e2 15253->15260 15257 43327f 15256->15257 15259 433290 15256->15259 15258 441c96 __freea 14 API calls 15257->15258 15257->15259 15258->15259 15259->15242 15261 44b0f3 MultiByteToWideChar 15260->15261 15261->15244 15263 41ab55 15262->15263 15265 41aba3 15263->15265 15271 41e8a0 15263->15271 15266 41ab83 15266->14155 15268 403459 15267->15268 15275 440dd7 15268->15275 15272 41e8f8 std::_Locinfo::_Locinfo_ctor 15271->15272 15273 41e8ce 15271->15273 15272->15266 15274 4032d0 std::_Throw_Cpp_error 42 API calls 15273->15274 15274->15272 15276 440deb ___std_exception_copy 15275->15276 15281 43e565 15276->15281 15279 43899c ___std_exception_copy 40 API calls 15280 403467 WriteProcessMemory WriteProcessMemory CreateRemoteThread WaitForSingleObject 15279->15280 15280->14161 15280->14162 15282 43e591 15281->15282 15283 43e5b4 15281->15283 15284 438be3 ___std_exception_copy 40 API calls 15282->15284 15283->15282 15286 43e5bc 15283->15286 15285 43e5a9 15284->15285 15287 433d77 _ValidateLocalCookies 5 API calls 15285->15287 15292 43faa7 15286->15292 15288 43e6d7 15287->15288 15288->15279 15310 440b0d 15292->15310 15295 43facc 15297 438be3 ___std_exception_copy 40 API calls 15295->15297 15296 43e63d 15307 43f28d 15296->15307 15297->15296 15300 43e1d0 std::_Locinfo::_Locinfo_ctor 50 API calls 15302 43faf4 std::_Locinfo::_Locinfo_ctor 15300->15302 15302->15296 15302->15300 15303 43fbd0 15302->15303 15314 43f49b 15302->15314 15317 43fed4 15302->15317 15351 44036f 15302->15351 15304 438be3 ___std_exception_copy 40 API calls 15303->15304 15305 43fbea 15304->15305 15306 438be3 ___std_exception_copy 40 API calls 15305->15306 15306->15296 15308 44b01a __freea 14 API calls 15307->15308 15309 43f29d 15308->15309 15309->15285 15311 43fac1 15310->15311 15312 440b18 15310->15312 15311->15295 15311->15296 15311->15302 15313 438be3 ___std_exception_copy 40 API calls 15312->15313 15313->15311 15380 43e842 15314->15380 15316 43f4d6 15316->15302 15318 43fef2 15317->15318 15319 43fedb 15317->15319 15320 438be3 ___std_exception_copy 40 API calls 15318->15320 15332 43ff31 15318->15332 15321 4403f4 15319->15321 15322 440394 15319->15322 15319->15332 15325 43ff26 15320->15325 15323 44042d 15321->15323 15324 4403f9 15321->15324 15326 44041a 15322->15326 15327 44039a 15322->15327 15328 440432 15323->15328 15329 44044a 15323->15329 15330 440426 15324->15330 15331 4403fb 15324->15331 15325->15302 15415 43ebfc 15326->15415 15339 4403eb 15327->15339 15340 44039f 15327->15340 15328->15326 15334 4403c5 15328->15334 15328->15339 15426 440a4d 15329->15426 15422 440a30 15330->15422 15333 4403ae 15331->15333 15342 44040a 15331->15342 15332->15302 15350 440453 15333->15350 15390 440785 15333->15390 15334->15350 15429 44c5ba 15334->15429 15339->15350 15404 43ed89 15339->15404 15340->15333 15340->15334 15343 4403d8 15340->15343 15342->15326 15344 44040e 15342->15344 15343->15350 15400 440916 15343->15400 15344->15350 15411 4409ab 15344->15411 15346 433d77 _ValidateLocalCookies 5 API calls 15348 4406cc 15346->15348 15348->15302 15350->15346 15352 4403f4 15351->15352 15353 440394 15351->15353 15354 44042d 15352->15354 15355 4403f9 15352->15355 15356 44041a 15353->15356 15357 44039a 15353->15357 15358 440432 15354->15358 15359 44044a 15354->15359 15360 440426 15355->15360 15361 4403fb 15355->15361 15365 43ebfc 41 API calls 15356->15365 15367 4403eb 15357->15367 15368 44039f 15357->15368 15358->15356 15358->15367 15378 4403c5 15358->15378 15364 440a4d 41 API calls 15359->15364 15362 440a30 41 API calls 15360->15362 15363 4403ae 15361->15363 15370 44040a 15361->15370 15362->15378 15366 440785 52 API calls 15363->15366 15379 440453 15363->15379 15364->15378 15365->15378 15366->15378 15369 43ed89 41 API calls 15367->15369 15367->15379 15368->15363 15371 4403d8 15368->15371 15368->15378 15369->15378 15370->15356 15372 44040e 15370->15372 15373 440916 51 API calls 15371->15373 15371->15379 15375 4409ab 40 API calls 15372->15375 15372->15379 15373->15378 15374 433d77 _ValidateLocalCookies 5 API calls 15376 4406cc 15374->15376 15375->15378 15376->15302 15377 44c5ba 51 API calls 15377->15378 15378->15377 15378->15379 15379->15374 15381 43ce79 std::_Locinfo::_Locinfo_ctor 40 API calls 15380->15381 15382 43e854 15381->15382 15383 43e869 15382->15383 15386 43e89c 15382->15386 15389 43e884 std::_Locinfo::_Locinfo_ctor 15382->15389 15384 438be3 ___std_exception_copy 40 API calls 15383->15384 15384->15389 15385 43e933 15387 43ce22 40 API calls 15385->15387 15386->15385 15388 43ce22 40 API calls 15386->15388 15387->15389 15388->15385 15389->15316 15391 44079f 15390->15391 15439 43e790 15391->15439 15393 4407de 15450 44c439 15393->15450 15396 440895 15398 43e1d0 std::_Locinfo::_Locinfo_ctor 50 API calls 15396->15398 15399 4408c8 15396->15399 15397 43e1d0 std::_Locinfo::_Locinfo_ctor 50 API calls 15397->15396 15398->15399 15399->15334 15399->15399 15402 440931 15400->15402 15401 440967 15401->15334 15402->15401 15403 44c5ba 51 API calls 15402->15403 15403->15401 15405 43ed9e 15404->15405 15406 43edc0 15405->15406 15408 43ede7 15405->15408 15407 438be3 ___std_exception_copy 40 API calls 15406->15407 15409 43eddd 15407->15409 15408->15409 15410 43e790 15 API calls 15408->15410 15409->15334 15410->15409 15414 4409c1 15411->15414 15412 438be3 ___std_exception_copy 40 API calls 15413 4409e2 15412->15413 15413->15334 15414->15412 15414->15413 15416 43ec11 15415->15416 15417 43ec33 15416->15417 15419 43ec5a 15416->15419 15418 438be3 ___std_exception_copy 40 API calls 15417->15418 15421 43ec50 15418->15421 15420 43e790 15 API calls 15419->15420 15419->15421 15420->15421 15421->15334 15423 440a3c 15422->15423 15514 43ea6f 15423->15514 15425 440a4c 15425->15334 15427 43ed89 41 API calls 15426->15427 15428 440a62 15427->15428 15428->15334 15431 44c5cf 15429->15431 15430 44c610 15432 44c5d3 std::_Locinfo::_Locinfo_ctor std::locale::_Setgloballocale 15430->15432 15435 44c5fc std::locale::_Setgloballocale 15430->15435 15521 44ec55 15430->15521 15431->15430 15431->15432 15434 43e1d0 std::_Locinfo::_Locinfo_ctor 50 API calls 15431->15434 15431->15435 15432->15334 15433 438be3 ___std_exception_copy 40 API calls 15433->15432 15434->15430 15435->15432 15435->15433 15437 44c6cb 15437->15432 15438 44c6e1 GetLastError 15437->15438 15438->15432 15438->15435 15440 43e7b7 15439->15440 15447 43e7a5 15439->15447 15441 44b094 std::_Locinfo::_Locinfo_ctor 15 API calls 15440->15441 15440->15447 15442 43e7db 15441->15442 15443 43e7e3 15442->15443 15444 43e7ee 15442->15444 15445 44b01a __freea 14 API calls 15443->15445 15469 43f2a7 15444->15469 15445->15447 15447->15393 15449 44b01a __freea 14 API calls 15449->15447 15451 44c46e 15450->15451 15453 44c44a 15450->15453 15451->15453 15454 44c4a1 15451->15454 15452 438be3 ___std_exception_copy 40 API calls 15463 440871 15452->15463 15453->15452 15455 44c509 15454->15455 15457 44c4da 15454->15457 15456 44c537 15455->15456 15458 44c532 15455->15458 15480 44bb66 15456->15480 15472 44c2dd 15457->15472 15461 44c55f 15458->15461 15462 44c599 15458->15462 15464 44c564 15461->15464 15465 44c57f 15461->15465 15507 44be93 15462->15507 15463->15396 15463->15397 15490 44c20e 15464->15490 15500 44c08a 15465->15500 15470 44b01a __freea 14 API calls 15469->15470 15471 43e7f9 15470->15471 15471->15449 15473 44c2f3 15472->15473 15474 44c2fe 15472->15474 15473->15463 15475 4499a5 ___std_exception_copy 40 API calls 15474->15475 15476 44c359 15475->15476 15477 44c363 15476->15477 15478 438c8d __Getctype 11 API calls 15476->15478 15477->15463 15479 44c371 15478->15479 15481 44bb79 15480->15481 15482 44bb88 15481->15482 15483 44bbaa 15481->15483 15484 438be3 ___std_exception_copy 40 API calls 15482->15484 15485 44bbbf 15483->15485 15487 44bc12 15483->15487 15489 44bba0 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z std::locale::_Setgloballocale __allrem _strrchr 15484->15489 15486 44be93 52 API calls 15485->15486 15486->15489 15488 43e1d0 std::_Locinfo::_Locinfo_ctor 50 API calls 15487->15488 15487->15489 15488->15489 15489->15463 15491 4547bf 42 API calls 15490->15491 15492 44c23e 15491->15492 15493 4546c5 40 API calls 15492->15493 15494 44c27c 15493->15494 15495 44c2bc 15494->15495 15496 44c295 15494->15496 15498 44c283 15494->15498 15497 44bf37 50 API calls 15495->15497 15499 44c120 50 API calls 15496->15499 15497->15498 15498->15463 15499->15498 15501 4547bf 42 API calls 15500->15501 15502 44c0b9 15501->15502 15503 4546c5 40 API calls 15502->15503 15504 44c0fa 15503->15504 15505 44c101 15504->15505 15506 44c120 50 API calls 15504->15506 15505->15463 15506->15505 15508 4547bf 42 API calls 15507->15508 15509 44bebd 15508->15509 15510 4546c5 40 API calls 15509->15510 15511 44bf0b 15510->15511 15512 44bf12 15511->15512 15513 44bf37 50 API calls 15511->15513 15512->15463 15513->15512 15515 43ea84 15514->15515 15516 43eacd 15515->15516 15517 43eaa6 15515->15517 15519 43e790 15 API calls 15516->15519 15520 43eac3 15516->15520 15518 438be3 ___std_exception_copy 40 API calls 15517->15518 15518->15520 15519->15520 15520->15425 15523 44ec68 std::_Locinfo::_Locinfo_ctor 15521->15523 15522 44eca6 WideCharToMultiByte 15522->15437 15523->15522 15525 441440 15524->15525 15526 441418 15524->15526 15525->14171 15526->15525 15527 441425 15526->15527 15528 441447 15526->15528 15529 438be3 ___std_exception_copy 40 API calls 15527->15529 15532 441363 15528->15532 15529->15525 15533 44136f std::locale::_Setgloballocale 15532->15533 15540 441250 RtlEnterCriticalSection 15533->15540 15535 44137d 15541 4413be 15535->15541 15540->15535 15551 44c8aa 15541->15551 15548 4413b2 15693 441264 RtlLeaveCriticalSection 15548->15693 15550 44139b 15550->14171 15571 44c86c 15551->15571 15553 4413d6 15558 441481 15553->15558 15554 44c8bb 15554->15553 15555 44b094 std::_Locinfo::_Locinfo_ctor 15 API calls 15554->15555 15556 44c914 15555->15556 15557 44b01a __freea 14 API calls 15556->15557 15557->15553 15561 441493 15558->15561 15562 4413f4 15558->15562 15559 4414a1 15560 438be3 ___std_exception_copy 40 API calls 15559->15560 15560->15562 15561->15559 15561->15562 15565 4414d7 std::_Locinfo::_Locinfo_ctor 15561->15565 15567 44c955 15562->15567 15564 44a1e9 40 API calls 15564->15565 15565->15562 15565->15564 15587 439a91 15565->15587 15593 449678 15565->15593 15568 44c960 15567->15568 15569 44138a 15567->15569 15568->15569 15570 439a91 73 API calls 15568->15570 15569->15548 15570->15569 15573 44c878 15571->15573 15572 44c8a2 15572->15554 15573->15572 15574 44a1e9 40 API calls 15573->15574 15575 44c893 15574->15575 15578 453be3 15575->15578 15577 44c899 15577->15554 15579 453bf0 15578->15579 15580 453bfd 15578->15580 15581 4416ff __floor_pentium4 14 API calls 15579->15581 15583 453c09 15580->15583 15584 4416ff __floor_pentium4 14 API calls 15580->15584 15582 453bf5 15581->15582 15582->15577 15583->15577 15585 453c2a 15584->15585 15586 438c60 ___std_exception_copy 40 API calls 15585->15586 15586->15582 15588 439ad1 15587->15588 15589 439aaa 15587->15589 15588->15565 15589->15588 15590 44a1e9 40 API calls 15589->15590 15591 439ac6 15590->15591 15592 449678 73 API calls 15591->15592 15592->15588 15594 449684 std::locale::_Setgloballocale 15593->15594 15595 4496c5 15594->15595 15597 44970b 15594->15597 15603 44968c 15594->15603 15596 438be3 ___std_exception_copy 40 API calls 15595->15596 15596->15603 15604 44e6c4 RtlEnterCriticalSection 15597->15604 15599 449711 15600 44972f 15599->15600 15605 449789 15599->15605 15633 449781 15600->15633 15603->15565 15604->15599 15606 4497b1 15605->15606 15632 4497d4 15605->15632 15607 4497b5 15606->15607 15609 449810 15606->15609 15608 438be3 ___std_exception_copy 40 API calls 15607->15608 15608->15632 15610 44982e 15609->15610 15643 44263d 15609->15643 15636 4492ce 15610->15636 15614 449846 15618 449875 15614->15618 15623 44984e 15614->15623 15615 44988d 15616 4498f6 WriteFile 15615->15616 15617 4498a1 15615->15617 15619 449918 GetLastError 15616->15619 15616->15632 15621 4498e2 15617->15621 15622 4498a9 15617->15622 15651 448e9f GetConsoleOutputCP 15618->15651 15619->15632 15679 44934b 15621->15679 15624 4498ce 15622->15624 15625 4498ae 15622->15625 15623->15632 15646 449266 15623->15646 15671 44950f 15624->15671 15628 4498b7 15625->15628 15625->15632 15664 449426 15628->15664 15630 449888 15630->15632 15632->15600 15692 44e779 RtlLeaveCriticalSection 15633->15692 15635 449787 15635->15603 15637 453be3 40 API calls 15636->15637 15639 4492e0 15637->15639 15638 449344 15638->15614 15638->15615 15639->15638 15640 44930e 15639->15640 15641 43e1d0 std::_Locinfo::_Locinfo_ctor 50 API calls 15639->15641 15640->15638 15642 449328 GetConsoleMode 15640->15642 15641->15640 15642->15638 15686 44251c 15643->15686 15645 442656 15645->15610 15647 4492bd 15646->15647 15650 449288 15646->15650 15647->15632 15648 453db0 CreateFileW CloseHandle WriteConsoleW GetLastError WriteConsoleW 15648->15650 15649 4492bf GetLastError 15649->15647 15650->15647 15650->15648 15650->15649 15652 448f11 15651->15652 15660 448f18 std::_Locinfo::_Locinfo_ctor 15651->15660 15653 43e1d0 std::_Locinfo::_Locinfo_ctor 50 API calls 15652->15653 15653->15660 15654 433d77 _ValidateLocalCookies 5 API calls 15655 44925f 15654->15655 15655->15630 15656 44c724 50 API calls 15656->15660 15657 4491ce 15657->15654 15657->15657 15658 44ec55 std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 15658->15660 15659 449147 WriteFile 15659->15660 15661 44923d GetLastError 15659->15661 15660->15656 15660->15657 15660->15658 15660->15659 15662 453ca8 5 API calls std::_Locinfo::_Locinfo_ctor 15660->15662 15663 449185 WriteFile 15660->15663 15661->15657 15662->15660 15663->15660 15663->15661 15667 449435 15664->15667 15665 4494f4 15666 433d77 _ValidateLocalCookies 5 API calls 15665->15666 15670 44950d 15666->15670 15667->15665 15668 4494aa WriteFile 15667->15668 15668->15667 15669 4494f6 GetLastError 15668->15669 15669->15665 15670->15632 15673 44951e 15671->15673 15672 433d77 _ValidateLocalCookies 5 API calls 15674 44963f 15672->15674 15675 44ec55 std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 15673->15675 15676 449628 GetLastError 15673->15676 15677 4495dd WriteFile 15673->15677 15678 449626 15673->15678 15674->15630 15675->15673 15676->15678 15677->15673 15677->15676 15678->15672 15684 44935a 15679->15684 15680 44940b 15681 433d77 _ValidateLocalCookies 5 API calls 15680->15681 15682 449424 15681->15682 15682->15630 15683 4493ca WriteFile 15683->15684 15685 44940d GetLastError 15683->15685 15684->15680 15684->15683 15685->15680 15687 44e940 40 API calls 15686->15687 15688 44252e 15687->15688 15689 44254a SetFilePointerEx 15688->15689 15691 442536 15688->15691 15690 442562 GetLastError 15689->15690 15689->15691 15690->15691 15691->15645 15692->15635 15693->15550 15695 43cf8f std::locale::_Setgloballocale 15694->15695 15696 43cf99 15695->15696 15697 43cfbc 15695->15697 15698 438be3 ___std_exception_copy 40 API calls 15696->15698 15704 43cfb4 15697->15704 15705 441250 RtlEnterCriticalSection 15697->15705 15698->15704 15700 43cfda 15706 43d01a 15700->15706 15702 43cfe7 15720 43d012 15702->15720 15704->14177 15705->15700 15707 43d027 15706->15707 15708 43d04a 15706->15708 15709 438be3 ___std_exception_copy 40 API calls 15707->15709 15710 439a91 73 API calls 15708->15710 15719 43d042 15708->15719 15709->15719 15711 43d062 15710->15711 15723 44b054 15711->15723 15714 44a1e9 40 API calls 15715 43d076 15714->15715 15727 448d2c 15715->15727 15718 44b01a __freea 14 API calls 15718->15719 15719->15702 15785 441264 RtlLeaveCriticalSection 15720->15785 15722 43d018 15722->15704 15724 43d06a 15723->15724 15725 44b06b 15723->15725 15724->15714 15725->15724 15726 44b01a __freea 14 API calls 15725->15726 15726->15724 15728 448d55 15727->15728 15729 43d07d 15727->15729 15730 448da4 15728->15730 15732 448d7c 15728->15732 15729->15718 15729->15719 15731 438be3 ___std_exception_copy 40 API calls 15730->15731 15731->15729 15734 448c9b 15732->15734 15735 448ca7 std::locale::_Setgloballocale 15734->15735 15742 44e6c4 RtlEnterCriticalSection 15735->15742 15737 448cb5 15738 448ce6 15737->15738 15743 448dff 15737->15743 15756 448d20 15738->15756 15742->15737 15759 44e940 15743->15759 15745 448e15 15772 44e8af 15745->15772 15747 448e0f 15747->15745 15748 448e47 15747->15748 15750 44e940 40 API calls 15747->15750 15748->15745 15749 44e940 40 API calls 15748->15749 15751 448e53 FindCloseChangeNotification 15749->15751 15752 448e3e 15750->15752 15751->15745 15753 448e5f GetLastError 15751->15753 15754 44e940 40 API calls 15752->15754 15753->15745 15754->15748 15755 448e6d 15755->15738 15784 44e779 RtlLeaveCriticalSection 15756->15784 15758 448d09 15758->15729 15760 44e94d 15759->15760 15762 44e962 15759->15762 15781 4416ec 15760->15781 15763 4416ec 14 API calls 15762->15763 15765 44e987 15762->15765 15766 44e992 15763->15766 15765->15747 15768 4416ff __floor_pentium4 14 API calls 15766->15768 15767 4416ff __floor_pentium4 14 API calls 15769 44e95a 15767->15769 15770 44e99a 15768->15770 15769->15747 15771 438c60 ___std_exception_copy 40 API calls 15770->15771 15771->15769 15773 44e925 15772->15773 15774 44e8be 15772->15774 15775 4416ff __floor_pentium4 14 API calls 15773->15775 15774->15773 15780 44e8e8 15774->15780 15776 44e92a 15775->15776 15777 4416ec 14 API calls 15776->15777 15778 44e915 15777->15778 15778->15755 15779 44e90f SetStdHandle 15779->15778 15780->15778 15780->15779 15782 449f93 __floor_pentium4 14 API calls 15781->15782 15783 4416f1 15782->15783 15783->15767 15784->15758 15785->15722 15787 418034 15786->15787 15788 417f1d 15786->15788 15794 402cf0 std::_Throw_Cpp_error 42 API calls 15787->15794 15800 417f29 15787->15800 15789 417fcb 15788->15789 15790 417f83 15788->15790 15791 417f24 15788->15791 15792 417f2b 15788->15792 15793 417f7c 15788->15793 15789->14191 15796 433672 std::_Facet_Register 42 API calls 15790->15796 15878 41c3a0 15791->15878 15798 433672 std::_Facet_Register 42 API calls 15792->15798 15883 41cf80 15793->15883 15799 41804f 15794->15799 15796->15800 15798->15800 15888 407f90 15799->15888 15800->14191 15802 418062 15803 4351fb std::_Throw_Cpp_error RaiseException 15802->15803 15804 418073 15803->15804 15807 42215f 15805->15807 15956 44133b 15807->15956 15810 41b4f0 15811 41db10 15810->15811 15812 41db56 15811->15812 15813 41de3d 15811->15813 16008 41ebb0 15812->16008 15815 41fd70 42 API calls 15813->15815 15817 41de87 15815->15817 15816 41dba4 15819 41fd70 42 API calls 15816->15819 15818 41eda0 55 API calls 15817->15818 15872 41df5e std::ios_base::_Ios_base_dtor 15817->15872 15820 41dee2 15818->15820 15821 41dbc1 15819->15821 15824 4075c0 42 API calls 15820->15824 15874 41dcc3 std::ios_base::_Ios_base_dtor 15821->15874 16014 41eda0 15821->16014 15822 417ef0 42 API calls 15827 41dfc7 15822->15827 15823 41de38 std::ios_base::_Ios_base_dtor 15823->14195 15828 41df06 15824->15828 15825 41dd82 15835 417ef0 42 API calls 15825->15835 15844 41dd9f 15825->15844 15826 41dcec 15831 417ef0 42 API calls 15826->15831 15827->15823 15832 438c70 std::_Throw_Cpp_error 40 API calls 15827->15832 15833 41f440 55 API calls 15828->15833 15830 41dc1c 16067 4075c0 15830->16067 15850 41dd01 15831->15850 15836 41e06f 15832->15836 15837 41df1f 15833->15837 15835->15844 16128 4190b0 15836->16128 15840 41e093 15837->15840 15841 402df0 std::_Throw_Cpp_error 42 API calls 15837->15841 15843 4190b0 41 API calls 15840->15843 15847 41df40 15841->15847 15849 41e0a1 15843->15849 15851 4135b0 40 API calls 15844->15851 15846 4351fb std::_Throw_Cpp_error RaiseException 15852 41e08e 15846->15852 15853 407a20 14 API calls 15847->15853 15848 41dc56 15848->15836 15854 41dc6b 15848->15854 15855 4351fb std::_Throw_Cpp_error RaiseException 15849->15855 16123 4135b0 15850->16123 15868 41dd6c 15851->15868 15856 438c70 std::_Throw_Cpp_error 40 API calls 15852->15856 15857 41df4f 15853->15857 15858 402df0 std::_Throw_Cpp_error 42 API calls 15854->15858 15859 41e0b2 15855->15859 15856->15840 15860 402df0 std::_Throw_Cpp_error 42 API calls 15857->15860 15861 41dc77 15858->15861 15862 438c70 std::_Throw_Cpp_error 40 API calls 15859->15862 15860->15872 15867 41e0b7 15862->15867 15864 4135b0 40 API calls 15865 41de26 15864->15865 15869 4135b0 40 API calls 15865->15869 15868->15864 15869->15823 15872->15822 15872->15827 15872->15859 15874->15825 15874->15826 15876 402df0 std::_Throw_Cpp_error 42 API calls 15875->15876 15877 41d4cb 15876->15877 15877->14197 15879 433672 std::_Facet_Register 42 API calls 15878->15879 15880 41c3c3 15879->15880 15881 433672 std::_Facet_Register 42 API calls 15880->15881 15882 41c3ec 15881->15882 15882->15800 15884 433672 std::_Facet_Register 42 API calls 15883->15884 15885 41cfb7 15884->15885 15886 403040 std::_Throw_Cpp_error 42 API calls 15885->15886 15887 41cfee 15886->15887 15887->15800 15903 407350 15888->15903 15890 408029 15928 41ad80 15890->15928 15893 402df0 std::_Throw_Cpp_error 42 API calls 15894 40804c 15893->15894 15895 408076 std::ios_base::_Ios_base_dtor 15894->15895 15898 4080df 15894->15898 15932 4072b0 15895->15932 15900 438c70 std::_Throw_Cpp_error 40 API calls 15898->15900 15899 402df0 std::_Throw_Cpp_error 42 API calls 15901 4080cb 15899->15901 15902 4080e4 15900->15902 15901->15802 15902->15802 15935 404d70 15903->15935 15912 418f00 std::_Throw_Cpp_error 42 API calls 15913 4073e6 15912->15913 15914 402df0 std::_Throw_Cpp_error 42 API calls 15913->15914 15915 40744c 15914->15915 15916 407476 std::ios_base::_Ios_base_dtor 15915->15916 15918 4074bf 15915->15918 15917 402df0 std::_Throw_Cpp_error 42 API calls 15916->15917 15919 40749e 15917->15919 15921 438c70 std::_Throw_Cpp_error 40 API calls 15918->15921 15920 402df0 std::_Throw_Cpp_error 42 API calls 15919->15920 15923 4074aa 15920->15923 15922 4074c4 15921->15922 15924 434b78 ___std_exception_destroy 14 API calls 15922->15924 15923->15890 15925 407511 15924->15925 15926 434b78 ___std_exception_destroy 14 API calls 15925->15926 15927 407527 std::ios_base::_Ios_base_dtor 15926->15927 15927->15890 15929 41adb4 15928->15929 15930 418f00 std::_Throw_Cpp_error 42 API calls 15929->15930 15931 40803d 15930->15931 15931->15893 15933 434b15 ___std_exception_copy 41 API calls 15932->15933 15934 40731a 15933->15934 15934->15899 15937 404da6 15935->15937 15936 404dd8 15939 41ac50 15936->15939 15937->15936 15938 403040 std::_Throw_Cpp_error 42 API calls 15937->15938 15938->15936 15941 41ac81 15939->15941 15940 41acd3 15941->15940 15942 41e8a0 42 API calls 15941->15942 15943 4073af 15942->15943 15944 41abb0 15943->15944 15945 41abe1 15944->15945 15945->15945 15946 418f00 std::_Throw_Cpp_error 42 API calls 15945->15946 15947 4073c2 15946->15947 15948 41ae20 15947->15948 15951 41e710 15948->15951 15950 4073d1 15950->15912 15952 41e753 15951->15952 15953 41e758 std::_Locinfo::_Locinfo_ctor 15952->15953 15954 4032d0 std::_Throw_Cpp_error 42 API calls 15952->15954 15953->15950 15955 41e843 std::_Locinfo::_Locinfo_ctor 15954->15955 15955->15950 15957 449e42 __Getctype 40 API calls 15956->15957 15958 441346 15957->15958 15959 44a12d __Getctype 40 API calls 15958->15959 15960 42225f 15959->15960 15961 41fd70 15960->15961 15964 41fd84 15961->15964 15968 41fde4 15961->15968 15963 41ff6c 15963->15810 15969 41fdc2 15964->15969 15975 429e20 15964->15975 15967 41fecc 15967->15963 15974 429e20 42 API calls 15967->15974 16001 4208f0 15967->16001 15972 41fe74 15968->15972 15997 4201e0 15968->15997 15969->15968 15970 41fe58 15969->15970 15971 429e20 42 API calls 15969->15971 15970->15972 15993 421430 15970->15993 15971->15970 15972->15810 15974->15967 15976 429e62 15975->15976 15977 429f76 15975->15977 15978 429e7c 15976->15978 15980 429eca 15976->15980 15981 429eba 15976->15981 15979 403330 42 API calls 15977->15979 15983 433672 std::_Facet_Register 42 API calls 15978->15983 15982 429f7b 15979->15982 15986 433672 std::_Facet_Register 42 API calls 15980->15986 15990 429e9a std::_Locinfo::_Locinfo_ctor 15980->15990 15981->15978 15981->15982 15984 402b50 Concurrency::cancel_current_task 42 API calls 15982->15984 15985 429e8f 15983->15985 15987 429f80 15984->15987 15985->15987 15985->15990 15986->15990 15988 438c70 std::_Throw_Cpp_error 40 API calls 15987->15988 15989 429f85 15988->15989 15991 4277d0 40 API calls 15990->15991 15992 429f47 15991->15992 15992->15969 15994 421443 15993->15994 15995 421471 15994->15995 15996 429e20 42 API calls 15994->15996 15995->15968 15996->15995 15998 4201f0 15997->15998 15999 429e20 42 API calls 15998->15999 16000 420260 15998->16000 15999->15998 16000->15967 16002 421430 42 API calls 16001->16002 16005 4208fc 16002->16005 16003 42090a 16003->15967 16004 429e20 42 API calls 16007 420995 16004->16007 16005->16003 16006 429e20 42 API calls 16005->16006 16005->16007 16006->16005 16007->16003 16007->16004 16009 41ec6d 16008->16009 16010 417ef0 42 API calls 16009->16010 16011 41ec8d 16010->16011 16131 4216c0 16011->16131 16013 41ecdf 16013->15816 16015 41ee46 16014->16015 16016 41ef4d 16014->16016 16017 41f425 16015->16017 16020 41e8a0 42 API calls 16015->16020 16018 418f00 std::_Throw_Cpp_error 42 API calls 16016->16018 16024 438c70 std::_Throw_Cpp_error 40 API calls 16017->16024 16019 41ef5b 16018->16019 16021 41ef6a 16019->16021 16030 41f191 16019->16030 16022 41ee79 16020->16022 16023 41f440 55 API calls 16021->16023 16026 418f00 std::_Throw_Cpp_error 42 API calls 16022->16026 16027 41ef79 16023->16027 16025 41f42f 16024->16025 16028 438c70 std::_Throw_Cpp_error 40 API calls 16025->16028 16029 41ee93 16026->16029 16036 403040 std::_Throw_Cpp_error 42 API calls 16027->16036 16031 41f434 16028->16031 16032 418f00 std::_Throw_Cpp_error 42 API calls 16029->16032 16030->16030 16033 403040 std::_Throw_Cpp_error 42 API calls 16030->16033 16034 438c70 std::_Throw_Cpp_error 40 API calls 16031->16034 16035 41eee3 16032->16035 16037 41f1c9 16033->16037 16066 41f375 std::ios_base::_Ios_base_dtor 16034->16066 16035->16017 16038 41ef1f std::ios_base::_Ios_base_dtor 16035->16038 16039 41efba 16036->16039 16040 41fbf0 42 API calls 16037->16040 16041 402df0 std::_Throw_Cpp_error 42 API calls 16038->16041 16043 418f00 std::_Throw_Cpp_error 42 API calls 16039->16043 16044 41f1e0 16040->16044 16041->16016 16042 438c70 std::_Throw_Cpp_error 40 API calls 16045 41f43e 16042->16045 16046 41efcd 16043->16046 16048 418f00 std::_Throw_Cpp_error 42 API calls 16044->16048 16047 41e710 42 API calls 16046->16047 16049 41f019 16047->16049 16053 41f22f std::ios_base::_Ios_base_dtor 16048->16053 16050 418f00 std::_Throw_Cpp_error 42 API calls 16049->16050 16051 41f032 16050->16051 16052 418f00 std::_Throw_Cpp_error 42 API calls 16051->16052 16056 41f081 std::ios_base::_Ios_base_dtor 16052->16056 16053->16031 16057 41f18c std::ios_base::_Ios_base_dtor 16053->16057 16054 41f3f2 std::ios_base::_Ios_base_dtor 16054->15830 16055 402df0 std::_Throw_Cpp_error 42 API calls 16060 41f0e3 std::ios_base::_Ios_base_dtor 16055->16060 16056->16025 16056->16055 16057->16054 16059 403040 std::_Throw_Cpp_error 42 API calls 16057->16059 16058 41f161 std::ios_base::_Ios_base_dtor 16061 402df0 std::_Throw_Cpp_error 42 API calls 16058->16061 16062 41f30c 16059->16062 16060->16025 16060->16058 16061->16057 16063 41fbf0 42 API calls 16062->16063 16064 41f323 16063->16064 16065 418f00 std::_Throw_Cpp_error 42 API calls 16064->16065 16065->16066 16066->16042 16066->16054 16214 404e30 16067->16214 16070 404e30 42 API calls 16071 40762b 16070->16071 16072 41ace0 42 API calls 16071->16072 16073 407640 16072->16073 16074 41abb0 42 API calls 16073->16074 16075 407656 16074->16075 16076 41e710 42 API calls 16075->16076 16079 40766d std::ios_base::_Ios_base_dtor 16076->16079 16077 40770a std::ios_base::_Ios_base_dtor 16080 402df0 std::_Throw_Cpp_error 42 API calls 16077->16080 16078 407a09 16081 438c70 std::_Throw_Cpp_error 40 API calls 16078->16081 16079->16077 16079->16078 16082 40773b 16080->16082 16083 407a0e 16081->16083 16084 402df0 std::_Throw_Cpp_error 42 API calls 16082->16084 16085 438c70 std::_Throw_Cpp_error 40 API calls 16083->16085 16086 40774a 16084->16086 16087 407a13 16085->16087 16088 407350 42 API calls 16086->16088 16089 4077a4 16088->16089 16090 418f00 std::_Throw_Cpp_error 42 API calls 16089->16090 16091 4077b9 16090->16091 16092 41e710 42 API calls 16091->16092 16093 40780c 16092->16093 16094 418f00 std::_Throw_Cpp_error 42 API calls 16093->16094 16095 407828 16094->16095 16096 41ad80 42 API calls 16095->16096 16098 407879 std::ios_base::_Ios_base_dtor 16096->16098 16097 402df0 std::_Throw_Cpp_error 42 API calls 16100 4078e8 std::ios_base::_Ios_base_dtor 16097->16100 16098->16083 16098->16097 16099 402df0 std::_Throw_Cpp_error 42 API calls 16101 407947 16099->16101 16100->16083 16100->16099 16101->16083 16102 407975 std::ios_base::_Ios_base_dtor 16101->16102 16103 402df0 std::_Throw_Cpp_error 42 API calls 16102->16103 16104 4079a6 16103->16104 16105 4072b0 41 API calls 16104->16105 16106 4079ca 16105->16106 16107 402df0 std::_Throw_Cpp_error 42 API calls 16106->16107 16108 4079f3 16107->16108 16109 41f440 16108->16109 16110 41f630 16109->16110 16116 41f4c9 std::ios_base::_Ios_base_dtor std::_Locinfo::_Locinfo_ctor 16109->16116 16110->15848 16112 41f647 16115 438c70 std::_Throw_Cpp_error 40 API calls 16112->16115 16113 4032d0 std::_Throw_Cpp_error 42 API calls 16113->16116 16114 418f00 std::_Throw_Cpp_error 42 API calls 16114->16116 16117 41f651 16115->16117 16116->16110 16116->16112 16116->16113 16116->16114 16218 4034a0 16116->16218 16117->15848 16124 4135d1 16123->16124 16125 4135f1 std::ios_base::_Ios_base_dtor 16123->16125 16124->16125 16126 438c70 std::_Throw_Cpp_error 40 API calls 16124->16126 16125->15868 16127 413625 16126->16127 16127->15868 16225 416590 16128->16225 16134 4217d0 16131->16134 16133 4216da std::locale::_Setgloballocale 16133->16013 16135 421809 16134->16135 16141 421838 16134->16141 16136 421923 16135->16136 16139 42181b 16135->16139 16151 421990 16136->16151 16139->16141 16142 429f90 16139->16142 16141->16133 16143 429fc2 16142->16143 16144 42a0a3 16142->16144 16163 42d190 16143->16163 16145 403330 42 API calls 16144->16145 16149 42a000 std::_Locinfo::_Locinfo_ctor 16145->16149 16147 438c70 std::_Throw_Cpp_error 40 API calls 16148 42a0ad 16147->16148 16149->16147 16150 42a05f std::ios_base::_Ios_base_dtor 16149->16150 16150->16141 16152 431cea 42 API calls 16151->16152 16154 42199a 16152->16154 16153 421928 16154->16153 16155 402cf0 std::_Throw_Cpp_error 42 API calls 16154->16155 16156 421a03 16155->16156 16157 41ace0 42 API calls 16156->16157 16158 421a18 16157->16158 16171 407cf0 16158->16171 16160 421a2d 16161 4351fb std::_Throw_Cpp_error RaiseException 16160->16161 16162 421a3e 16161->16162 16164 42d1d9 16163->16164 16165 42d199 16163->16165 16164->16164 16165->16164 16166 42d1b0 16165->16166 16169 433672 std::_Facet_Register 42 API calls 16165->16169 16167 42d1b9 16166->16167 16168 433672 std::_Facet_Register 42 API calls 16166->16168 16167->16149 16170 42d1d2 16168->16170 16169->16166 16170->16149 16172 407350 42 API calls 16171->16172 16173 407d80 16172->16173 16174 41ad80 42 API calls 16173->16174 16175 407d94 16174->16175 16176 402df0 std::_Throw_Cpp_error 42 API calls 16175->16176 16177 407da3 16176->16177 16178 407dcd std::ios_base::_Ios_base_dtor 16177->16178 16180 407e33 16177->16180 16179 4072b0 41 API calls 16178->16179 16181 407dfd 16179->16181 16183 438c70 std::_Throw_Cpp_error 40 API calls 16180->16183 16182 402df0 std::_Throw_Cpp_error 42 API calls 16181->16182 16184 407e1e 16182->16184 16185 407e38 16183->16185 16184->16160 16186 407350 42 API calls 16185->16186 16187 407ece 16186->16187 16188 41ad80 42 API calls 16187->16188 16189 407ee2 16188->16189 16190 402df0 std::_Throw_Cpp_error 42 API calls 16189->16190 16191 407ef1 16190->16191 16192 407f1b std::ios_base::_Ios_base_dtor 16191->16192 16194 407f81 16191->16194 16193 4072b0 41 API calls 16192->16193 16195 407f4b 16193->16195 16196 438c70 std::_Throw_Cpp_error 40 API calls 16194->16196 16197 402df0 std::_Throw_Cpp_error 42 API calls 16195->16197 16198 407f86 16196->16198 16199 407f6c 16197->16199 16200 407350 42 API calls 16198->16200 16199->16160 16201 408029 16200->16201 16202 41ad80 42 API calls 16201->16202 16203 40803d 16202->16203 16204 402df0 std::_Throw_Cpp_error 42 API calls 16203->16204 16205 40804c 16204->16205 16206 408076 std::ios_base::_Ios_base_dtor 16205->16206 16209 4080df 16205->16209 16207 4072b0 41 API calls 16206->16207 16208 4080aa 16207->16208 16210 402df0 std::_Throw_Cpp_error 42 API calls 16208->16210 16211 438c70 std::_Throw_Cpp_error 40 API calls 16209->16211 16212 4080cb 16210->16212 16213 4080e4 16211->16213 16212->16160 16213->16160 16215 404e66 16214->16215 16216 404ea8 16215->16216 16217 403040 std::_Throw_Cpp_error 42 API calls 16215->16217 16216->16070 16217->16216 16221 403380 16218->16221 16222 403399 16221->16222 16223 440dd7 53 API calls 16222->16223 16226 434b15 ___std_exception_copy 41 API calls 16225->16226 16227 4165ce 16226->16227 16228 434b15 ___std_exception_copy 41 API calls 16227->16228 16229 416601 16228->16229 16229->15846 16231 458e17 16230->16231 16235 458c08 16230->16235 16231->14200 16233 458d38 std::locale::_Setgloballocale 16233->16231 16234 403130 42 API calls 16233->16234 16234->16233 16235->16233 16237 4387b0 16235->16237 16246 403130 16235->16246 16238 4387e3 16237->16238 16243 4387c7 16237->16243 16239 449e42 __Getctype 40 API calls 16238->16239 16240 4387e8 16239->16240 16241 44a12d __Getctype 40 API calls 16240->16241 16242 4387f8 16241->16242 16242->16243 16244 449a39 50 API calls 16242->16244 16243->16235 16245 43882a 16244->16245 16245->16235 16247 4032b3 16246->16247 16248 40316f 16246->16248 16249 403330 42 API calls 16247->16249 16250 403189 16248->16250 16252 4031d7 16248->16252 16253 4031c7 16248->16253 16251 4032b8 16249->16251 16255 433672 std::_Facet_Register 42 API calls 16250->16255 16254 402b50 Concurrency::cancel_current_task 42 API calls 16251->16254 16256 433672 std::_Facet_Register 42 API calls 16252->16256 16259 40319c std::_Locinfo::_Locinfo_ctor 16252->16259 16253->16250 16253->16251 16254->16259 16255->16259 16256->16259 16257 438c70 std::_Throw_Cpp_error 40 API calls 16258 4032c2 16257->16258 16259->16257 16260 40326b std::ios_base::_Ios_base_dtor 16259->16260 16260->16235 16262 433659 GetSystemTimeAsFileTime 16261->16262 16263 43364d GetSystemTimePreciseAsFileTime 16261->16263 16264 433077 16262->16264 16263->16264 16264->13674 16869 4247b0 16870 4248ed 16869->16870 16871 4247ed 16869->16871 16872 403330 42 API calls 16870->16872 16876 424a30 42 API calls 16871->16876 16873 4248f2 16872->16873 16874 424a23 16873->16874 16875 42493d 16873->16875 16877 403330 42 API calls 16874->16877 16879 424a30 42 API calls 16875->16879 16881 424827 16876->16881 16878 424a28 16877->16878 16880 424977 16879->16880 16888 413d50 16880->16888 16883 41e1e0 40 API calls 16881->16883 16884 4248b4 16883->16884 16885 42499f 16886 41e1e0 40 API calls 16885->16886 16887 4249ea 16886->16887 16889 413df7 std::_Locinfo::_Locinfo_ctor 16888->16889 16890 413d8f 16888->16890 16889->16885 16890->16889 16891 413d96 16890->16891 16892 413e69 16890->16892 16893 413f7d 16890->16893 16894 413f1e 16890->16894 16897 433672 std::_Facet_Register 42 API calls 16891->16897 16896 433672 std::_Facet_Register 42 API calls 16892->16896 16898 433672 std::_Facet_Register 42 API calls 16893->16898 16960 417e80 16894->16960 16899 413e73 16896->16899 16900 413da0 16897->16900 16901 413f8a 16898->16901 16899->16889 16921 42bf30 16899->16921 16902 433672 std::_Facet_Register 42 API calls 16900->16902 16901->16889 16905 413fd3 16901->16905 16906 41408e 16901->16906 16904 413dd2 16902->16904 16948 42f460 16904->16948 16909 414004 16905->16909 16910 413fdb 16905->16910 16908 403330 42 API calls 16906->16908 16912 414093 16908->16912 16911 433672 std::_Facet_Register 42 API calls 16909->16911 16910->16912 16913 413fe6 16910->16913 16911->16889 16914 402b50 Concurrency::cancel_current_task 42 API calls 16912->16914 16915 433672 std::_Facet_Register 42 API calls 16913->16915 16916 413fec 16914->16916 16915->16916 16916->16889 16918 438c70 std::_Throw_Cpp_error 40 API calls 16916->16918 16917 413d50 104 API calls 16919 413eb1 16917->16919 16920 41409d 16918->16920 16919->16889 16919->16917 16922 42bf42 16921->16922 16923 42bfab 16921->16923 16925 42bf7c 16922->16925 16926 42bf4d 16922->16926 16924 403330 42 API calls 16923->16924 16928 42bfb0 16924->16928 16927 42bf99 16925->16927 16930 433672 std::_Facet_Register 42 API calls 16925->16930 16926->16928 16929 42bf54 16926->16929 16927->16919 16931 402b50 Concurrency::cancel_current_task 42 API calls 16928->16931 16932 433672 std::_Facet_Register 42 API calls 16929->16932 16934 42bf86 16930->16934 16933 42bf5a 16931->16933 16932->16933 16935 42bf63 16933->16935 16936 438c70 std::_Throw_Cpp_error 40 API calls 16933->16936 16934->16919 16935->16919 16937 42bfba 16936->16937 16938 42c077 16937->16938 16939 42c00c 16937->16939 16942 42c013 std::_Locinfo::_Locinfo_ctor 16937->16942 16941 403330 42 API calls 16938->16941 16965 41fab0 16939->16965 16943 42c07c 16941->16943 16942->16919 16944 433672 std::_Facet_Register 42 API calls 16943->16944 16945 42c0ae 16944->16945 16946 403040 std::_Throw_Cpp_error 42 API calls 16945->16946 16947 42c0f2 16946->16947 16947->16919 16949 42f498 16948->16949 16959 42f53f 16948->16959 16950 433672 std::_Facet_Register 42 API calls 16949->16950 16951 42f4ba 16950->16951 16952 4163b0 std::_Throw_Cpp_error 42 API calls 16951->16952 16953 42f4d0 16952->16953 16954 413d50 104 API calls 16953->16954 16955 42f4e0 16954->16955 16956 42f460 104 API calls 16955->16956 16957 42f531 16956->16957 16958 42f460 104 API calls 16957->16958 16958->16959 16959->16889 16961 433672 std::_Facet_Register 42 API calls 16960->16961 16962 417ea6 16961->16962 16963 4163b0 std::_Throw_Cpp_error 42 API calls 16962->16963 16964 417ec5 16963->16964 16964->16889 16966 41fac2 16965->16966 16967 41fb2b 16965->16967 16969 41facd 16966->16969 16970 41fafc 16966->16970 16968 402b50 Concurrency::cancel_current_task 42 API calls 16967->16968 16972 41fada 16968->16972 16969->16967 16973 41fad4 16969->16973 16971 41fb19 16970->16971 16975 433672 std::_Facet_Register 42 API calls 16970->16975 16971->16942 16976 438c70 std::_Throw_Cpp_error 40 API calls 16972->16976 16978 41fae3 16972->16978 16974 433672 std::_Facet_Register 42 API calls 16973->16974 16974->16972 16977 41fb06 16975->16977 16979 41fb35 16976->16979 16977->16942 16978->16942 16981 41fb5b std::locale::_Setgloballocale 16979->16981 16983 429c70 16979->16983 16981->16942 16982 41fb7f 16982->16942 16984 429dc4 16983->16984 16988 429ca2 16983->16988 16985 403330 42 API calls 16984->16985 17000 429d04 std::_Locinfo::_Locinfo_ctor 16985->17000 16986 429dbf 16987 402b50 Concurrency::cancel_current_task 42 API calls 16986->16987 16987->16984 16988->16986 16990 429cf3 16988->16990 16991 429d1d 16988->16991 16989 438c70 std::_Throw_Cpp_error 40 API calls 16992 429dce 16989->16992 16990->16986 16993 429cfe 16990->16993 16997 433672 std::_Facet_Register 42 API calls 16991->16997 16991->17000 17002 419950 16992->17002 16996 433672 std::_Facet_Register 42 API calls 16993->16996 16995 429dd9 16998 4351fb std::_Throw_Cpp_error RaiseException 16995->16998 16996->17000 16997->17000 16999 429de2 16998->16999 17000->16989 17001 429d8f std::ios_base::_Ios_base_dtor 17000->17001 17001->16982 17003 419968 17002->17003 17004 419978 std::ios_base::_Ios_base_dtor 17002->17004 17003->17004 17005 438c70 std::_Throw_Cpp_error 40 API calls 17003->17005 17004->16995 17006 41998d 17005->17006 17007 419a4f 17006->17007 17014 432b74 17006->17014 17007->16995 17013 419a04 17013->16995 17015 432af7 17014->17015 17017 4199cc 17015->17017 17043 439815 17015->17043 17017->17007 17022 4183b0 17017->17022 17021 43d0a8 78 API calls 17021->17017 17023 418463 17022->17023 17024 41843c 17022->17024 17026 41c430 17023->17026 17095 44120a 17024->17095 17027 432470 std::_Lockit::_Lockit 7 API calls 17026->17027 17028 41c45f 17027->17028 17029 432470 std::_Lockit::_Lockit 7 API calls 17028->17029 17033 41c4a9 std::_Throw_Cpp_error 17028->17033 17031 41c481 17029->17031 17030 41c4f8 17032 4324c8 std::_Lockit::~_Lockit 2 API calls 17030->17032 17035 4324c8 std::_Lockit::~_Lockit 2 API calls 17031->17035 17034 41c5c9 17032->17034 17033->17030 17036 433672 std::_Facet_Register 42 API calls 17033->17036 17034->17013 17035->17033 17037 41c506 17036->17037 17038 404040 std::_Throw_Cpp_error 75 API calls 17037->17038 17039 41c536 17038->17039 17040 404100 std::_Throw_Cpp_error 73 API calls 17039->17040 17041 41c592 17040->17041 17042 4326f7 std::_Facet_Register 42 API calls 17041->17042 17042->17030 17045 43975e std::locale::_Setgloballocale 17043->17045 17044 439771 17046 4416ff __floor_pentium4 14 API calls 17044->17046 17045->17044 17048 439791 17045->17048 17047 439776 17046->17047 17049 438c60 ___std_exception_copy 40 API calls 17047->17049 17050 4397a3 17048->17050 17051 439796 17048->17051 17059 432b43 17049->17059 17053 44a8ef 17 API calls 17050->17053 17052 4416ff __floor_pentium4 14 API calls 17051->17052 17052->17059 17054 4397ac 17053->17054 17055 4397b3 17054->17055 17056 4397c0 17054->17056 17057 4416ff __floor_pentium4 14 API calls 17055->17057 17058 4397fe RtlLeaveCriticalSection 17056->17058 17057->17059 17058->17059 17059->17017 17060 43d5f6 17059->17060 17061 43d609 ___std_exception_copy 17060->17061 17066 43d34d 17061->17066 17064 43899c ___std_exception_copy 40 API calls 17065 432b5e 17064->17065 17065->17017 17065->17021 17068 43d359 std::locale::_Setgloballocale 17066->17068 17067 43d35f 17069 438be3 ___std_exception_copy 40 API calls 17067->17069 17068->17067 17070 43d3a2 17068->17070 17076 43d37a 17069->17076 17077 441250 RtlEnterCriticalSection 17070->17077 17072 43d3ae 17078 43d4d0 17072->17078 17074 43d3c4 17087 43d3ed 17074->17087 17076->17064 17077->17072 17079 43d4e3 17078->17079 17080 43d4f6 17078->17080 17079->17074 17090 43d3f7 17080->17090 17082 43d5a7 17082->17074 17083 439a91 73 API calls 17085 43d547 17083->17085 17084 43d519 17084->17082 17084->17083 17086 44263d 42 API calls 17085->17086 17086->17082 17094 441264 RtlLeaveCriticalSection 17087->17094 17089 43d3f5 17089->17076 17091 43d408 17090->17091 17093 43d460 17090->17093 17092 4425fd 42 API calls 17091->17092 17091->17093 17092->17093 17093->17084 17094->17089 17096 441216 17095->17096 17098 44122b 17095->17098 17097 4416ff __floor_pentium4 14 API calls 17096->17097 17099 44121b 17097->17099 17098->17023 17100 438c60 ___std_exception_copy 40 API calls 17099->17100 17101 441226 17100->17101 17101->17023

                        Control-flow Graph

                        APIs
                        • setsockopt.WS2_32(00000338,0000FFFF,00001006,?,00000008), ref: 004C7BA6
                        • recv.WS2_32(?,00000004,00000002), ref: 004C7BC1
                        • WSAGetLastError.WS2_32 ref: 004C7BC5
                        • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 004C7C43
                        • recv.WS2_32(00000000,0000000C,00000008), ref: 004C7C64
                        • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?), ref: 004C7D00
                        • recv.WS2_32(00000000,?,00000008), ref: 004C7D1B
                          • Part of subcall function 004C8590: WSAStartup.WS2_32 ref: 004C85BA
                          • Part of subcall function 004C8590: getaddrinfo.WS2_32(?,?,?,00589328), ref: 004C863C
                          • Part of subcall function 004C8590: socket.WS2_32(?,?,?), ref: 004C865D
                          • Part of subcall function 004C8590: connect.WS2_32(00000000,00559BFC,?), ref: 004C8671
                          • Part of subcall function 004C8590: closesocket.WS2_32(00000000), ref: 004C867D
                          • Part of subcall function 004C8590: FreeAddrInfoW.WS2_32(?), ref: 004C868A
                          • Part of subcall function 004C8590: WSACleanup.WS2_32 ref: 004C8690
                        • recv.WS2_32(?,00000004,00000008), ref: 004C7E23
                        • __Xtime_get_ticks.LIBCPMT ref: 004C7E2A
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004C7E38
                        • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 004C7EB1
                        • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 004C7EB9
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: recv$Sleepsetsockopt$AddrCleanupErrorFreeInfoLastStartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectgetaddrinfosocket
                        • String ID:
                        • API String ID: 3089209366-0
                        • Opcode ID: deda763b8fb6066c72b20903b58187ae793f723e7b47fea433c0891846b4f81f
                        • Instruction ID: b3d54dcccad81d83ab75f13ba9899d4b50e1d8608cabcccfb3508871926cac68
                        • Opcode Fuzzy Hash: deda763b8fb6066c72b20903b58187ae793f723e7b47fea433c0891846b4f81f
                        • Instruction Fuzzy Hash: 9EB1AC71D043089BEB10DBA8CC49BAEBBB1BB54314F24025EE815BB2D2D7785D88DF95

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 56 4c8590-4c85c2 WSAStartup 57 4c85c8-4c85f2 call 4ea420 * 2 56->57 58 4c8696-4c869f 56->58 63 4c85fe-4c8644 getaddrinfo 57->63 64 4c85f4-4c85f8 57->64 65 4c8646-4c864c 63->65 66 4c8690 WSACleanup 63->66 64->58 64->63 67 4c864e 65->67 68 4c86a4-4c86ae FreeAddrInfoW 65->68 66->58 70 4c8654-4c8668 socket 67->70 68->66 69 4c86b0-4c86b8 68->69 70->66 71 4c866a-4c867a connect 70->71 72 4c867c-4c8684 closesocket 71->72 73 4c86a0 71->73 72->70 74 4c8686-4c868a FreeAddrInfoW 72->74 73->68 74->66
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: AddrFreeInfo$CleanupStartupclosesocketconnectgetaddrinfosocket
                        • String ID:
                        • API String ID: 448659506-0
                        • Opcode ID: 52d29ec15fbf37ccd53ab56e21f2e3f1d11727fcf2b6a4206c2cbc59116a4c78
                        • Instruction ID: ffa07009e3086412046aa5b15573dbd5c691e56a3beb11943292ef2f0f62f1de
                        • Opcode Fuzzy Hash: 52d29ec15fbf37ccd53ab56e21f2e3f1d11727fcf2b6a4206c2cbc59116a4c78
                        • Instruction Fuzzy Hash: 9531C1726043009BD7208F25DC48B2BB7E5FB94729F114B1EF9A4922E0D7759C089AA7

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 75 409280-4092dd call 4163b0 78 409413-409521 call 402df0 call 4ea420 75->78 79 4092e3-4092e9 75->79 95 409523-409535 78->95 96 409537-40953f call 418dc0 78->96 80 4092f0-409313 79->80 82 409324-409331 80->82 83 409315-40931f 80->83 86 409342-40934f 82->86 87 409333-40933d 82->87 85 409403-409406 83->85 89 409409-40940d 85->89 90 409360-40936d 86->90 91 409351-40935b 86->91 87->85 89->78 89->80 93 40937e-40938b 90->93 94 40936f-409379 90->94 91->85 99 409399-4093a6 93->99 100 40938d-409397 93->100 94->85 97 409544-409597 call 4ea420 * 2 95->97 96->97 112 409599-4095c8 call 4ea420 call 435270 97->112 113 4095cb-4095e1 call 4ea420 97->113 101 4093b4-4093c1 99->101 102 4093a8-4093b2 99->102 100->85 104 4093c3-4093cd 101->104 105 4093cf-4093dc 101->105 102->85 104->85 107 4093ea-4093f4 105->107 108 4093de-4093e8 105->108 107->89 111 4093f6-4093ff 107->111 108->85 111->85 112->113 119 4096e2 113->119 120 4095e7-4095ed 113->120 122 4096e6-4096f0 119->122 121 4095f0-4096ce GetModuleHandleA GetProcAddress WSASend 120->121 124 4096d4-4096dc 121->124 125 40975f-409763 121->125 126 4096f2-4096fe 122->126 127 40971e-40973d 122->127 124->119 124->121 125->122 128 409700-40970e 126->128 129 409714-40971b call 4338f3 126->129 130 40976f-409796 127->130 131 40973f-40974b 127->131 128->129 132 409797-4097fe call 438c70 call 402df0 * 2 128->132 129->127 134 409765-40976c call 4338f3 131->134 135 40974d-40975b 131->135 134->130 135->132 138 40975d 135->138 138->134
                        APIs
                        • GetModuleHandleA.KERNEL32(Ws2_32.dll,?,?,?,?,0054D15C,00000000,74D723A0,-00589880), ref: 004096A6
                        • GetProcAddress.KERNEL32(00000000,?), ref: 004096B4
                        • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,0054D15C,00000000,74D723A0,-00589880), ref: 004096C9
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProcSend
                        • String ID: Ws2_32.dll
                        • API String ID: 2819740048-3093949381
                        • Opcode ID: d946741ea927b9b060335f299eec8efad25939578b4ebaaa967d5c79e73c84d4
                        • Instruction ID: 188670ed5cfc709ed037a390f66f33add7af100e18449b0941b00ad524943a05
                        • Opcode Fuzzy Hash: d946741ea927b9b060335f299eec8efad25939578b4ebaaa967d5c79e73c84d4
                        • Instruction Fuzzy Hash: 7C02CE70D04298DEDF25CFA4C8907ADBBB0EF59304F24429EE4456B2C6D7781D86CB96

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 146 449789-4497ab 147 4497b1-4497b3 146->147 148 44999e 146->148 150 4497b5-4497d4 call 438be3 147->150 151 4497df-449802 147->151 149 4499a0-4499a4 148->149 159 4497d7-4497da 150->159 153 449804-449806 151->153 154 449808-44980e 151->154 153->154 155 449810-449821 153->155 154->150 154->155 157 449834-449844 call 4492ce 155->157 158 449823-449831 call 44263d 155->158 164 449846-44984c 157->164 165 44988d-44989f 157->165 158->157 159->149 168 449875-44988b call 448e9f 164->168 169 44984e-449851 164->169 166 4498f6-449916 WriteFile 165->166 167 4498a1-4498a7 165->167 170 449921 166->170 171 449918-44991e GetLastError 166->171 173 4498e2-4498f4 call 44934b 167->173 174 4498a9-4498ac 167->174 184 44986e-449870 168->184 175 449853-449856 169->175 176 44985c-44986b call 449266 169->176 178 449924-44992f 170->178 171->170 196 4498c9-4498cc 173->196 179 4498ce-4498e0 call 44950f 174->179 180 4498ae-4498b1 174->180 175->176 181 449936-449939 175->181 176->184 185 449931-449934 178->185 186 449999-44999c 178->186 179->196 187 44993c-44993e 180->187 188 4498b7-4498c4 call 449426 180->188 181->187 184->178 185->181 186->149 192 449940-449945 187->192 193 44996c-449978 187->193 188->196 197 449947-449959 192->197 198 44995e-449967 call 4416c8 192->198 199 449982-449994 193->199 200 44997a-449980 193->200 196->184 197->159 198->159 199->159 200->148 200->199
                        APIs
                          • Part of subcall function 00448E9F: GetConsoleOutputCP.KERNEL32(DDA667AB,00000000,00000000,?), ref: 00448F02
                        • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0044990E
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00449918
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: ConsoleErrorFileLastOutputWrite
                        • String ID:
                        • API String ID: 2915228174-0
                        • Opcode ID: 2beaef352ff8862ad6b8b16251cd0bd229135013537871e9a6efb1225fc67aec
                        • Instruction ID: 4c198159cf300fc4e9085a349e24ad4d45033eb13303bb4f9288eddf9455663d
                        • Opcode Fuzzy Hash: 2beaef352ff8862ad6b8b16251cd0bd229135013537871e9a6efb1225fc67aec
                        • Instruction Fuzzy Hash: 9961C5B1C14119BFEF11DFA8C844AAFBBB9AF49304F14014AE800A7316D739DD05EB65

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 203 448dff-448e13 call 44e940 206 448e15-448e17 203->206 207 448e19-448e21 203->207 208 448e67-448e87 call 44e8af 206->208 209 448e23-448e2a 207->209 210 448e2c-448e2f 207->210 219 448e99 208->219 220 448e89-448e97 call 4416c8 208->220 209->210 212 448e37-448e4b call 44e940 * 2 209->212 213 448e31-448e35 210->213 214 448e4d-448e5d call 44e940 FindCloseChangeNotification 210->214 212->206 212->214 213->212 213->214 214->206 222 448e5f-448e65 GetLastError 214->222 224 448e9b-448e9e 219->224 220->224 222->208
                        APIs
                        • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,00448CE6,00000000,?,0057A178,0000000C,00448DA2,?,?,?), ref: 00448E55
                        • GetLastError.KERNEL32(?,00448CE6,00000000,?,0057A178,0000000C,00448DA2,?,?,?), ref: 00448E5F
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: ChangeCloseErrorFindLastNotification
                        • String ID:
                        • API String ID: 1687624791-0
                        • Opcode ID: 1fe827fdfe079599b9b1dab25e2b646f0beb01ea40d46a72429d261cc15a62e7
                        • Instruction ID: bfed174018f4c3fae0b74bea86efe9ace0911028d3bee9629bfc5162a0057b67
                        • Opcode Fuzzy Hash: 1fe827fdfe079599b9b1dab25e2b646f0beb01ea40d46a72429d261cc15a62e7
                        • Instruction Fuzzy Hash: 6E1125336042102AF6252236A84677F67499B82738F39061FF918CB2D2DF689C81825D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 228 44251c-442534 call 44e940 231 442536-44253d 228->231 232 44254a-442560 SetFilePointerEx 228->232 233 442544-442548 231->233 234 442575-44257f 232->234 235 442562-442573 GetLastError call 4416c8 232->235 236 44259b-44259e 233->236 234->233 238 442581-442596 234->238 235->233 238->236
                        APIs
                        • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,00442626,?,?,?,?,?), ref: 00442558
                        • GetLastError.KERNEL32(?,?,?,?,00442626,?,?,?,?,?,00000000,?,00000000), ref: 00442565
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: ErrorFileLastPointer
                        • String ID:
                        • API String ID: 2976181284-0
                        • Opcode ID: 0df1753fdbe4f7a704092f8361e7cfb0c7cc0fcadc70f8748e4d2d33b1623b65
                        • Instruction ID: bcffdd1dd92d970d4fbe8e398a8ab980657c5c2bf717c74f1f656664416c076e
                        • Opcode Fuzzy Hash: 0df1753fdbe4f7a704092f8361e7cfb0c7cc0fcadc70f8748e4d2d33b1623b65
                        • Instruction Fuzzy Hash: 9B012632610615BFDF158F69DC1699E3B29EB84334F240209F8019B2E1E6B5ED429BA4

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 240 4032d0-4032e0 241 4032e2-4032e7 240->241 242 403306-403308 240->242 245 4032e9-4032ea call 433672 241->245 246 40331f call 402b50 241->246 243 403318-40331e 242->243 244 40330a-40330b call 433672 242->244 250 403310-403317 244->250 252 4032ef-4032f6 245->252 251 403324-403329 call 438c70 246->251 252->251 254 4032f8-403305 252->254
                        APIs
                        • Concurrency::cancel_current_task.LIBCPMT ref: 0040331F
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: Concurrency::cancel_current_task
                        • String ID:
                        • API String ID: 118556049-0
                        • Opcode ID: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                        • Instruction ID: ac639495c118a2832fc09027b5ebf4fad0cef292c7be368858978faeea3118d5
                        • Opcode Fuzzy Hash: 0fd589d96c9d07b1efa01aec19e4ff46bb0766daf2056f60d33bc81ca57302d3
                        • Instruction Fuzzy Hash: 63F024321001009BCB246F61D4565EAB7ECDF28366B50083FFC8DD7292EB3EDA408788

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 256 44a65a-44a665 257 44a667-44a671 256->257 258 44a673-44a679 256->258 257->258 259 44a6a7-44a6b2 call 4416ff 257->259 260 44a692-44a6a3 RtlAllocateHeap 258->260 261 44a67b-44a67c 258->261 266 44a6b4-44a6b6 259->266 262 44a6a5 260->262 263 44a67e-44a685 call 448280 260->263 261->260 262->266 263->259 269 44a687-44a690 call 445a89 263->269 269->259 269->260
                        APIs
                        • RtlAllocateHeap.NTDLL(00000008,?,00000001), ref: 0044A69B
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: 89032516e5b3e6299283371760f336f91a06b383302663fb1c071aa923d3998c
                        • Instruction ID: 9689b7dccde3e7d2c1426315cc49502dff6dd5535dcc2f3da2dc3831567fdc71
                        • Opcode Fuzzy Hash: 89032516e5b3e6299283371760f336f91a06b383302663fb1c071aa923d3998c
                        • Instruction Fuzzy Hash: 4CF0E0311905246BFB216A66DC05B5B375CAF41760F1E8117EC84EB190CA3CDC3146EE

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 272 44b094-44b0a0 273 44b0d2-44b0dd call 4416ff 272->273 274 44b0a2-44b0a4 272->274 282 44b0df-44b0e1 273->282 275 44b0a6-44b0a7 274->275 276 44b0bd-44b0ce RtlAllocateHeap 274->276 275->276 278 44b0d0 276->278 279 44b0a9-44b0b0 call 448280 276->279 278->282 279->273 284 44b0b2-44b0bb call 445a89 279->284 284->273 284->276
                        APIs
                        • RtlAllocateHeap.NTDLL(00000000,00000001,?), ref: 0044B0C6
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: c639ae0624eff34eb8e57d07392fb4ffc7a0b3e65f726cef66c68c9318aea675
                        • Instruction ID: 07eaf642519ac51a5bd3283dd2addbb445c80e248ae9cef49388ffb333b33e8c
                        • Opcode Fuzzy Hash: c639ae0624eff34eb8e57d07392fb4ffc7a0b3e65f726cef66c68c9318aea675
                        • Instruction Fuzzy Hash: 99E022322006206BFF313AA69C14B5B764CEF413A3F190227EC25A62D1DB3CCC0092EE
                        APIs
                        • VirtualAllocEx.KERNEL32(00000000,00000000,?,00003000,00000040), ref: 004CF2F1
                        • WriteProcessMemory.KERNEL32(00000000,00000000,?,?,00000000), ref: 004CF30D
                        • WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 004CF342
                        • VirtualAllocEx.KERNEL32(?,00000000,00001000,00003000,00000040), ref: 004CF36B
                        • WriteProcessMemory.KERNEL32(?,00000000,?,00000218,00000000), ref: 004CF50F
                        • WriteProcessMemory.KERNEL32(?,00000218,004CF5E0,-00000010,00000000), ref: 004CF531
                        • CreateRemoteThread.KERNEL32(?,00000000,00000000,00000218,00000000,00000000,00000000), ref: 004CF544
                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004CF54D
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: MemoryProcessWrite$AllocVirtual$CreateObjectRemoteSingleThreadWait
                        • String ID: %s|%s$131
                        • API String ID: 2137838514-1629954864
                        • Opcode ID: b88fb1ed2ebfd2a655c4879da0ce9de7ec8f2c0603ef1b71525654192dd42d6d
                        • Instruction ID: 2ab717f03d3c912496b66fb944616d360f792c6fe5d042a247d22025e7d5b78f
                        • Opcode Fuzzy Hash: b88fb1ed2ebfd2a655c4879da0ce9de7ec8f2c0603ef1b71525654192dd42d6d
                        • Instruction Fuzzy Hash: 36B16BB1D002089FDB14CFA4CC95BAEBBB5FF18300F10426DE905BB291D774A984DBA5
                        APIs
                          • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                          • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                        • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 004535D7
                        • IsValidCodePage.KERNEL32(?), ref: 00453615
                        • IsValidLocale.KERNEL32(?,00000001), ref: 00453628
                        • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00453670
                        • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 0045368B
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                        • String ID: *V
                        • API String ID: 415426439-2897881622
                        • Opcode ID: bb3ee8500ca9cacc625c50b97d6e48ff5c53ad3e39c4a6c01d9da358df15b7ae
                        • Instruction ID: 4a54d826d8e8e5dc964d84ffa3ac1e49b68ae0fe58eca9cd8e7cd24ca5604c7d
                        • Opcode Fuzzy Hash: bb3ee8500ca9cacc625c50b97d6e48ff5c53ad3e39c4a6c01d9da358df15b7ae
                        • Instruction Fuzzy Hash: 4E517471A00209AFDB20DFA5CC41ABF77B8AF05743F14446AED01E7252EB74DA48DB65
                        APIs
                          • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                          • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                        • GetACP.KERNEL32(?,?,?,?,?,?,00447300,?,?,?,?,?,-00000050,?,?,?), ref: 00452C19
                        • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00447300,?,?,?,?,?,-00000050,?,?), ref: 00452C50
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00452DB3
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: ErrorLast$CodeInfoLocalePageValid
                        • String ID: *V$utf8
                        • API String ID: 607553120-210452255
                        • Opcode ID: 95727e6ef7b94787d777f99e21165c393144e5509e4be2ad3f52f8295ffa9360
                        • Instruction ID: 742b11dcb7ff0b0bfa38c284345f0d68b4d7ce619a9ba0daefdf44cafbbca61f
                        • Opcode Fuzzy Hash: 95727e6ef7b94787d777f99e21165c393144e5509e4be2ad3f52f8295ffa9360
                        • Instruction Fuzzy Hash: F071FA32600602A6D725AF75CD45B6B73A8EF16705F10042FFD05D7283EBF8E94C9699
                        APIs
                        • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002,00000000,?,?,?,00453605,?,?), ref: 0045338C
                        • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002,00000000,?,?,?,00453605,?,?), ref: 004533B5
                        • GetACP.KERNEL32(?,?,00453605,?,?), ref: 004533CA
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: InfoLocale
                        • String ID: ACP$OCP
                        • API String ID: 2299586839-711371036
                        • Opcode ID: b900ca414d4c4be95a8c6f041d08249478f894891a183a2f82a4edaf5765dc51
                        • Instruction ID: 0023b8279c9b3e3643c8ce07df61025d6c2b7e12d2ffc4f7461f6cfcb2a1a3ae
                        • Opcode Fuzzy Hash: b900ca414d4c4be95a8c6f041d08249478f894891a183a2f82a4edaf5765dc51
                        • Instruction Fuzzy Hash: 8021C432600100A7DB308F54C900A9BB3A6AF50FD3B568466EC06D7312EF36EF49D358
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                        • Instruction ID: 01dad5c531b3804b6668612822d9feb5b6f7af541a2af8c3bc89036eeee974e8
                        • Opcode Fuzzy Hash: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                        • Instruction Fuzzy Hash: DA023A71E002199BDF14CFA9D9C06AEFBB1FF48314F24926AE919B7380D735A9418B94
                        APIs
                        • RtlDecodePointer.NTDLL(?), ref: 004579FC
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: DecodePointer
                        • String ID: `-@$acos$asin$exp$log$log10$pow$sqrt
                        • API String ID: 3527080286-3628989360
                        • Opcode ID: 4c17630f5161de399ffce6b570c60365a2c89c55b52a7f760b39540bf94f5387
                        • Instruction ID: bbf143f63b3841ec77cfacb8c6df481a799db6acf17f433172942b25d65e7ef2
                        • Opcode Fuzzy Hash: 4c17630f5161de399ffce6b570c60365a2c89c55b52a7f760b39540bf94f5387
                        • Instruction Fuzzy Hash: 1651B370808A0ACBCF109F58F84C1BEBFB1FB05309F154166D851A7266C7799A2DCB4D
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 0041A09D
                        • std::_Lockit::_Lockit.LIBCPMT ref: 0041A0BF
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0041A0E7
                        • __Getctype.LIBCPMT ref: 0041A1C5
                        • std::_Facet_Register.LIBCPMT ref: 0041A1F9
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0041A223
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                        • String ID: PD@$PG@$E@
                        • API String ID: 1102183713-4120405683
                        • Opcode ID: 495f4126c8959cda1dad90c343e93fba20469dde2e2043d742b69906c970156d
                        • Instruction ID: b372b58ab1bb25eec4b44a09b7f8f3aef2cc67a410616163416d5e42c3dffe19
                        • Opcode Fuzzy Hash: 495f4126c8959cda1dad90c343e93fba20469dde2e2043d742b69906c970156d
                        • Instruction Fuzzy Hash: 6E51BAB0D01245DFCB11CF98C9457AEBBF0FB14714F14825ED855AB391DB78AA88CB92
                        APIs
                        • _ValidateLocalCookies.LIBCMT ref: 00437307
                        • ___except_validate_context_record.LIBVCRUNTIME ref: 0043730F
                        • _ValidateLocalCookies.LIBCMT ref: 00437398
                        • __IsNonwritableInCurrentImage.LIBCMT ref: 004373C3
                        • _ValidateLocalCookies.LIBCMT ref: 00437418
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                        • String ID: `-@$csm
                        • API String ID: 1170836740-3738301566
                        • Opcode ID: a837c65dc98bc53f7a591b5dada66322cfdf011b0ab20b220170fbbfaeea83fd
                        • Instruction ID: bde692452db8eba3752ab90a3e7788ac0719a0bf92b2230e47b89eff8dfd02fd
                        • Opcode Fuzzy Hash: a837c65dc98bc53f7a591b5dada66322cfdf011b0ab20b220170fbbfaeea83fd
                        • Instruction Fuzzy Hash: B041F8709042099FCF20DF59C885A9FBBA4BF08328F14905BFC54AB392D739E905DB95
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 0041C45A
                        • std::_Lockit::_Lockit.LIBCPMT ref: 0041C47C
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0041C4A4
                        • std::_Facet_Register.LIBCPMT ref: 0041C59A
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0041C5C4
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                        • String ID: E@$PD@
                        • API String ID: 459529453-4103272508
                        • Opcode ID: fb94b052f71f665722219136562a8730e5ed9d67761b2a33bc821d4977d05291
                        • Instruction ID: e4bc83ced0ac359faa997fd18d4eeb760fe14de2594101695cc0fd15b6690fbc
                        • Opcode Fuzzy Hash: fb94b052f71f665722219136562a8730e5ed9d67761b2a33bc821d4977d05291
                        • Instruction Fuzzy Hash: C351EFB0900255EFDB11CF58C991BAEBBF0FB10314F24415EE846AB381D7B9AA45CB95
                        APIs
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: _strrchr
                        • String ID:
                        • API String ID: 3213747228-0
                        • Opcode ID: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                        • Instruction ID: d7b9d7273cbfac5d15a556f8c8651b9033d93685d5a38535419dded3191b9e75
                        • Opcode Fuzzy Hash: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                        • Instruction Fuzzy Hash: D5B14672D006559FEB158F24CC81BEBBBA5EF59310F2441ABE904AB382D778D901C7E9
                        APIs
                        • FreeLibrary.KERNEL32(00000000,?,0044B48D,?,?,00000000,00000001,?,?,0044B6B7,00000022,FlsSetValue,00561B88,00561B90,00000001), ref: 0044B43F
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: FreeLibrary
                        • String ID: api-ms-$ext-ms-
                        • API String ID: 3664257935-537541572
                        • Opcode ID: 033630484f002e070c94113c7b6ef7f262f68e90d70309fdd043a749aa00ed93
                        • Instruction ID: e3d7dbf8d3e43151f67a2d3675c4fcd7809fc0c9af6198dcb17880ded4e1cd5b
                        • Opcode Fuzzy Hash: 033630484f002e070c94113c7b6ef7f262f68e90d70309fdd043a749aa00ed93
                        • Instruction Fuzzy Hash: A2212B36A01220A7E7319F619C45A6B7768EB51761F140112FC06A7392D734ED05D6D9
                        APIs
                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,DDA667AB,?,?,00000000,00551365,000000FF,?,0044360F,?,?,004435E3,00000016), ref: 00443668
                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044367A
                        • FreeLibrary.KERNEL32(00000000,?,00000000,00551365,000000FF,?,0044360F,?,?,004435E3,00000016), ref: 0044369C
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: AddressFreeHandleLibraryModuleProc
                        • String ID: CorExitProcess$`-@$mscoree.dll
                        • API String ID: 4061214504-3731901874
                        • Opcode ID: 66c557226bdf84cfe892202a4e2d9d598a1facfa92736b92f61228ad13b2a6bb
                        • Instruction ID: 11f561727bfec435161e86ab51d2faaed74d5e09c0b89d0474703e999051cdf2
                        • Opcode Fuzzy Hash: 66c557226bdf84cfe892202a4e2d9d598a1facfa92736b92f61228ad13b2a6bb
                        • Instruction Fuzzy Hash: 5601A232A44715AFDB219F44DC19BAFBBB8FB14B52F014526E812E27E0DB749A04CA94
                        APIs
                        • __EH_prolog3.LIBCMT ref: 00432730
                        • std::_Lockit::_Lockit.LIBCPMT ref: 0043273B
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 004327A9
                          • Part of subcall function 0043288C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 004328A4
                        • std::locale::_Setgloballocale.LIBCPMT ref: 00432756
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                        • String ID: `-@
                        • API String ID: 677527491-3781167437
                        • Opcode ID: 8a5613631ec3d916f95b396eb7cc43f12c5d676d84142dd5ef1a29976cc47206
                        • Instruction ID: 335728d06f8999c9367bb6f0cb93ad347570f0e44e9dcbef2930aaa8ccdcd417
                        • Opcode Fuzzy Hash: 8a5613631ec3d916f95b396eb7cc43f12c5d676d84142dd5ef1a29976cc47206
                        • Instruction Fuzzy Hash: 9D01FC35A006109BC70AFB20CC5157D7BB0FF98790F44250EE81163391CFB8AE06DB89
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 00432BDC
                        • RtlAcquireSRWLockExclusive.NTDLL(00000008), ref: 00432BFB
                        • RtlAcquireSRWLockExclusive.NTDLL(00000008), ref: 00432C29
                        • RtlTryAcquireSRWLockExclusive.NTDLL(00000008), ref: 00432C84
                        • RtlTryAcquireSRWLockExclusive.NTDLL(00000008), ref: 00432C9B
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: AcquireExclusiveLock$CurrentThread
                        • String ID:
                        • API String ID: 66001078-0
                        • Opcode ID: 8f089e7040faa662b45679f060ee1b8a0f0adfff173fd46cb89089840a213128
                        • Instruction ID: ee0d2db44a198d3d02c1eb3b1b0ff5a364ec90963e300245c4d31640e9e12550
                        • Opcode Fuzzy Hash: 8f089e7040faa662b45679f060ee1b8a0f0adfff173fd46cb89089840a213128
                        • Instruction Fuzzy Hash: B2415931900A0ADFCB20DF65CA8096EB3B4FF0C311F20692BD446D7650D7B8E986DB69
                        APIs
                        • ___std_exception_destroy.LIBVCRUNTIME ref: 0040750C
                        • ___std_exception_destroy.LIBVCRUNTIME ref: 00407522
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: ___std_exception_destroy
                        • String ID: )@$[json.exception.
                        • API String ID: 4194217158-3378332251
                        • Opcode ID: 74f1ced649a80f54c74698f2e3f1ef80366f2fbaef409b1663f26043a5eac72a
                        • Instruction ID: d1fd1ad00dbeab1566b73d8112c34bc80c76f551163e59ed82d928a5322bc1a2
                        • Opcode Fuzzy Hash: 74f1ced649a80f54c74698f2e3f1ef80366f2fbaef409b1663f26043a5eac72a
                        • Instruction Fuzzy Hash: 8C51CFB1C046489BD710DFA8C905B9EBBB4FF15318F14426EE850A73C2E7B86A44C7A5
                        APIs
                        • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0040499F
                          • Part of subcall function 004351FB: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,74D723A0,?,00431D09,?,005799D8,74D723A0,?,74D723A0,-00589880), ref: 0043525B
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: ExceptionIos_base_dtorRaisestd::ios_base::_
                        • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                        • API String ID: 1903096808-1866435925
                        • Opcode ID: 5e8fcf04681b5496c91e096f1d273a5343178b8940b0c322b64de4dd1df32f3c
                        • Instruction ID: 99c94d1e80f512c720ba00148ae48faeb0acee82eabb402b7e5943aa58dcc262
                        • Opcode Fuzzy Hash: 5e8fcf04681b5496c91e096f1d273a5343178b8940b0c322b64de4dd1df32f3c
                        • Instruction Fuzzy Hash: AC119CF2844644ABCB10DF688C03BAB37C8E744715F04463EFE58972C1EB399800C79A
                        APIs
                        • GetConsoleOutputCP.KERNEL32(DDA667AB,00000000,00000000,?), ref: 00448F02
                          • Part of subcall function 0044EC55: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0044A862,?,00000000,-00000008), ref: 0044ECB6
                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00449154
                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0044919A
                        • GetLastError.KERNEL32 ref: 0044923D
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                        • String ID:
                        • API String ID: 2112829910-0
                        • Opcode ID: d46c0870a8277536d77cd1fa32924c999241811f2f15ebdbc3735bbe4b8907ba
                        • Instruction ID: b6f9ea87837ca93654473fd2bae4ec290e60b55bc3ade45d2d9d29a5185f0d60
                        • Opcode Fuzzy Hash: d46c0870a8277536d77cd1fa32924c999241811f2f15ebdbc3735bbe4b8907ba
                        • Instruction Fuzzy Hash: 70D1BC75D00249AFDF14CFA8C880AAEBBB5FF09304F28456AE856EB351D734AD45CB54
                        APIs
                        • WriteConsoleW.KERNEL32(?,?,?,00000000,?,?,00453DCE,?,00000001,?,?,?,00449291,?,00000000,00000000), ref: 00456D49
                        • GetLastError.KERNEL32(?,00453DCE,?,00000001,?,?,?,00449291,?,00000000,00000000,?,?,?,0044986B,?), ref: 00456D55
                          • Part of subcall function 00456D1B: CloseHandle.KERNEL32(FFFFFFFE,00456D65,?,00453DCE,?,00000001,?,?,?,00449291,?,00000000,00000000,?,?), ref: 00456D2B
                        • ___initconout.LIBCMT ref: 00456D65
                          • Part of subcall function 00456CDD: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00456D0C,00453DBB,?,?,00449291,?,00000000,00000000,?), ref: 00456CF0
                        • WriteConsoleW.KERNEL32(?,?,?,00000000,?,00453DCE,?,00000001,?,?,?,00449291,?,00000000,00000000,?), ref: 00456D7A
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                        • String ID:
                        • API String ID: 2744216297-0
                        • Opcode ID: 6d252f6c85546040703605b5d122fbb434f3c9b6b34be8e7cd3f73b3df330617
                        • Instruction ID: b582005f90f2c4d159ccd48a3422ceca8e6e351b7b3b67145bbef734a6de3f3c
                        • Opcode Fuzzy Hash: 6d252f6c85546040703605b5d122fbb434f3c9b6b34be8e7cd3f73b3df330617
                        • Instruction Fuzzy Hash: F4F01C37500518BBCF221FD1DC18A8A3F76EB583A2B814415FE0D96231D6328928EB94
                        APIs
                        • ___std_exception_copy.LIBVCRUNTIME ref: 00403819
                        • ___std_exception_destroy.LIBVCRUNTIME ref: 004038F0
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: ___std_exception_copy___std_exception_destroy
                        • String ID: )@
                        • API String ID: 2970364248-4120265097
                        • Opcode ID: ed1ac0f14267c2b8626e9d784d9228836504f476972db074cc70cf608e0aac1a
                        • Instruction ID: 269ef50febfdc4b1c22cf7239a576f40f0b19685bcb009e1facc48eb6157c32a
                        • Opcode Fuzzy Hash: ed1ac0f14267c2b8626e9d784d9228836504f476972db074cc70cf608e0aac1a
                        • Instruction Fuzzy Hash: DD6169B1C00248DBDB10DF98C945B9EFFB5FF19324F14825EE814AB282D7B95A44CBA5
                        APIs
                        • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0040499F
                          • Part of subcall function 004351FB: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,74D723A0,?,00431D09,?,005799D8,74D723A0,?,74D723A0,-00589880), ref: 0043525B
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: ExceptionIos_base_dtorRaisestd::ios_base::_
                        • String ID: ios_base::badbit set$ios_base::failbit set
                        • API String ID: 1903096808-1240500531
                        • Opcode ID: 203c698a29c545db5755075702da49fc56ba2ad14afa72da2930693391794826
                        • Instruction ID: 59789774a96eacd1a5b8f49c51d8e497543063f0a2ed12b155596828dbf76f3a
                        • Opcode Fuzzy Hash: 203c698a29c545db5755075702da49fc56ba2ad14afa72da2930693391794826
                        • Instruction Fuzzy Hash: E84124B2C00244ABCB04DF68C845BAEBBB8FB49710F14826EF554A73C1D7795A00CBA5
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 00404061
                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 004040C4
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                        • String ID: bad locale name
                        • API String ID: 3988782225-1405518554
                        • Opcode ID: 0039d2d2ea2786ef81fe116e8b864d57793cf36a19fa060d6cb0c255b1586cee
                        • Instruction ID: 65c2995a4cce64452fc0e082f9126f7f9302ed92d60cad1113ce5137d9e79936
                        • Opcode Fuzzy Hash: 0039d2d2ea2786ef81fe116e8b864d57793cf36a19fa060d6cb0c255b1586cee
                        • Instruction Fuzzy Hash: DB112670805B84EED321CF69C50474BBFF0AF25714F10868DD09597781D3B9A604CB95
                        APIs
                        • ___std_exception_copy.LIBVCRUNTIME ref: 004165C9
                        • ___std_exception_copy.LIBVCRUNTIME ref: 004165FC
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: ___std_exception_copy
                        • String ID: )@
                        • API String ID: 2659868963-4120265097
                        • Opcode ID: ec459901e9a8c12f2536e06f4ce64afd8286d8aca2aa337d2d7da09c98386d96
                        • Instruction ID: 79ebb971947c26e29da123751e765caa72f3f100f47198c89106861aa63fe252
                        • Opcode Fuzzy Hash: ec459901e9a8c12f2536e06f4ce64afd8286d8aca2aa337d2d7da09c98386d96
                        • Instruction Fuzzy Hash: F0112EB6910649EBCB11CF99C980B86FBF8FF09724F10876AE82497641E774A5448BA0
                        APIs
                        • ___std_exception_destroy.LIBVCRUNTIME ref: 00407A5C
                        • ___std_exception_destroy.LIBVCRUNTIME ref: 00407A72
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: ___std_exception_destroy
                        • String ID: )@
                        • API String ID: 4194217158-4120265097
                        • Opcode ID: 9ee8fa866bcea9d2c14fc14309fcadf8facde4318e0e6bb098ed358a1a235593
                        • Instruction ID: 96290d15a7b89a27e7413382239de33ac52fdad5c525fa7f0e86a9c1871ea130
                        • Opcode Fuzzy Hash: 9ee8fa866bcea9d2c14fc14309fcadf8facde4318e0e6bb098ed358a1a235593
                        • Instruction Fuzzy Hash: 68F012B1805744DFC711DF98C90178DFFF8FB05728F50466AE855A3780E7B5660487A5
                        APIs
                        • GetSystemTimePreciseAsFileTime.KERNEL32(?,00433077,?,?,?,?,004C7E2F), ref: 00433655
                        • GetSystemTimeAsFileTime.KERNEL32(?,DDA667AB,00000000,?,00551382,000000FF,?,00433077,?,?,?,?,004C7E2F), ref: 00433659
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: Time$FileSystem$Precise
                        • String ID: `-@
                        • API String ID: 743729956-3781167437
                        • Opcode ID: a70e229828252f114f3dcb939b169fb3f53d7191ad82fa45b454faadf805d98c
                        • Instruction ID: 3e04e591088ee8cc2650925c1d28f2227fba881fd4e87dc1a7d03300bd93dc66
                        • Opcode Fuzzy Hash: a70e229828252f114f3dcb939b169fb3f53d7191ad82fa45b454faadf805d98c
                        • Instruction Fuzzy Hash: 73F0A032904A54EFCB118F44DC11B59BBA8F708B21F004626EC12A3790DB34A9049F94
                        APIs
                        • InitializeCriticalSectionAndSpinCount.KERNEL32(00000016,00000001,004389D2,00000001,00000016,00438BE1,?,?,?,?,?,00000000), ref: 0044B834
                        Strings
                        Memory Dump Source
                        • Source File: 00000005.00000002.3251572028.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000005.00000002.3251442840.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252220820.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252318852.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252384144.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252449095.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3252508437.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000005.00000002.3254583869.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_5_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: CountCriticalInitializeSectionSpin
                        • String ID: InitializeCriticalSectionEx$`-@
                        • API String ID: 2593887523-3269949891
                        • Opcode ID: 1f2253b5c78e33ee57fe7f30907939316c5faef6f9275bf3e632fad4f43c2f0e
                        • Instruction ID: 5bcc12c1b0658f8dc7434a33690804c70bb56e7eadbb0958c8ec10a8e9d05d13
                        • Opcode Fuzzy Hash: 1f2253b5c78e33ee57fe7f30907939316c5faef6f9275bf3e632fad4f43c2f0e
                        • Instruction Fuzzy Hash: BDE09236581318BBCB212F92DC06DAE7F25EB24BA2F048022FD1956161C7768821BBD9

                        Control-flow Graph

                        APIs
                        • setsockopt.WS2_32(0000031C,0000FFFF,00001006,?,00000008), ref: 004C7BA6
                        • recv.WS2_32(?,00000004,00000002), ref: 004C7BC1
                        • WSAGetLastError.WS2_32 ref: 004C7BC5
                        • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 004C7C43
                        • recv.WS2_32(00000000,0000000C,00000008), ref: 004C7C64
                        • setsockopt.WS2_32(0000FFFF,00001006,?,00000008,?), ref: 004C7D00
                        • recv.WS2_32(00000000,?,00000008), ref: 004C7D1B
                          • Part of subcall function 004C8590: WSAStartup.WS2_32 ref: 004C85BA
                          • Part of subcall function 004C8590: getaddrinfo.WS2_32(?,?,?,00589328), ref: 004C863C
                          • Part of subcall function 004C8590: socket.WS2_32(?,?,?), ref: 004C865D
                          • Part of subcall function 004C8590: connect.WS2_32(00000000,00559BFC,?), ref: 004C8671
                          • Part of subcall function 004C8590: closesocket.WS2_32(00000000), ref: 004C867D
                          • Part of subcall function 004C8590: FreeAddrInfoW.WS2_32(?), ref: 004C868A
                          • Part of subcall function 004C8590: WSACleanup.WS2_32 ref: 004C8690
                        • recv.WS2_32(?,00000004,00000008), ref: 004C7E23
                        • __Xtime_get_ticks.LIBCPMT ref: 004C7E2A
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004C7E38
                        • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000), ref: 004C7EB1
                        • Sleep.KERNELBASE(00000064,?,00002710,00000000), ref: 004C7EB9
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: recv$Sleepsetsockopt$AddrCleanupErrorFreeInfoLastStartupUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@closesocketconnectgetaddrinfosocket
                        • String ID:
                        • API String ID: 3089209366-0
                        • Opcode ID: deda763b8fb6066c72b20903b58187ae793f723e7b47fea433c0891846b4f81f
                        • Instruction ID: b3d54dcccad81d83ab75f13ba9899d4b50e1d8608cabcccfb3508871926cac68
                        • Opcode Fuzzy Hash: deda763b8fb6066c72b20903b58187ae793f723e7b47fea433c0891846b4f81f
                        • Instruction Fuzzy Hash: 9EB1AC71D043089BEB10DBA8CC49BAEBBB1BB54314F24025EE815BB2D2D7785D88DF95

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 56 4c8590-4c85c2 WSAStartup 57 4c85c8-4c85f2 call 4ea420 * 2 56->57 58 4c8696-4c869f 56->58 63 4c85fe-4c8644 getaddrinfo 57->63 64 4c85f4-4c85f8 57->64 65 4c8646-4c864c 63->65 66 4c8690 WSACleanup 63->66 64->58 64->63 67 4c864e 65->67 68 4c86a4-4c86ae FreeAddrInfoW 65->68 66->58 69 4c8654-4c8668 socket 67->69 68->66 70 4c86b0-4c86b8 68->70 69->66 71 4c866a-4c867a connect 69->71 72 4c867c-4c8684 closesocket 71->72 73 4c86a0 71->73 72->69 74 4c8686-4c868a FreeAddrInfoW 72->74 73->68 74->66
                        APIs
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: AddrFreeInfo$CleanupStartupclosesocketconnectgetaddrinfosocket
                        • String ID:
                        • API String ID: 448659506-0
                        • Opcode ID: 52d29ec15fbf37ccd53ab56e21f2e3f1d11727fcf2b6a4206c2cbc59116a4c78
                        • Instruction ID: ffa07009e3086412046aa5b15573dbd5c691e56a3beb11943292ef2f0f62f1de
                        • Opcode Fuzzy Hash: 52d29ec15fbf37ccd53ab56e21f2e3f1d11727fcf2b6a4206c2cbc59116a4c78
                        • Instruction Fuzzy Hash: 9531C1726043009BD7208F25DC48B2BB7E5FB94729F114B1EF9A4922E0D7759C089AA7

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 75 409280-4092dd call 4163b0 78 409413-409521 call 402df0 call 4ea420 75->78 79 4092e3-4092e9 75->79 93 409523-409535 78->93 94 409537-40953f call 418dc0 78->94 80 4092f0-409313 79->80 82 409324-409331 80->82 83 409315-40931f 80->83 86 409342-40934f 82->86 87 409333-40933d 82->87 85 409403-409406 83->85 89 409409-40940d 85->89 90 409360-40936d 86->90 91 409351-40935b 86->91 87->85 89->78 89->80 95 40937e-40938b 90->95 96 40936f-409379 90->96 91->85 99 409544-409597 call 4ea420 * 2 93->99 94->99 97 409399-4093a6 95->97 98 40938d-409397 95->98 96->85 101 4093b4-4093c1 97->101 102 4093a8-4093b2 97->102 98->85 112 409599-4095c8 call 4ea420 call 435270 99->112 113 4095cb-4095e1 call 4ea420 99->113 104 4093c3-4093cd 101->104 105 4093cf-4093dc 101->105 102->85 104->85 107 4093ea-4093f4 105->107 108 4093de-4093e8 105->108 107->89 111 4093f6-4093ff 107->111 108->85 111->85 112->113 118 4096e2 113->118 119 4095e7-4095ed 113->119 122 4096e6-4096f0 118->122 121 4095f0-4096ce GetModuleHandleA GetProcAddress WSASend 119->121 124 4096d4-4096dc 121->124 125 40975f-409763 121->125 126 4096f2-4096fe 122->126 127 40971e-40973d 122->127 124->118 124->121 125->122 128 409700-40970e 126->128 129 409714-40971b call 4338f3 126->129 130 40976f-409796 127->130 131 40973f-40974b 127->131 128->129 132 409797-4097fe call 438c70 call 402df0 * 2 128->132 129->127 134 409765-40976c call 4338f3 131->134 135 40974d-40975b 131->135 134->130 135->132 139 40975d 135->139 139->134
                        APIs
                        • GetModuleHandleA.KERNEL32(Ws2_32.dll,?,?,?,?,0054D15C,00000000,74D723A0,-00589880), ref: 004096A6
                        • GetProcAddress.KERNEL32(00000000,?), ref: 004096B4
                        • WSASend.WS2_32(?,?,00000001,00000000,00000000,00000000,00000000,?,?,?,?,0054D15C,00000000,74D723A0,-00589880), ref: 004096C9
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProcSend
                        • String ID: Ws2_32.dll
                        • API String ID: 2819740048-3093949381
                        • Opcode ID: d946741ea927b9b060335f299eec8efad25939578b4ebaaa967d5c79e73c84d4
                        • Instruction ID: 188670ed5cfc709ed037a390f66f33add7af100e18449b0941b00ad524943a05
                        • Opcode Fuzzy Hash: d946741ea927b9b060335f299eec8efad25939578b4ebaaa967d5c79e73c84d4
                        • Instruction Fuzzy Hash: 7C02CE70D04298DEDF25CFA4C8907ADBBB0EF59304F24429EE4456B2C6D7781D86CB96

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 146 449789-4497ab 147 4497b1-4497b3 146->147 148 44999e 146->148 150 4497b5-4497d4 call 438be3 147->150 151 4497df-449802 147->151 149 4499a0-4499a4 148->149 159 4497d7-4497da 150->159 152 449804-449806 151->152 153 449808-44980e 151->153 152->153 155 449810-449821 152->155 153->150 153->155 157 449834-449844 call 4492ce 155->157 158 449823-449831 call 44263d 155->158 164 449846-44984c 157->164 165 44988d-44989f 157->165 158->157 159->149 168 449875-44988b call 448e9f 164->168 169 44984e-449851 164->169 166 4498f6-449916 WriteFile 165->166 167 4498a1-4498a7 165->167 170 449921 166->170 171 449918-44991e GetLastError 166->171 173 4498e2-4498f4 call 44934b 167->173 174 4498a9-4498ac 167->174 185 44986e-449870 168->185 175 449853-449856 169->175 176 44985c-44986b call 449266 169->176 178 449924-44992f 170->178 171->170 192 4498c9-4498cc 173->192 179 4498ce-4498e0 call 44950f 174->179 180 4498ae-4498b1 174->180 175->176 181 449936-449939 175->181 176->185 186 449931-449934 178->186 187 449999-44999c 178->187 179->192 188 44993c-44993e 180->188 189 4498b7-4498c4 call 449426 180->189 181->188 185->178 186->181 187->149 193 449940-449945 188->193 194 44996c-449978 188->194 189->192 192->185 197 449947-449959 193->197 198 44995e-449967 call 4416c8 193->198 199 449982-449994 194->199 200 44997a-449980 194->200 197->159 198->159 199->159 200->148 200->199
                        APIs
                          • Part of subcall function 00448E9F: GetConsoleOutputCP.KERNEL32(DDAEDC22,00000000,00000000,?), ref: 00448F02
                        • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0044990E
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00449918
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: ConsoleErrorFileLastOutputWrite
                        • String ID:
                        • API String ID: 2915228174-0
                        • Opcode ID: 2beaef352ff8862ad6b8b16251cd0bd229135013537871e9a6efb1225fc67aec
                        • Instruction ID: 4c198159cf300fc4e9085a349e24ad4d45033eb13303bb4f9288eddf9455663d
                        • Opcode Fuzzy Hash: 2beaef352ff8862ad6b8b16251cd0bd229135013537871e9a6efb1225fc67aec
                        • Instruction Fuzzy Hash: 9961C5B1C14119BFEF11DFA8C844AAFBBB9AF49304F14014AE800A7316D739DD05EB65

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 203 448dff-448e13 call 44e940 206 448e15-448e17 203->206 207 448e19-448e21 203->207 208 448e67-448e87 call 44e8af 206->208 209 448e23-448e2a 207->209 210 448e2c-448e2f 207->210 219 448e99 208->219 220 448e89-448e97 call 4416c8 208->220 209->210 212 448e37-448e4b call 44e940 * 2 209->212 213 448e31-448e35 210->213 214 448e4d-448e5d call 44e940 FindCloseChangeNotification 210->214 212->206 212->214 213->212 213->214 214->206 223 448e5f-448e65 GetLastError 214->223 225 448e9b-448e9e 219->225 220->225 223->208
                        APIs
                        • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,00448CE6,00000000,?,0057A178,0000000C,00448DA2,?,?,?), ref: 00448E55
                        • GetLastError.KERNEL32(?,00448CE6,00000000,?,0057A178,0000000C,00448DA2,?,?,?), ref: 00448E5F
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: ChangeCloseErrorFindLastNotification
                        • String ID:
                        • API String ID: 1687624791-0
                        • Opcode ID: 1fe827fdfe079599b9b1dab25e2b646f0beb01ea40d46a72429d261cc15a62e7
                        • Instruction ID: bfed174018f4c3fae0b74bea86efe9ace0911028d3bee9629bfc5162a0057b67
                        • Opcode Fuzzy Hash: 1fe827fdfe079599b9b1dab25e2b646f0beb01ea40d46a72429d261cc15a62e7
                        • Instruction Fuzzy Hash: 6E1125336042102AF6252236A84677F67499B82738F39061FF918CB2D2DF689C81825D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 228 44251c-442534 call 44e940 231 442536-44253d 228->231 232 44254a-442560 SetFilePointerEx 228->232 233 442544-442548 231->233 234 442575-44257f 232->234 235 442562-442573 GetLastError call 4416c8 232->235 236 44259b-44259e 233->236 234->233 238 442581-442596 234->238 235->233 238->236
                        APIs
                        • SetFilePointerEx.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?,?,00442626,?,?,?,?,?), ref: 00442558
                        • GetLastError.KERNEL32(?,?,?,?,00442626,?,?,?,?,?,00000000,?,00000000), ref: 00442565
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: ErrorFileLastPointer
                        • String ID:
                        • API String ID: 2976181284-0
                        • Opcode ID: 0df1753fdbe4f7a704092f8361e7cfb0c7cc0fcadc70f8748e4d2d33b1623b65
                        • Instruction ID: bcffdd1dd92d970d4fbe8e398a8ab980657c5c2bf717c74f1f656664416c076e
                        • Opcode Fuzzy Hash: 0df1753fdbe4f7a704092f8361e7cfb0c7cc0fcadc70f8748e4d2d33b1623b65
                        • Instruction Fuzzy Hash: 9B012632610615BFDF158F69DC1699E3B29EB84334F240209F8019B2E1E6B5ED429BA4

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 240 4032d0-4032e0 241 4032e2-4032e7 240->241 242 403306-403308 240->242 245 4032e9-4032ea call 433672 241->245 246 40331f call 402b50 241->246 243 403318-40331e 242->243 244 40330a-403317 call 433672 242->244 252 4032ef-4032f6 245->252 251 403324-403329 call 438c70 246->251 252->251 253 4032f8-403305 252->253
                        APIs
                        • Concurrency::cancel_current_task.LIBCPMT ref: 0040331F
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: Concurrency::cancel_current_task
                        • String ID:
                        • API String ID: 118556049-0
                        • Opcode ID: 4c9de15bf43b7906aab7ed6efc04c82af185101d7b74466eda9590404471e6f8
                        • Instruction ID: ac639495c118a2832fc09027b5ebf4fad0cef292c7be368858978faeea3118d5
                        • Opcode Fuzzy Hash: 4c9de15bf43b7906aab7ed6efc04c82af185101d7b74466eda9590404471e6f8
                        • Instruction Fuzzy Hash: 63F024321001009BCB246F61D4565EAB7ECDF28366B50083FFC8DD7292EB3EDA408788

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 256 44a65a-44a665 257 44a667-44a671 256->257 258 44a673-44a679 256->258 257->258 259 44a6a7-44a6b2 call 4416ff 257->259 260 44a692-44a6a3 RtlAllocateHeap 258->260 261 44a67b-44a67c 258->261 266 44a6b4-44a6b6 259->266 262 44a6a5 260->262 263 44a67e-44a685 call 448280 260->263 261->260 262->266 263->259 269 44a687-44a690 call 445a89 263->269 269->259 269->260
                        APIs
                        • RtlAllocateHeap.NTDLL(00000008,?,00000001), ref: 0044A69B
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: 89032516e5b3e6299283371760f336f91a06b383302663fb1c071aa923d3998c
                        • Instruction ID: 9689b7dccde3e7d2c1426315cc49502dff6dd5535dcc2f3da2dc3831567fdc71
                        • Opcode Fuzzy Hash: 89032516e5b3e6299283371760f336f91a06b383302663fb1c071aa923d3998c
                        • Instruction Fuzzy Hash: 4CF0E0311905246BFB216A66DC05B5B375CAF41760F1E8117EC84EB190CA3CDC3146EE

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 272 44b094-44b0a0 273 44b0d2-44b0dd call 4416ff 272->273 274 44b0a2-44b0a4 272->274 281 44b0df-44b0e1 273->281 275 44b0a6-44b0a7 274->275 276 44b0bd-44b0ce RtlAllocateHeap 274->276 275->276 278 44b0d0 276->278 279 44b0a9-44b0b0 call 448280 276->279 278->281 279->273 284 44b0b2-44b0bb call 445a89 279->284 284->273 284->276
                        APIs
                        • RtlAllocateHeap.NTDLL(00000000,00000001,?), ref: 0044B0C6
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: c639ae0624eff34eb8e57d07392fb4ffc7a0b3e65f726cef66c68c9318aea675
                        • Instruction ID: 07eaf642519ac51a5bd3283dd2addbb445c80e248ae9cef49388ffb333b33e8c
                        • Opcode Fuzzy Hash: c639ae0624eff34eb8e57d07392fb4ffc7a0b3e65f726cef66c68c9318aea675
                        • Instruction Fuzzy Hash: 99E022322006206BFF313AA69C14B5B764CEF413A3F190227EC25A62D1DB3CCC0092EE
                        APIs
                        • VirtualAllocEx.KERNEL32(00000000,00000000,?,00003000,00000040), ref: 004CF2F1
                        • WriteProcessMemory.KERNEL32(00000000,00000000,?,?,00000000), ref: 004CF30D
                        • WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 004CF342
                        • VirtualAllocEx.KERNEL32(?,00000000,00001000,00003000,00000040), ref: 004CF36B
                        • WriteProcessMemory.KERNEL32(?,00000000,?,00000218,00000000), ref: 004CF50F
                        • WriteProcessMemory.KERNEL32(?,00000218,004CF5E0,-00000010,00000000), ref: 004CF531
                        • CreateRemoteThread.KERNEL32(?,00000000,00000000,00000218,00000000,00000000,00000000), ref: 004CF544
                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004CF54D
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: MemoryProcessWrite$AllocVirtual$CreateObjectRemoteSingleThreadWait
                        • String ID: %s|%s$131
                        • API String ID: 2137838514-1629954864
                        • Opcode ID: b88fb1ed2ebfd2a655c4879da0ce9de7ec8f2c0603ef1b71525654192dd42d6d
                        • Instruction ID: 2ab717f03d3c912496b66fb944616d360f792c6fe5d042a247d22025e7d5b78f
                        • Opcode Fuzzy Hash: b88fb1ed2ebfd2a655c4879da0ce9de7ec8f2c0603ef1b71525654192dd42d6d
                        • Instruction Fuzzy Hash: 36B16BB1D002089FDB14CFA4CC95BAEBBB5FF18300F10426DE905BB291D774A984DBA5
                        APIs
                          • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                          • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                        • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 004535D7
                        • IsValidCodePage.KERNEL32(?), ref: 00453615
                        • IsValidLocale.KERNEL32(?,00000001), ref: 00453628
                        • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00453670
                        • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 0045368B
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                        • String ID: *V
                        • API String ID: 415426439-2897881622
                        • Opcode ID: bb3ee8500ca9cacc625c50b97d6e48ff5c53ad3e39c4a6c01d9da358df15b7ae
                        • Instruction ID: 4a54d826d8e8e5dc964d84ffa3ac1e49b68ae0fe58eca9cd8e7cd24ca5604c7d
                        • Opcode Fuzzy Hash: bb3ee8500ca9cacc625c50b97d6e48ff5c53ad3e39c4a6c01d9da358df15b7ae
                        • Instruction Fuzzy Hash: 4E517471A00209AFDB20DFA5CC41ABF77B8AF05743F14446AED01E7252EB74DA48DB65
                        APIs
                          • Part of subcall function 00449E42: GetLastError.KERNEL32(00000000,?,0044F82B), ref: 00449E46
                          • Part of subcall function 00449E42: SetLastError.KERNEL32(00000000,00000000,00000001,00000006,000000FF), ref: 00449EE8
                        • GetACP.KERNEL32(?,?,?,?,?,?,00447300,?,?,?,?,?,-00000050,?,?,?), ref: 00452C19
                        • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00447300,?,?,?,?,?,-00000050,?,?), ref: 00452C50
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00452DB3
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: ErrorLast$CodeInfoLocalePageValid
                        • String ID: *V$utf8
                        • API String ID: 607553120-210452255
                        • Opcode ID: 95727e6ef7b94787d777f99e21165c393144e5509e4be2ad3f52f8295ffa9360
                        • Instruction ID: 742b11dcb7ff0b0bfa38c284345f0d68b4d7ce619a9ba0daefdf44cafbbca61f
                        • Opcode Fuzzy Hash: 95727e6ef7b94787d777f99e21165c393144e5509e4be2ad3f52f8295ffa9360
                        • Instruction Fuzzy Hash: F071FA32600602A6D725AF75CD45B6B73A8EF16705F10042FFD05D7283EBF8E94C9699
                        APIs
                        • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002,00000000,?,?,?,00453605,?,?), ref: 0045338C
                        • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002,00000000,?,?,?,00453605,?,?), ref: 004533B5
                        • GetACP.KERNEL32(?,?,00453605,?,?), ref: 004533CA
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: InfoLocale
                        • String ID: ACP$OCP
                        • API String ID: 2299586839-711371036
                        • Opcode ID: b900ca414d4c4be95a8c6f041d08249478f894891a183a2f82a4edaf5765dc51
                        • Instruction ID: 0023b8279c9b3e3643c8ce07df61025d6c2b7e12d2ffc4f7461f6cfcb2a1a3ae
                        • Opcode Fuzzy Hash: b900ca414d4c4be95a8c6f041d08249478f894891a183a2f82a4edaf5765dc51
                        • Instruction Fuzzy Hash: 8021C432600100A7DB308F54C900A9BB3A6AF50FD3B568466EC06D7312EF36EF49D358
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                        • Instruction ID: 01dad5c531b3804b6668612822d9feb5b6f7af541a2af8c3bc89036eeee974e8
                        • Opcode Fuzzy Hash: 333d4b6d5425d6f9d03797ee82114c3711da98524c03317fffdb5ec62fb2b380
                        • Instruction Fuzzy Hash: DA023A71E002199BDF14CFA9D9C06AEFBB1FF48314F24926AE919B7380D735A9418B94
                        APIs
                        • RtlDecodePointer.NTDLL(?), ref: 004579FC
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: DecodePointer
                        • String ID: `-@$acos$asin$exp$log$log10$pow$sqrt
                        • API String ID: 3527080286-3628989360
                        • Opcode ID: 4c17630f5161de399ffce6b570c60365a2c89c55b52a7f760b39540bf94f5387
                        • Instruction ID: bbf143f63b3841ec77cfacb8c6df481a799db6acf17f433172942b25d65e7ef2
                        • Opcode Fuzzy Hash: 4c17630f5161de399ffce6b570c60365a2c89c55b52a7f760b39540bf94f5387
                        • Instruction Fuzzy Hash: 1651B370808A0ACBCF109F58F84C1BEBFB1FB05309F154166D851A7266C7799A2DCB4D
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 0041A09D
                        • std::_Lockit::_Lockit.LIBCPMT ref: 0041A0BF
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0041A0E7
                        • __Getctype.LIBCPMT ref: 0041A1C5
                        • std::_Facet_Register.LIBCPMT ref: 0041A1F9
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0041A223
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeRegister
                        • String ID: PD@$PG@$E@
                        • API String ID: 1102183713-4120405683
                        • Opcode ID: cf66166f52ff7971b600a3250f2a29593a1149a421a208e93fab5363b0ce8f21
                        • Instruction ID: b372b58ab1bb25eec4b44a09b7f8f3aef2cc67a410616163416d5e42c3dffe19
                        • Opcode Fuzzy Hash: cf66166f52ff7971b600a3250f2a29593a1149a421a208e93fab5363b0ce8f21
                        • Instruction Fuzzy Hash: 6E51BAB0D01245DFCB11CF98C9457AEBBF0FB14714F14825ED855AB391DB78AA88CB92
                        APIs
                        • _ValidateLocalCookies.LIBCMT ref: 00437307
                        • ___except_validate_context_record.LIBVCRUNTIME ref: 0043730F
                        • _ValidateLocalCookies.LIBCMT ref: 00437398
                        • __IsNonwritableInCurrentImage.LIBCMT ref: 004373C3
                        • _ValidateLocalCookies.LIBCMT ref: 00437418
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                        • String ID: `-@$csm
                        • API String ID: 1170836740-3738301566
                        • Opcode ID: a837c65dc98bc53f7a591b5dada66322cfdf011b0ab20b220170fbbfaeea83fd
                        • Instruction ID: bde692452db8eba3752ab90a3e7788ac0719a0bf92b2230e47b89eff8dfd02fd
                        • Opcode Fuzzy Hash: a837c65dc98bc53f7a591b5dada66322cfdf011b0ab20b220170fbbfaeea83fd
                        • Instruction Fuzzy Hash: B041F8709042099FCF20DF59C885A9FBBA4BF08328F14905BFC54AB392D739E905DB95
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 0041C45A
                        • std::_Lockit::_Lockit.LIBCPMT ref: 0041C47C
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0041C4A4
                        • std::_Facet_Register.LIBCPMT ref: 0041C59A
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0041C5C4
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                        • String ID: E@$PD@
                        • API String ID: 459529453-4103272508
                        • Opcode ID: 4956459445cc7cc7d841703dbe2ed42e033006db9883af498c412f7626095107
                        • Instruction ID: e4bc83ced0ac359faa997fd18d4eeb760fe14de2594101695cc0fd15b6690fbc
                        • Opcode Fuzzy Hash: 4956459445cc7cc7d841703dbe2ed42e033006db9883af498c412f7626095107
                        • Instruction Fuzzy Hash: C351EFB0900255EFDB11CF58C991BAEBBF0FB10314F24415EE846AB381D7B9AA45CB95
                        APIs
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: _strrchr
                        • String ID:
                        • API String ID: 3213747228-0
                        • Opcode ID: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                        • Instruction ID: d7b9d7273cbfac5d15a556f8c8651b9033d93685d5a38535419dded3191b9e75
                        • Opcode Fuzzy Hash: 785c90e8ff89e0f1a3d98e37725974d6f6ea20f06d45e48120c47f1ca5a82ffe
                        • Instruction Fuzzy Hash: D5B14672D006559FEB158F24CC81BEBBBA5EF59310F2441ABE904AB382D778D901C7E9
                        APIs
                        • FreeLibrary.KERNEL32(00000000,?,0044B48D,?,?,00000000,00000001,?,?,0044B6B7,00000022,FlsSetValue,00561B88,00561B90,00000001), ref: 0044B43F
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: FreeLibrary
                        • String ID: api-ms-$ext-ms-
                        • API String ID: 3664257935-537541572
                        • Opcode ID: 033630484f002e070c94113c7b6ef7f262f68e90d70309fdd043a749aa00ed93
                        • Instruction ID: e3d7dbf8d3e43151f67a2d3675c4fcd7809fc0c9af6198dcb17880ded4e1cd5b
                        • Opcode Fuzzy Hash: 033630484f002e070c94113c7b6ef7f262f68e90d70309fdd043a749aa00ed93
                        • Instruction Fuzzy Hash: A2212B36A01220A7E7319F619C45A6B7768EB51761F140112FC06A7392D734ED05D6D9
                        APIs
                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,DDAEDC22,?,?,00000000,00551365,000000FF,?,0044360F,?,?,004435E3,00000016), ref: 00443668
                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044367A
                        • FreeLibrary.KERNEL32(00000000,?,00000000,00551365,000000FF,?,0044360F,?,?,004435E3,00000016), ref: 0044369C
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: AddressFreeHandleLibraryModuleProc
                        • String ID: CorExitProcess$`-@$mscoree.dll
                        • API String ID: 4061214504-3731901874
                        • Opcode ID: 66c557226bdf84cfe892202a4e2d9d598a1facfa92736b92f61228ad13b2a6bb
                        • Instruction ID: 11f561727bfec435161e86ab51d2faaed74d5e09c0b89d0474703e999051cdf2
                        • Opcode Fuzzy Hash: 66c557226bdf84cfe892202a4e2d9d598a1facfa92736b92f61228ad13b2a6bb
                        • Instruction Fuzzy Hash: 5601A232A44715AFDB219F44DC19BAFBBB8FB14B52F014526E812E27E0DB749A04CA94
                        APIs
                        • __EH_prolog3.LIBCMT ref: 00432730
                        • std::_Lockit::_Lockit.LIBCPMT ref: 0043273B
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 004327A9
                          • Part of subcall function 0043288C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 004328A4
                        • std::locale::_Setgloballocale.LIBCPMT ref: 00432756
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                        • String ID: `-@
                        • API String ID: 677527491-3781167437
                        • Opcode ID: 8a5613631ec3d916f95b396eb7cc43f12c5d676d84142dd5ef1a29976cc47206
                        • Instruction ID: 335728d06f8999c9367bb6f0cb93ad347570f0e44e9dcbef2930aaa8ccdcd417
                        • Opcode Fuzzy Hash: 8a5613631ec3d916f95b396eb7cc43f12c5d676d84142dd5ef1a29976cc47206
                        • Instruction Fuzzy Hash: 9D01FC35A006109BC70AFB20CC5157D7BB0FF98790F44250EE81163391CFB8AE06DB89
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 00432BDC
                        • RtlAcquireSRWLockExclusive.NTDLL(00000008), ref: 00432BFB
                        • RtlAcquireSRWLockExclusive.NTDLL(00000008), ref: 00432C29
                        • RtlTryAcquireSRWLockExclusive.NTDLL(00000008), ref: 00432C84
                        • RtlTryAcquireSRWLockExclusive.NTDLL(00000008), ref: 00432C9B
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: AcquireExclusiveLock$CurrentThread
                        • String ID:
                        • API String ID: 66001078-0
                        • Opcode ID: 8f089e7040faa662b45679f060ee1b8a0f0adfff173fd46cb89089840a213128
                        • Instruction ID: ee0d2db44a198d3d02c1eb3b1b0ff5a364ec90963e300245c4d31640e9e12550
                        • Opcode Fuzzy Hash: 8f089e7040faa662b45679f060ee1b8a0f0adfff173fd46cb89089840a213128
                        • Instruction Fuzzy Hash: B2415931900A0ADFCB20DF65CA8096EB3B4FF0C311F20692BD446D7650D7B8E986DB69
                        APIs
                        • ___std_exception_destroy.LIBVCRUNTIME ref: 0040750C
                        • ___std_exception_destroy.LIBVCRUNTIME ref: 00407522
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: ___std_exception_destroy
                        • String ID: )@$[json.exception.
                        • API String ID: 4194217158-3378332251
                        • Opcode ID: 74f1ced649a80f54c74698f2e3f1ef80366f2fbaef409b1663f26043a5eac72a
                        • Instruction ID: d1fd1ad00dbeab1566b73d8112c34bc80c76f551163e59ed82d928a5322bc1a2
                        • Opcode Fuzzy Hash: 74f1ced649a80f54c74698f2e3f1ef80366f2fbaef409b1663f26043a5eac72a
                        • Instruction Fuzzy Hash: 8C51CFB1C046489BD710DFA8C905B9EBBB4FF15318F14426EE850A73C2E7B86A44C7A5
                        APIs
                        • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0040499F
                          • Part of subcall function 004351FB: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,74D723A0,?,00431D09,?,005799D8,74D723A0,?,74D723A0,-00589880), ref: 0043525B
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: ExceptionIos_base_dtorRaisestd::ios_base::_
                        • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                        • API String ID: 1903096808-1866435925
                        • Opcode ID: 5e8fcf04681b5496c91e096f1d273a5343178b8940b0c322b64de4dd1df32f3c
                        • Instruction ID: 99c94d1e80f512c720ba00148ae48faeb0acee82eabb402b7e5943aa58dcc262
                        • Opcode Fuzzy Hash: 5e8fcf04681b5496c91e096f1d273a5343178b8940b0c322b64de4dd1df32f3c
                        • Instruction Fuzzy Hash: AC119CF2844644ABCB10DF688C03BAB37C8E744715F04463EFE58972C1EB399800C79A
                        APIs
                        • GetConsoleOutputCP.KERNEL32(DDAEDC22,00000000,00000000,?), ref: 00448F02
                          • Part of subcall function 0044EC55: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0044A862,?,00000000,-00000008), ref: 0044ECB6
                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00449154
                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0044919A
                        • GetLastError.KERNEL32 ref: 0044923D
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                        • String ID:
                        • API String ID: 2112829910-0
                        • Opcode ID: d46c0870a8277536d77cd1fa32924c999241811f2f15ebdbc3735bbe4b8907ba
                        • Instruction ID: b6f9ea87837ca93654473fd2bae4ec290e60b55bc3ade45d2d9d29a5185f0d60
                        • Opcode Fuzzy Hash: d46c0870a8277536d77cd1fa32924c999241811f2f15ebdbc3735bbe4b8907ba
                        • Instruction Fuzzy Hash: 70D1BC75D00249AFDF14CFA8C880AAEBBB5FF09304F28456AE856EB351D734AD45CB54
                        APIs
                        • WriteConsoleW.KERNEL32(?,?,?,00000000,?,?,00453DCE,?,00000001,?,?,?,00449291,?,00000000,00000000), ref: 00456D49
                        • GetLastError.KERNEL32(?,00453DCE,?,00000001,?,?,?,00449291,?,00000000,00000000,?,?,?,0044986B,?), ref: 00456D55
                          • Part of subcall function 00456D1B: CloseHandle.KERNEL32(FFFFFFFE,00456D65,?,00453DCE,?,00000001,?,?,?,00449291,?,00000000,00000000,?,?), ref: 00456D2B
                        • ___initconout.LIBCMT ref: 00456D65
                          • Part of subcall function 00456CDD: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00456D0C,00453DBB,?,?,00449291,?,00000000,00000000,?), ref: 00456CF0
                        • WriteConsoleW.KERNEL32(?,?,?,00000000,?,00453DCE,?,00000001,?,?,?,00449291,?,00000000,00000000,?), ref: 00456D7A
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                        • String ID:
                        • API String ID: 2744216297-0
                        • Opcode ID: 6d252f6c85546040703605b5d122fbb434f3c9b6b34be8e7cd3f73b3df330617
                        • Instruction ID: b582005f90f2c4d159ccd48a3422ceca8e6e351b7b3b67145bbef734a6de3f3c
                        • Opcode Fuzzy Hash: 6d252f6c85546040703605b5d122fbb434f3c9b6b34be8e7cd3f73b3df330617
                        • Instruction Fuzzy Hash: F4F01C37500518BBCF221FD1DC18A8A3F76EB583A2B814415FE0D96231D6328928EB94
                        APIs
                        • ___std_exception_copy.LIBVCRUNTIME ref: 00403819
                        • ___std_exception_destroy.LIBVCRUNTIME ref: 004038F0
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: ___std_exception_copy___std_exception_destroy
                        • String ID: )@
                        • API String ID: 2970364248-4120265097
                        • Opcode ID: ed1ac0f14267c2b8626e9d784d9228836504f476972db074cc70cf608e0aac1a
                        • Instruction ID: 269ef50febfdc4b1c22cf7239a576f40f0b19685bcb009e1facc48eb6157c32a
                        • Opcode Fuzzy Hash: ed1ac0f14267c2b8626e9d784d9228836504f476972db074cc70cf608e0aac1a
                        • Instruction Fuzzy Hash: DD6169B1C00248DBDB10DF98C945B9EFFB5FF19324F14825EE814AB282D7B95A44CBA5
                        APIs
                        • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0040499F
                          • Part of subcall function 004351FB: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,74D723A0,?,00431D09,?,005799D8,74D723A0,?,74D723A0,-00589880), ref: 0043525B
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: ExceptionIos_base_dtorRaisestd::ios_base::_
                        • String ID: ios_base::badbit set$ios_base::failbit set
                        • API String ID: 1903096808-1240500531
                        • Opcode ID: 8193a8ffeaccef37eb783ff7fe0bdc902a64c2974526b8af49cedd0c2b6b92ef
                        • Instruction ID: 59789774a96eacd1a5b8f49c51d8e497543063f0a2ed12b155596828dbf76f3a
                        • Opcode Fuzzy Hash: 8193a8ffeaccef37eb783ff7fe0bdc902a64c2974526b8af49cedd0c2b6b92ef
                        • Instruction Fuzzy Hash: E84124B2C00244ABCB04DF68C845BAEBBB8FB49710F14826EF554A73C1D7795A00CBA5
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 00404061
                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 004040C4
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                        • String ID: bad locale name
                        • API String ID: 3988782225-1405518554
                        • Opcode ID: 0039d2d2ea2786ef81fe116e8b864d57793cf36a19fa060d6cb0c255b1586cee
                        • Instruction ID: 65c2995a4cce64452fc0e082f9126f7f9302ed92d60cad1113ce5137d9e79936
                        • Opcode Fuzzy Hash: 0039d2d2ea2786ef81fe116e8b864d57793cf36a19fa060d6cb0c255b1586cee
                        • Instruction Fuzzy Hash: DB112670805B84EED321CF69C50474BBFF0AF25714F10868DD09597781D3B9A604CB95
                        APIs
                        • ___std_exception_copy.LIBVCRUNTIME ref: 004165C9
                        • ___std_exception_copy.LIBVCRUNTIME ref: 004165FC
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: ___std_exception_copy
                        • String ID: )@
                        • API String ID: 2659868963-4120265097
                        • Opcode ID: ec459901e9a8c12f2536e06f4ce64afd8286d8aca2aa337d2d7da09c98386d96
                        • Instruction ID: 79ebb971947c26e29da123751e765caa72f3f100f47198c89106861aa63fe252
                        • Opcode Fuzzy Hash: ec459901e9a8c12f2536e06f4ce64afd8286d8aca2aa337d2d7da09c98386d96
                        • Instruction Fuzzy Hash: F0112EB6910649EBCB11CF99C980B86FBF8FF09724F10876AE82497641E774A5448BA0
                        APIs
                        • ___std_exception_destroy.LIBVCRUNTIME ref: 00407A5C
                        • ___std_exception_destroy.LIBVCRUNTIME ref: 00407A72
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: ___std_exception_destroy
                        • String ID: )@
                        • API String ID: 4194217158-4120265097
                        • Opcode ID: 9ee8fa866bcea9d2c14fc14309fcadf8facde4318e0e6bb098ed358a1a235593
                        • Instruction ID: 96290d15a7b89a27e7413382239de33ac52fdad5c525fa7f0e86a9c1871ea130
                        • Opcode Fuzzy Hash: 9ee8fa866bcea9d2c14fc14309fcadf8facde4318e0e6bb098ed358a1a235593
                        • Instruction Fuzzy Hash: 68F012B1805744DFC711DF98C90178DFFF8FB05728F50466AE855A3780E7B5660487A5
                        APIs
                        • GetSystemTimePreciseAsFileTime.KERNEL32(?,00433077,?,?,?,?,004C7E2F), ref: 00433655
                        • GetSystemTimeAsFileTime.KERNEL32(?,DDAEDC22,00000000,?,00551382,000000FF,?,00433077,?,?,?,?,004C7E2F), ref: 00433659
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: Time$FileSystem$Precise
                        • String ID: `-@
                        • API String ID: 743729956-3781167437
                        • Opcode ID: a70e229828252f114f3dcb939b169fb3f53d7191ad82fa45b454faadf805d98c
                        • Instruction ID: 3e04e591088ee8cc2650925c1d28f2227fba881fd4e87dc1a7d03300bd93dc66
                        • Opcode Fuzzy Hash: a70e229828252f114f3dcb939b169fb3f53d7191ad82fa45b454faadf805d98c
                        • Instruction Fuzzy Hash: 73F0A032904A54EFCB118F44DC11B59BBA8F708B21F004626EC12A3790DB34A9049F94
                        APIs
                        • InitializeCriticalSectionAndSpinCount.KERNEL32(00000016,00000001,004389D2,00000001,00000016,00438BE1,?,?,?,?,?,00000000), ref: 0044B834
                        Strings
                        Memory Dump Source
                        • Source File: 00000006.00000002.3251394989.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000006.00000002.3251332321.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251589290.000000000055D000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251629705.0000000000585000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251661958.000000000058A000.00000002.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251692500.0000000000596000.00000004.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000598000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000731000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000733000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000735000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000737000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000739000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073D000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000073F000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000741000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000747000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000074B000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000757000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000759000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000075E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000762000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000768000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076C000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000076E000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000770000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000772000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000774000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000776000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000778000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.000000000077A000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.0000000000786000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3251722909.00000000007B0000.00000040.00000001.01000000.00000004.sdmpDownload File
                        • Associated: 00000006.00000002.3253400969.0000000000980000.00000020.00000001.01000000.00000004.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_6_2_400000_MPGPH131.jbxd
                        Similarity
                        • API ID: CountCriticalInitializeSectionSpin
                        • String ID: InitializeCriticalSectionEx$`-@
                        • API String ID: 2593887523-3269949891
                        • Opcode ID: 1f2253b5c78e33ee57fe7f30907939316c5faef6f9275bf3e632fad4f43c2f0e
                        • Instruction ID: 5bcc12c1b0658f8dc7434a33690804c70bb56e7eadbb0958c8ec10a8e9d05d13
                        • Opcode Fuzzy Hash: 1f2253b5c78e33ee57fe7f30907939316c5faef6f9275bf3e632fad4f43c2f0e
                        • Instruction Fuzzy Hash: BDE09236581318BBCB212F92DC06DAE7F25EB24BA2F048022FD1956161C7768821BBD9